• According to Symantec, Petya’s point of insertion into a system is via MEDoc, a tax and accounting software system primarily used in the Ukraine.
  • Variants of Petya were first seen in March 2016, which propagated via infected e-mail attachments. In June 2017, a new variant of Petya was used for a global...
  • Virus Petya - a simulator of the system administrator. ... If the virus comes to the scale of fullness 100%, then the computer is blocked virus "Petya"!
  • When I started the analysis (a few weeks ago), I didn’t know much about how Petya works, so this whole analysis is my own.
  • Bir muhasebe yazılımının güncellemesinin arkasına saklanarak salgını başlatan Petya veya NotPetya saldırısında dün Ukrayna, Rusya destekli bir siber saldırı...
  • A second SMB network exploit. Origin (NO PROOF): Petya was known to be RaaS (Ransomware-as-a-Service), selling on Tor hidden services.
  • In mid-2017, cybersecurity researchers discovered a novel variant of Petya imposing the same malicious techniques with an unflawed encryption scheme.
  • Ancak uzmanlar Petya’ nın ürettiği şifreyi kırabilmek için Petya üzerinde çalışmalar başlatmış ve geçtiğimiz günlerde çalışmalar başarı ile sonuçlanmıştır.
  • Upon execution, this threat overwrites the Master Boot Record (MBR) with Ransom:DOS/Petya.A, and encrypts system drive sectors.