- youtube.com watch181 bin görüntülemeYayınlandı18 Eki 2016
- medium.com speaking-about-healthcare-technology/…According to Symantec, Petya’s point of insertion into a system is via MEDoc, a tax and accounting software system primarily used in the Ukraine.
- en.m.wikipedia.org Petya (malware family)Variants of Petya were first seen in March 2016, which propagated via infected e-mail attachments. In June 2017, a new variant of Petya was used for a global...
- logrhythm.com blog/detecting-petya-notpetya-…A thorough analysis and any updates will be posted as new information is discovered. Petya / NotPetya Tools, Techniques, and Procedures (TTPs).
- gist.github.com vulnersCom/…A second SMB network exploit. Origin (NO PROOF): Petya was known to be RaaS (Ransomware-as-a-Service), selling on Tor hidden services.
- idafchev.github.io writeup/2017/07/21/petya_…When I started the analysis (a few weeks ago), I didn’t know much about how Petya works, so this whole analysis is my own.
- microsoft.com en-us/wdsi/threats/malware-…Upon execution, this threat overwrites the Master Boot Record (MBR) with Ransom:DOS/Petya.A, and encrypts system drive sectors.
- store.steampowered.com app/796130/Virus_Petya/Virus Petya - a simulator of the system administrator. ... If the virus comes to the scale of fullness 100%, then the computer is blocked virus "Petya"!
- shiftdelete.net petya-virusu-durdurulamiyor-83136Dünya’nın dört bir yanına hızla yayılan Petya, Mayıs ayında ortaya çıkan WannaCry fidye virüsü gibi EternalBlue exploitini kullandığını görmekteyiz.
- haberturk.com ekonomi/teknoloji/haber/1544235-…Bir muhasebe yazılımının güncellemesinin arkasına saklanarak salgını başlatan Petya veya NotPetya saldırısında dün Ukrayna, Rusya destekli bir siber saldırı...