Posted On June 28, 2017 By Brendan Griffin In Internet Security Awareness, Malware Analysis, Ransomware

The ransomware dubbed “Peyta”, a spin-off of WannaCry malware that plagues many European countries only one month ago, has sparked a global crisis yesterday encrypting hard drives and modifying the master boot record to not only lock users out of their files, but their machine more generally. Victims were then compelled to interact with this “stub” application to find instructions for paying the Bitcoin ransom, obtaining their decryption key, and inputting it to initiate the decryption process.

So far 65 countries have been effected, primarily in the Ukraine and Eastern Europe, but also inflicted harm to significant numbers of victims in Western Europe and North America, including the United States.

WannaCry started a new era of ransomware variants weaponized with a  mechanism for lateral movement. Petya authors went one step further by adding the WMI interface vector and we expect to see more variants in the coming months. This attack shows the importance of a multilayered security approach, and it highlights the gap that exists in applying security patches and securing internal systems (via network segmentation).

Our Recommendations

Perform a manual update of all Microsoft Updates
1. Click START
5. Download all updates available

Install the NEW Malwarebytes Professional 3.0 protection software.

This is a NEW version of the program that was released in June 2017. The Free version of the program does NOT contain the necessary RansomBlocker tools needed to block WannaCry, Petya or any other newly designed Ransom Malware. Only the NEW paid version of Malware Bytes will properly protect you. You can download the proper software using this direct link below.

Malwarebytes 3.0 is the next-gen security program that protects you from the most advanced (zero-day) threats, making antivirus obsolete.The new price for Malwarebytes 3.0 is $39.99/year for 1 PC.

Do NOT follow this link or you will be banned from the site!