Overcoming Petya

It’s time to get serious about ransomware and cyber security.

Petya, a malicious ransomware strain, was found just two weeks after the WannaCry ransomware attack that infected critical machines around the world. The ransomware originated in the Ukraine and started as a ransomware software application that delivered attacks at large scale. Most attacks have been focused around the Ukrainian government and information infrastructures, but quickly spread throughout Eastern Europe and its many industries. However, unlike WannaCry, Petya works to deleting master boot records (MBR) and encrypting the master file table (MFT), effectively making all files on the hard drive unrecoverable.

Reinforcing the cybersecurity of an organization’s information technology is critical to mitigate and protect against massive future cyberattacks like Petya and WannaCry. Research by Armor forecasts a continued growth in ransomware and similar attacks, because of their effectiveness in reaching large targets. Learn more about the Petya and attacks and what your organization can do to better protect your data with our, “Overcoming Petya” webinar.

Join us on Wednesday, Jan. 29th at 1 p.m. EST/ 12 p.m. CST for our webinar on the Evolution of Hackers. VP of Security, Raf Los, and Sr Writer & Researcher, Mike Mayes, will discuss the evolution in defender strategies. https://www.armor.com/webinars/superheroes-villains-the-evolution-of-hackers/

A hacker has released the Telenet credentials of over 515,000 computer devices. He claims to have obtained the credentials by scanning the internet for exposed ports. @zdnet @campuscodi #cybersecurity #iot #cloudsecurity

Malicious executable with a deceptive code signing certificate makes the malware look like a normal program produced and signed by a legitimate software company.


Load More...
Follow Armor On Twitter