Home Desktop Petya and Weaponized Malware: Is Ransomware the New DDoS Attack?

Petya and Weaponized Malware: Is Ransomware the New DDoS Attack?

Petya and Weaponized Malware: Is Ransomware the New DDoS Attack?

Yesterday, Ivanti hosted a webinar focused on the latest global ransomware attack based on “Petya” malware. The featured speakers were Chris Goettl, Manager of Product Management for Security, and Phil Richards, Chief Security Officer at Ivanti. Amber Boehm, Manager of Product Marketing, moderated and fielded questions. Herewith, some key takeaways from the webinar.

How this Petya attack got started

In Ukraine, where the latest Petya attack has been most severe, there are only two companies through which other companies can file their taxes. Attackers were able to load malware into an update issued by M.E.Doc, one of those two tax-filing companies. This was likely the “opening salvo” of the current Petya attack, Chris Goettl said.

How the attack spread

Like the original Petya attack, the latest version encrypts the Windows Master Boot Record (MBR). It then schedules a reboot of the infected system, instead of rebooting immediately, after which system files are encrypted. The delayed reboot gives the attackers time to use that system as a “launch pad” to reach out to other connected systems.

Read the entire article here, Petya and Weaponized Malware: Is Ransomware the New DDoS Attack?

via the fine folks at Ivanti.

Ivanti Ivanti is IT evolved. By integrating and automating critical IT tasks, Ivanti is modernizing IT and helping IT organizations successfully automate and secure the digital workplace. Ivanti is headquartered in Salt Lake City, Utah, and has offices all over the world. For more information, visit www.ivanti.com.

Featured Resources:

Related Articles:


White Papers

    Application Lifecycle Management with Stratusphere UX – White Paper

    Enterprises today are faced with many challenges, and among those at the top of the list is the struggle surrounding the design, deployment, management and operations that support desktop applications. The demand for applications is increasing at an exponential rate, and organizations are being forced to consider platforms beyond physical, virtual and cloud-based environments. Users […]


      Download Commvault VM Backup and Recovery: end-to-end VM backup, recovery and cloud management

      Commvault’s ability to provide end-to-end VM backup, recovery and cloud management creates a significantly better way to build, protect and optimize VMs throughout their lifecycle. Our best-in-class software for VM backup, recovery and cloud management delivers a number of significant benefits, including: VM recovery with live recovery options; backup to and in the cloud; custom-fit […]

      On-Demand Webinars

        What’s Going on in EUC Printing – A Technical Deep Dive!

        The IGEL Community and ThinPrint invite you to watch the following technical deep dive webinar. The agenda is to technically bring you up to speed on what’s going on in the EUC Printing space today along with a deep dive into new methods, technologies, printing scenarios and a discussion on why printing still matters. You […]

        Latest Videos

          Views All IT News on DABCC.com
          Views All IT Videos on DABCC.com
          Win big $$, visit ITBaller.com for more info!

          Visit Our Sponsors