Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

ABTV

// // //

Petya Ransomware Takes the World by Storm

The next massive ransomware shoe has dropped, and its name is Petya.

It's back. Six weeks after WannaCry delivered its payload of misery to millions of computer systems around the world, the gift that keeps on taking has returned. This time, Petya is the name, but theft and disruption remain the game in play.

There are a number of similarities between Petya and WannaCry and a few key differences. At its heart, Petya takes advantage of the same exploit used by WannaCry, a vulnerability in Microsoft Window's SMB service dubbed "eternalblue." Like WannaCry, Petya has begun to sweep through organizations on the backs of un-patched systems, rapidly spreading horizontally in an organization after gaining its initial foothold.

Unlike WannaCry, Petya began its march across the globe in Ukraine, striking the nation's central bank and Kiev's electric utility and international airport. Highlighting the indiscriminate nature of this kind of attack, radiation monitoring systems at Chernobyl were infected.


Get real-world answers to virtualization challenges from industry leaders. Join us for the NFV & Carrier SDN event in Denver. Register now for this exclusive opportunity to learn from and network with industry experts -- communications service providers get in free!

Like WannaCry, Petya is spreading rapidly across a number of countries. As of the time of this article, companies in Russia, Norway, the UK, the Netherlands and the US have reported infections. As with the earlier attack, the amount of ransom demanded is small -- $300 per system -- but the cost of isolating infected systems and remediating the damage will be much higher in virtually every instance.

Both WannaCry and Petya make use of an exploit contained in Wikileaks' Vault 7 release, meaning that both are widely assumed to have been discovered and developed by the NSA. A recent poll here at Security Now found that nearly 80% of community members thought that a second Vault 7 exploit would take place within six months of WannaCry. It now seems that the community members were prescient in looking forward.

As is the case with so many breaking news stories, Twitter has exploded with accounts of infection and information on both the outbreak and attempts to control the damage.

Security Now will remain on top of the story and will bring more information and analysis when it's available. In the meantime, if you are dealing with Petya we'd like to hear about your experience. Let us know in the comments below what's happening in your IT world. The only safe thing to say is that this one is not over, yet.

Related posts:

— Curtis Franklin is the editor of SecurityNow.com. Follow him on Twitter @kg4gwa.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The 10 Most Impactful Types of Vulnerabilities for Enterprises Today
Managing system vulnerabilities is one of the old est - and most frustrating - security challenges that enterprise defenders face. Every software application and hardware device ships with intrinsic flaws - flaws that, if critical enough, attackers can exploit from anywhere in the world. It's crucial that defenders take stock of what areas of the tech stack have the most emerging, and critical, vulnerabilities they must manage. It's not just zero day vulnerabilities. Consider that CISA's Known Exploited Vulnerabilities (KEV) catalog lists vulnerabilitlies in widely used applications that are "actively exploited," and most of them are flaws that were discovered several years ago and have been fixed. There are also emerging vulnerabilities in 5G networks, cloud infrastructure, Edge applications, and firmwares to consider.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2023-1172
PUBLISHED: 2023-03-17
The Bookly plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the full name value in versions up to, and including, 21.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that w...
CVE-2023-1469
PUBLISHED: 2023-03-17
The WP Express Checkout plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘pec_coupon[code]’ parameter in versions up to, and including, 2.2.8 due to insufficient input sanitization and output escaping. This makes it possible for authenti...
CVE-2023-1466
PUBLISHED: 2023-03-17
A vulnerability was found in SourceCodester Student Study Center Desk Management System 1.0. It has been rated as critical. This issue affects the function view_student of the file admin/?page=students/view_student. The manipulation of the argument id with the input 3' AND (SELECT 2100 FROM (SELECT(...
CVE-2023-1467
PUBLISHED: 2023-03-17
A vulnerability classified as critical has been found in SourceCodester Student Study Center Desk Management System 1.0. Affected is an unknown function of the file Master.php?f=delete_img of the component POST Parameter Handler. The manipulation of the argument path with the input C%3A%2Ffoo.txt le...
CVE-2023-1468
PUBLISHED: 2023-03-17
A vulnerability classified as critical was found in SourceCodester Student Study Center Desk Management System 1.0. Affected by this vulnerability is an unknown functionality of the file admin/?page=reports&date_from=2023-02-17&date_to=2023-03-17 of the component Report Handler. The manipula...