Merck IT systems still crippled in Petya’s aftermath

Four days after its networks were infected, computer systems at pharmaceutical giant Merck is still hamstrung by the Petya ransomware. The company told its 70,000 employees on Tuesday to immediately cease all interactions with company networks, to refrain from turning on or rebooting any company computers or tablets, and to not use thumb drives. As company email was completely disabled, Merck supervisors disseminated instructions down the corporate ladder via copied and pasted text messages. The company did assure employees that human resource data had not been compromised. Petya is technically ransomware, as it encrypts users’ files and demands bitcoin to access them. But unlocking files with a purchasable key appears impossible, leading cybersecurity researchers to conclude that Petya was designed to be destructive, rather than a scheme to make money. Petya’s creators are unknown, but the fact that Ukrainian government systems and Ukrainian companies were among the first victims has […]

The post Merck IT systems still crippled in Petya’s aftermath appeared first on Cyberscoop.

Continue reading Merck IT systems still crippled in Petya’s aftermath

EternalPetya – yet another stolen piece in the package?

Since 27th June we’ve been investigating the outbreak of the new Petya-like malware armed with an infector similar to WannaCry. Since the day one, various contradicting theories started popping up. Some believed, that it is a rip-off the original Petya, others – that it is another step in its evolution. However, so far, those were just different opinions, and none of them was backed up with enough evidence. In this post, we will try to fill this gap, by making a step-by-step comparison of the current kernel and the one on which it is based (Goldeneye Petya).

Categories:

Tags:

(Read more…)

The post EternalPetya – yet another stolen piece in the package? appeared first on Malwarebytes Labs.

Continue reading EternalPetya – yet another stolen piece in the package?

June 28, 2017 – Hack Naked News #131

DoD networks have been compromised, the Shadow Brokers continue their exploits, a Pennsylvania healthcare system gets hit with Petya, and more. Jason Wood of Paladin Security joins us to discuss nations’ offensive technical strengths and defensive weaknesses on this episode of Hack Naked News! Doug’s Stories: http://thehackernews.com/2017/06/shadowbrokers-nsa-hacker.html — Shadowbrokers continue their exploits by planning to dox […]

The post June 28, 2017 – Hack Naked News #131 appeared first on Security Weekly.

Continue reading June 28, 2017 – Hack Naked News #131

A ‘Wiper’ in Ransomware Clothing: Global Attacks Intended for Destruction Versus Financial Gain

Further analysis of impacted Petya ransomware victims led our team to conclude that this attack was specifically aimed at organizations within Ukraine.

The post A ‘Wiper’ in Ransomware Clothing: Global Attacks Intended for Destruction Versus Financial Gain appeared first on Security Intelligence.

Continue reading A ‘Wiper’ in Ransomware Clothing: Global Attacks Intended for Destruction Versus Financial Gain

NotPetya attacker can’t provide decryption keys, researchers warn

While defenders and security researchers are sifting artefacts that could help prevent new NotPetya ransomware attacks and perhaps point to the identity of the attacker, the victims are trying to recover their systems. Judging by the Bitcoin wallet to which ransom payments are to be made, some 45 organizations have attempted to go that route. As I’m writing this, the wallet holds nearly 4 Bitcoin (around $10,200). But it’s very doubtful that those that chose … More Continue reading NotPetya attacker can’t provide decryption keys, researchers warn