• Ransomware Petya - a technical review In March 24, researchers at G DATA received a...
  • Dev yazılım şirketi, Petya konusunda özel çalışmalar gerçekleştirildiğini ve zararlı yaz ılımla ilgili birçok farklı detaya erişildiğini ifade ediyor.
  • Both Petya and NotPetya aim to encrypt the hard drive of infected computers, and there are enough common features between the two that NotPetya was...
  • The supply chain approach taken by Petya requires a well-funded adversary with a high level of investment into attack skills/capability.
  • Most importantly, always apply system and application updates whenever they are available, as Petya—and attacks like it—rely on unpatched vulnerabilities...
  • Ukrayna Bakanlar Kurulu üyeleri bilgisayarlarının Petya fidye virüsü ile kontrol altına alındığına dair tweet atmaya başladılar.
  • Son günlerde yayılan çeşitlerinden Wannacry ve Petya virüsleri, şirket ve açık alanlarda kullanılan internet ağlarıyla yayılıyor.
  • To use this tool (created by leostone) you should disconnect the hard drive containing files encrypted by Petya ransomware and connect it to another computer.
  • The only difference from other ransomware is that Petya is completely offline, which is no surprise since it had ‘eaten’ the operating system.