• According to Symantec, Petya’s point of insertion into a system is via MEDoc, a tax and accounting software system primarily used in the Ukraine.
  • Variants of Petya were first seen in March 2016, which propagated via infected e-mail attachments. In June 2017, a new variant of Petya was used for a global...
  • A thorough analysis and any updates will be posted as new information is discovered. Petya / NotPetya Tools, Techniques, and Procedures (TTPs).
  • A second SMB network exploit. Origin (NO PROOF): Petya was known to be RaaS (Ransomware-as-a-Service), selling on Tor hidden services.
  • When I started the analysis (a few weeks ago), I didn’t know much about how Petya works, so this whole analysis is my own.
  • Upon execution, this threat overwrites the Master Boot Record (MBR) with Ransom:DOS/Petya.A, and encrypts system drive sectors.
  • Virus Petya - a simulator of the system administrator. ... If the virus comes to the scale of fullness 100%, then the computer is blocked virus "Petya"!
  • Dünya’nın dört bir yanına hızla yayılan Petya, Mayıs ayında ortaya çıkan WannaCry fidye virüsü gibi EternalBlue exploitini kullandığını görmekteyiz.
  • Bir muhasebe yazılımının güncellemesinin arkasına saklanarak salgını başlatan Petya veya NotPetya saldırısında dün Ukrayna, Rusya destekli bir siber saldırı...