- gdatasoftware.com blog/2016/03/28226-ransomware-…Ransomware Petya - a technical review In March 24, researchers at G DATA received a...
- gzt.com jurnalist/microsoft-acikladi-petya-…Dev yazılım şirketi, Petya konusunda özel çalışmalar gerçekleştirildiğini ve zararlı yaz ılımla ilgili birçok farklı detaya erişildiğini ifade ediyor.
- csoonline.com article/563255/petya-ransomware-and…Both Petya and NotPetya aim to encrypt the hard drive of infected computers, and there are enough common features between the two that NotPetya was...
- microsoft.com en-us/security/blog/2018/02/05/…The supply chain approach taken by Petya requires a well-funded adversary with a high level of investment into attack skills/capability.
- mcafee.com enterprise/ru-ru/security-awareness/…Most importantly, always apply system and application updates whenever they are available, as Petya—and attacks like it—rely on unpatched vulnerabilities...
- virusler.info.tr petya-fidye-virusu/Ukrayna Bakanlar Kurulu üyeleri bilgisayarlarının Petya fidye virüsü ile kontrol altına alındığına dair tweet atmaya başladılar.
- journo.com.tr petya-fidye-yazilimlariSon günlerde yayılan çeşitlerinden Wannacry ve Petya virüsleri, şirket ve açık alanlarda kullanılan internet ağlarıyla yayılıyor.
- blog.pcrisk.com viruses/9919-petya-ransomwareTo use this tool (created by leostone) you should disconnect the hard drive containing files encrypted by Petya ransomware and connect it to another computer.
- kaspersky.co.uk blog/petya-ransomware/6956/The only difference from other ransomware is that Petya is completely offline, which is no surprise since it had ‘eaten’ the operating system.