SlideShare a Scribd company logo
1 of 4
Download to read offline
How To Stay Safe From
NotPetya Ransomware
20 months have passed since the brutal NotPetya attacked businesses
around the globe, resulting in a dramatic loss of income and intense
business disruption. Many cyber law consultants are still assisting
organisations to recover their infected systems. It is essential to have proper
knowledge about NotPetya to stay safe.
Let’s learn about this ransomware in detail.
What is NotPetya?
NotPetya is a close relative of malware kind Petya which successfully
infected thousands of computers in 2017 across the globe.
Cyberlaw consultants discovered that NotPetya has some potential tools to
help it spread and infect computers. Petya Virus was typical ransomware
that attempted to make some quick Bitcoin from its victims. However,
NotPetya was identified as a state-sponsored Russian cyber-attack
masquerading as ransomware.
It is well–designed and has automated lateral movement. Due to such
well-built quality, its spreading mechanism which is far better than
WannaCry makes it even more lethal.
How NotPetya works?
NotPetya has two sophisticated protection methodologies: a false Microsoft
signature and XOR encrypted shellcode payload, both good enough to fool
antiviruses and evade signatures check.
Moreover, it takes advantage of three different vulnerabilities for its
proliferation:
PsExec
The latest version of Petya abuses the PsExec tool for executing malicious
code on other computers to spread the infection.
Passwords collection
It extracts passwords from memory or the local filesystem or the databases
and moves them to other systems.
EternalBlue
Even if the operating system releases a security patch to prevent attacks like
WannaCry, negligence of most institutions has allowed NotPetya to infect
other systems by injecting malicious code into their code or database.
Disguised as common ransomware, remastered Petya spreads via email, but
it also tracks and alternates through all means possible to capture the
opportunities to cause the infection. Therefore, cyber law consultants
suggest that it is essential to be cautious and avoid vulnerabilities to prevent
another outbreak.
How to protect your company from NotPetya?
• Employ vulnerability assessment management tools to your networks,
and stay updated with the security patches. It is strongly
recommended to acquire your licenses of the products, as they always
update their databases on signatures and vulnerabilities to give extra
protection to your networks.
• Integrate real-time monitoring tools which provide file integrity
monitoring, forensic analysis and corresponding modules; which help
you to identify the files which suffer unauthorised modifications in real
time. Such tools also raise alerts on ransomware attacks and help you
solve them before it infects other devices within your networks.
• Add an extra layer of protection to your network with endpoint
security tools with intelligent software that catches early infections by
raising security alarms when malicious code attempts to take control of
your systems.
• Always backup your data regularly as you never know when, where or
how the ransomware strikes.
• Instruct your employees to take part in workshops for cybersecurity,
and be particularly persistent on the application of good practices in
digital security. It is the best practice that prevents your company from
being hit by a ransomware attack.
Contact cyber law consultants who can assist you during such massive cyber
attacks, and also walk you through the entire process of managing the
vulnerability assessment cycle.

More Related Content

Recently uploaded

Does Apple Neurotechnology Patents Go To Far?
Does Apple  Neurotechnology Patents Go To Far?Does Apple  Neurotechnology Patents Go To Far?
Does Apple Neurotechnology Patents Go To Far?Graham Ware
 
dandan liu need to rot when she dies..pdf
dandan liu need to rot when she dies..pdfdandan liu need to rot when she dies..pdf
dandan liu need to rot when she dies..pdfbraydenstoch777
 
Casa Tradicion v. Casa Azul Spirits (S.D. Tex. 2024)
Casa Tradicion v. Casa Azul Spirits (S.D. Tex. 2024)Casa Tradicion v. Casa Azul Spirits (S.D. Tex. 2024)
Casa Tradicion v. Casa Azul Spirits (S.D. Tex. 2024)Mike Keyes
 
Rights of Consumers under Consumer Protection Act, 1986.
Rights of Consumers under Consumer Protection Act, 1986.Rights of Consumers under Consumer Protection Act, 1986.
Rights of Consumers under Consumer Protection Act, 1986.shrishtijain1809
 
Supreme Court Regulation No. 3 of 2023 on Procedure for Appointment of Arbitr...
Supreme Court Regulation No. 3 of 2023 on Procedure for Appointment of Arbitr...Supreme Court Regulation No. 3 of 2023 on Procedure for Appointment of Arbitr...
Supreme Court Regulation No. 3 of 2023 on Procedure for Appointment of Arbitr...Leks&Co
 
Solidarity and Taxation: the Ubuntu approach in South Africa
Solidarity and Taxation: the Ubuntu approach in South AfricaSolidarity and Taxation: the Ubuntu approach in South Africa
Solidarity and Taxation: the Ubuntu approach in South AfricaUniversity of Ferrara
 
Embed-1-4.pdf Decision of the High Court
Embed-1-4.pdf Decision of the High CourtEmbed-1-4.pdf Decision of the High Court
Embed-1-4.pdf Decision of the High Courtbhavenpr
 
Indian Partnership Act 1932, Rights and Duties of Partners
Indian Partnership Act 1932, Rights and Duties of PartnersIndian Partnership Act 1932, Rights and Duties of Partners
Indian Partnership Act 1932, Rights and Duties of Partnersshrishtijain1809
 
Sedition Offences against Property 20-5-2024.pptx
Sedition  Offences against Property 20-5-2024.pptxSedition  Offences against Property 20-5-2024.pptx
Sedition Offences against Property 20-5-2024.pptxRashmiPandey862734
 
Protection Against Arrest and Detention art 2223 and 24.pptx
Protection Against Arrest and Detention art 2223 and 24.pptxProtection Against Arrest and Detention art 2223 and 24.pptx
Protection Against Arrest and Detention art 2223 and 24.pptxAkom8
 
Mergers and Acquisitions in Kenya - An explanation
Mergers and Acquisitions in Kenya - An explanationMergers and Acquisitions in Kenya - An explanation
Mergers and Acquisitions in Kenya - An explanationRovert3
 
Application of Doctrine of Renvoi by foreign courts under conflict of laws
Application of Doctrine of Renvoi by foreign courts under conflict of lawsApplication of Doctrine of Renvoi by foreign courts under conflict of laws
Application of Doctrine of Renvoi by foreign courts under conflict of lawsanvithaav
 
Starbucks Corp. v. Sardarbuksh Coffee Co.
Starbucks Corp. v. Sardarbuksh Coffee Co.Starbucks Corp. v. Sardarbuksh Coffee Co.
Starbucks Corp. v. Sardarbuksh Coffee Co.aniruddhabamal
 
Everything You Should Know About Child Custody and Parenting While Living in ...
Everything You Should Know About Child Custody and Parenting While Living in ...Everything You Should Know About Child Custody and Parenting While Living in ...
Everything You Should Know About Child Custody and Parenting While Living in ...AvinashMittal5
 
7 Basic Steps of Trust Administration.pdf
7 Basic Steps of Trust Administration.pdf7 Basic Steps of Trust Administration.pdf
7 Basic Steps of Trust Administration.pdfGoodman Estate Law
 
CHP 5 OF OFFENCES AGAINST WOMEN AND CHILDREN.pptx
CHP 5 OF OFFENCES AGAINST WOMEN AND CHILDREN.pptxCHP 5 OF OFFENCES AGAINST WOMEN AND CHILDREN.pptx
CHP 5 OF OFFENCES AGAINST WOMEN AND CHILDREN.pptxRashmiPandey862734
 
Dandan Liu is the worst real estate agent on earth..pdf
Dandan Liu is the worst real estate agent on earth..pdfDandan Liu is the worst real estate agent on earth..pdf
Dandan Liu is the worst real estate agent on earth..pdfbraydenstoch777
 
Grounds for Quashing 482 CrPC High Court
Grounds for Quashing 482 CrPC High CourtGrounds for Quashing 482 CrPC High Court
Grounds for Quashing 482 CrPC High CourtSatish Mishra
 
REVIVING OUR STAR GOD IMAGES FROM MARRYING OUR 4 HOLY LAWS OF STAR GODS
REVIVING OUR STAR GOD IMAGES FROM MARRYING OUR 4 HOLY LAWS OF STAR GODSREVIVING OUR STAR GOD IMAGES FROM MARRYING OUR 4 HOLY LAWS OF STAR GODS
REVIVING OUR STAR GOD IMAGES FROM MARRYING OUR 4 HOLY LAWS OF STAR GODSCheong Man Keong
 

Recently uploaded (20)

Does Apple Neurotechnology Patents Go To Far?
Does Apple  Neurotechnology Patents Go To Far?Does Apple  Neurotechnology Patents Go To Far?
Does Apple Neurotechnology Patents Go To Far?
 
dandan liu need to rot when she dies..pdf
dandan liu need to rot when she dies..pdfdandan liu need to rot when she dies..pdf
dandan liu need to rot when she dies..pdf
 
Casa Tradicion v. Casa Azul Spirits (S.D. Tex. 2024)
Casa Tradicion v. Casa Azul Spirits (S.D. Tex. 2024)Casa Tradicion v. Casa Azul Spirits (S.D. Tex. 2024)
Casa Tradicion v. Casa Azul Spirits (S.D. Tex. 2024)
 
Rights of Consumers under Consumer Protection Act, 1986.
Rights of Consumers under Consumer Protection Act, 1986.Rights of Consumers under Consumer Protection Act, 1986.
Rights of Consumers under Consumer Protection Act, 1986.
 
Supreme Court Regulation No. 3 of 2023 on Procedure for Appointment of Arbitr...
Supreme Court Regulation No. 3 of 2023 on Procedure for Appointment of Arbitr...Supreme Court Regulation No. 3 of 2023 on Procedure for Appointment of Arbitr...
Supreme Court Regulation No. 3 of 2023 on Procedure for Appointment of Arbitr...
 
Solidarity and Taxation: the Ubuntu approach in South Africa
Solidarity and Taxation: the Ubuntu approach in South AfricaSolidarity and Taxation: the Ubuntu approach in South Africa
Solidarity and Taxation: the Ubuntu approach in South Africa
 
Embed-1-4.pdf Decision of the High Court
Embed-1-4.pdf Decision of the High CourtEmbed-1-4.pdf Decision of the High Court
Embed-1-4.pdf Decision of the High Court
 
Indian Partnership Act 1932, Rights and Duties of Partners
Indian Partnership Act 1932, Rights and Duties of PartnersIndian Partnership Act 1932, Rights and Duties of Partners
Indian Partnership Act 1932, Rights and Duties of Partners
 
Sedition Offences against Property 20-5-2024.pptx
Sedition  Offences against Property 20-5-2024.pptxSedition  Offences against Property 20-5-2024.pptx
Sedition Offences against Property 20-5-2024.pptx
 
Protection Against Arrest and Detention art 2223 and 24.pptx
Protection Against Arrest and Detention art 2223 and 24.pptxProtection Against Arrest and Detention art 2223 and 24.pptx
Protection Against Arrest and Detention art 2223 and 24.pptx
 
Mergers and Acquisitions in Kenya - An explanation
Mergers and Acquisitions in Kenya - An explanationMergers and Acquisitions in Kenya - An explanation
Mergers and Acquisitions in Kenya - An explanation
 
Application of Doctrine of Renvoi by foreign courts under conflict of laws
Application of Doctrine of Renvoi by foreign courts under conflict of lawsApplication of Doctrine of Renvoi by foreign courts under conflict of laws
Application of Doctrine of Renvoi by foreign courts under conflict of laws
 
Starbucks Corp. v. Sardarbuksh Coffee Co.
Starbucks Corp. v. Sardarbuksh Coffee Co.Starbucks Corp. v. Sardarbuksh Coffee Co.
Starbucks Corp. v. Sardarbuksh Coffee Co.
 
Everything You Should Know About Child Custody and Parenting While Living in ...
Everything You Should Know About Child Custody and Parenting While Living in ...Everything You Should Know About Child Custody and Parenting While Living in ...
Everything You Should Know About Child Custody and Parenting While Living in ...
 
7 Basic Steps of Trust Administration.pdf
7 Basic Steps of Trust Administration.pdf7 Basic Steps of Trust Administration.pdf
7 Basic Steps of Trust Administration.pdf
 
CHP 5 OF OFFENCES AGAINST WOMEN AND CHILDREN.pptx
CHP 5 OF OFFENCES AGAINST WOMEN AND CHILDREN.pptxCHP 5 OF OFFENCES AGAINST WOMEN AND CHILDREN.pptx
CHP 5 OF OFFENCES AGAINST WOMEN AND CHILDREN.pptx
 
Justice Advocates Legal Defence Firm
Justice Advocates Legal Defence FirmJustice Advocates Legal Defence Firm
Justice Advocates Legal Defence Firm
 
Dandan Liu is the worst real estate agent on earth..pdf
Dandan Liu is the worst real estate agent on earth..pdfDandan Liu is the worst real estate agent on earth..pdf
Dandan Liu is the worst real estate agent on earth..pdf
 
Grounds for Quashing 482 CrPC High Court
Grounds for Quashing 482 CrPC High CourtGrounds for Quashing 482 CrPC High Court
Grounds for Quashing 482 CrPC High Court
 
REVIVING OUR STAR GOD IMAGES FROM MARRYING OUR 4 HOLY LAWS OF STAR GODS
REVIVING OUR STAR GOD IMAGES FROM MARRYING OUR 4 HOLY LAWS OF STAR GODSREVIVING OUR STAR GOD IMAGES FROM MARRYING OUR 4 HOLY LAWS OF STAR GODS
REVIVING OUR STAR GOD IMAGES FROM MARRYING OUR 4 HOLY LAWS OF STAR GODS
 

Featured

How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...DevGAMM Conference
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationErica Santiago
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellSaba Software
 
Introduction to C Programming Language
Introduction to C Programming LanguageIntroduction to C Programming Language
Introduction to C Programming LanguageSimplilearn
 

Featured (20)

How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
 
Introduction to C Programming Language
Introduction to C Programming LanguageIntroduction to C Programming Language
Introduction to C Programming Language
 

How to stay safe from not petya ransomware

  • 1. How To Stay Safe From NotPetya Ransomware
  • 2. 20 months have passed since the brutal NotPetya attacked businesses around the globe, resulting in a dramatic loss of income and intense business disruption. Many cyber law consultants are still assisting organisations to recover their infected systems. It is essential to have proper knowledge about NotPetya to stay safe. Let’s learn about this ransomware in detail. What is NotPetya? NotPetya is a close relative of malware kind Petya which successfully infected thousands of computers in 2017 across the globe. Cyberlaw consultants discovered that NotPetya has some potential tools to help it spread and infect computers. Petya Virus was typical ransomware that attempted to make some quick Bitcoin from its victims. However, NotPetya was identified as a state-sponsored Russian cyber-attack masquerading as ransomware. It is well–designed and has automated lateral movement. Due to such well-built quality, its spreading mechanism which is far better than WannaCry makes it even more lethal. How NotPetya works? NotPetya has two sophisticated protection methodologies: a false Microsoft signature and XOR encrypted shellcode payload, both good enough to fool antiviruses and evade signatures check. Moreover, it takes advantage of three different vulnerabilities for its proliferation:
  • 3. PsExec The latest version of Petya abuses the PsExec tool for executing malicious code on other computers to spread the infection. Passwords collection It extracts passwords from memory or the local filesystem or the databases and moves them to other systems. EternalBlue Even if the operating system releases a security patch to prevent attacks like WannaCry, negligence of most institutions has allowed NotPetya to infect other systems by injecting malicious code into their code or database. Disguised as common ransomware, remastered Petya spreads via email, but it also tracks and alternates through all means possible to capture the opportunities to cause the infection. Therefore, cyber law consultants suggest that it is essential to be cautious and avoid vulnerabilities to prevent another outbreak. How to protect your company from NotPetya? • Employ vulnerability assessment management tools to your networks, and stay updated with the security patches. It is strongly recommended to acquire your licenses of the products, as they always update their databases on signatures and vulnerabilities to give extra protection to your networks.
  • 4. • Integrate real-time monitoring tools which provide file integrity monitoring, forensic analysis and corresponding modules; which help you to identify the files which suffer unauthorised modifications in real time. Such tools also raise alerts on ransomware attacks and help you solve them before it infects other devices within your networks. • Add an extra layer of protection to your network with endpoint security tools with intelligent software that catches early infections by raising security alarms when malicious code attempts to take control of your systems. • Always backup your data regularly as you never know when, where or how the ransomware strikes. • Instruct your employees to take part in workshops for cybersecurity, and be particularly persistent on the application of good practices in digital security. It is the best practice that prevents your company from being hit by a ransomware attack. Contact cyber law consultants who can assist you during such massive cyber attacks, and also walk you through the entire process of managing the vulnerability assessment cycle.