• According to Symantec, Petya’s point of insertion into a system is via MEDoc, a tax and accounting software system primarily used in the Ukraine.
  • Petya is a family of encrypting malware that was first discovered in 2016. The malware targets Microsoft Windows–based systems...
  • Virus Petya - a simulator of the system administrator. ... If the virus comes to the scale of fullness 100%, then the computer is blocked virus "Petya"!
  • In mid-2017, cybersecurity researchers discovered a novel variant of Petya imposing the same malicious techniques with an unflawed encryption scheme.
  • When I started the analysis (a few weeks ago), I didn’t know much about how Petya works, so this whole analysis is my own.
  • Bir muhasebe yazılımının güncellemesinin arkasına saklanarak salgını başlatan Petya veya NotPetya saldırısında dün Ukrayna, Rusya destekli bir siber saldırı...
  • My Malware Collection From Internet "Dont Run In Real PC" - Malware-Collection-Part-2/Petya.exe at main · Zusyaku/Malware-Collection-Part-2.
  • Upon execution, this threat overwrites the Master Boot Record (MBR) with Ransom:DOS/Petya.A, and encrypts system drive sectors.
  • No such kill switch is known for Petya. Petya is more vicious than WannaCry. Petya uses the same exploit that WannaCry used to wreak havoc on systems.