• According to Symantec, Petya’s point of insertion into a system is via MEDoc, a tax and accounting software system primarily used in the Ukraine.
  • Variants of Petya were first seen in March 2016, which propagated via infected e-mail attachments. In June 2017, a new variant of Petya was used for a global...
  • In mid-2017, cybersecurity researchers discovered a novel variant of Petya imposing the same malicious techniques with an unflawed encryption scheme.
  • My Malware Collection From Internet "Dont Run In Real PC" - Malware-Collection-Part-2/Petya.exe at main · Zusyaku/Malware-Collection-Part-2.
  • Virus Petya - a simulator of the system administrator. ... If the virus comes to the scale of fullness 100%, then the computer is blocked virus "Petya"!
  • Part of Fx is shown below: petya_000. The AdjustTokenPrivileges function enables (or disables) access privileges. Malware uses it to gain additional permissions.
  • No such kill switch is known for Petya. Petya is more vicious than WannaCry. Petya uses the same exploit that WannaCry used to wreak havoc on systems.
  • Bir muhasebe yazılımının güncellemesinin arkasına saklanarak salgını başlatan Petya veya NotPetya saldırısında dün Ukrayna, Rusya destekli bir siber saldırı...
  • Upon execution, this threat overwrites the Master Boot Record (MBR) with Ransom:DOS/Petya.A, and encrypts system drive sectors.