It seems that hearing about another global, large-scale ransomware attack is becoming all too common.  The latest, which goes by several different names, including Petya, PetrWrap, NotPetya, or GoldenEye, has already said to be “more vicious than WannaCry,” (http://www.zdnet.com/article/petya-more-vicious-than-wannacry-but-singapore-impact-still-uncertain/), which occurred less than six weeks ago.

SingCERT (Singapore Computer Emergency Response Team) has recently released an advisory stating that Petya, though inspired by WannaCry, was “more dangerous and intrusive”. SingCERT states that the ransom spreads via email masquerading in Microsoft Office documents.

At this time, “Global organisations reportedly affected by the ransomware included the National Bank of Ukraine, British advertising agency WPP, Danish transport company Maersk, and US pharmaceutical company Merck.” (http://www.zdnet.com/article/petya-more-vicious-than-wannacry-but-singapore-impact-still-uncertain/). Mondelez (MDLZ), the company that owns Oreos, Cadbury and many other global snack brands, reported a computer outage across its global operations. And law firm DLA Piper said it had taken down its systems in response to “a serious global cyber incident.” (http://money.cnn.com/2017/06/27/technology/hacking-petya-europe-ukraine-wpp-rosneft/index.html?iid=EL) Many more companies, not yet reported, many soon fall under the umbrella of those effected by this vicious attack.

So, why are these attacks becoming so common? The ransomware starts with an infected file sent to customers, then quickly spreads to other computers on the company’s network by leveraging software holes. The ransomware infects and locks the computer, demanding a ransom ($300 in bitcoin) to be paid.  Experts advise companies to not pay the ransom, stating that this action only encourages the attackers.

The best defense is a great offense. You need to ensure your files are protected BEFORE the attack occurs. This is why using EZProtect, by Adaptus, is so important. Contact us today to learn more.

Schedule-demo-button_cropped

 

 

 

 

Read the full story below:

New ‘Patya’ Ransomeware Attack Spreads: What to Do

euroransomware

 

 

 

 

 

 

First posted on tomsguide.com

By Paul Wagenseil, June 27, 2017

Photo credit: Bacho/Shutterstock

Less than six weeks after the massive WannaCry attack, a second Windows ransomware worm made its way around the planet today (June 27).

The ransomware, which we’ll call Petya at the risk of being technically incorrect, may be “the worst worm ever seen,” according to one expert. There was evidence that it was tied to tax-collection software that the Ukrainian government requires be installed on every workplace computer in the country. Even the radiation monitors at the ruined Chernobyl nuclear power plant were said to be affected.

While Petya itself appears to be quite sophisticated, its ransom-collection system is primitive, leading some security experts to speculate that Petya may be part of a state-sponsored cyberattack on Ukraine. However, an Israeli security researcher based in Boston may have found a way to stop Petya from spreading.

How to Protect Yourself

If you’re a home user, make sure your Windows computers have installed at least the April 2017 Windows Update security-patch bundle from Microsoft. If you’re not sure, go to Control Panel (Windows 7) or Windows Settings (Windows 8, 8.1 or 10), open Windows Update or Updates and Security, and check for recent patches.

Updating the machine fully will provide some degree of protection against today’s ransomware worm, which we’ll call Petya at the risk of being technically incorrect.

You should also run antivirus software. As of 5:30 pm ET, 39 different antivirus brands detected the ransomware, including Avira, Bitdefender, ESET, Kaspersky, McAfee, Panda, Symantec/Norton and Trend Micro.

However, you should not use a personal Windows machine to connect to a corporate or enterprise network using a virtual private network (VPN) — at least not today. That’s because the Windows patches won’t entirely protect machines on enterprise networks, where even patched machines are being infected.

If the malware gets onto a single machine in an enterprise network, it scans the machine for Windows administrative usernames and passwords. It then uses two Windows administration tools, called PSEXEC and WMC, to infect all the machines it can — which will include many home machines connected to the enterprise server via VPN.

Late Tuesday, Israeli researcher Amit Serper with the Boston-based company Cyberreason said that he might have found a “kill switch” within Petya’s code.

“I found a way to stop the malware,” Serper tweeted. “Create a file in c:windows called perfc with no extension and #petya #Nopetya won’t run!”

Other experts responding to his tweet confirmed that his method seemed to work.

Whatever you do, don’t pay the ransom — it probably won’t do any good. The ransom note instructs victims to email “wowsmith123456@posteo.net” to obtain the decryption key. But Posteo, an email provider based in Berlin, said it had suspended that address, cutting off communications between the malware operator and his or her victims.

A specter is haunting Europe

One of the first indications of the ransomware worm came from Ukraine, where one of the country’s deputy prime minsters posted a photo of a computer screen bearing a DOS screen stating that the computer was reformatting its hard drive.

The fake 'repair' screen victims will see as the ransomware begins encrypting. Credit: Avira

The fake ‘repair’ screen victims will see as the ransomware begins encrypting. Credit: Avira

Commenters on Twitter quickly noted that the screen appeared to belong a new form of the Petya ransomware. Romanian antivirus firm Bitdefender identified the new malware as “an almost identical clone of the GoldenEye ransomware family,” which in itself is a hybrid of Petya and another form of ransomware called Mischa. (Kaspersky Lab says that the worm may not be related to Petya at all.)

Most of the initial reports came in from Europe. The Danish shipping line Maersk, the British advertising giant WPP and the Anglo-American law firm DLA Piper confirmed that their internal networks had been infected. The Russian energy company Rosneft also said it had been hit. Other reports came in from Germany, France, India, the Netherlands, Poland and Spain.

Pharmaceutical giant Merck, based in Kenilworth, New Jersey, not to be confused with the German company of the same name, confirmed on Twitter that it was compromised, making it one of the largest affected companies in the United States.

One photo on Twitter, posted by Dutch malware researcher Yonathan Klijnsma, showed all the checkout-terminal screens at a supermarket in an Eastern European country displaying the malware’s ransom note.

The ransom note victims see after encryption is completed. Credit: Avira

The ransomware note asked victims to pay $300 in bitcoin to a specific Bitcoin address. (That may indicate that the ransomware authors are newbies, as many sophisticated ransomware variants use a separate Bitcoin address for each victim.) As of about 5:30 pm Eastern time, the address had received about $8,000 in payments.

The earliest payment was made at 8:49 am Eastern time. That payer and most other shelled out between 0.12 and 0.13 bitcoins, just about $300. But one clearly angry victim paid 0.0000666 bitcoins, about 16 U.S. cents, from the nonstandard address “1F[***]YouRJBmXYF29J7dp4mJdKyLyaWXW6”.

Petya ransomware is especially damaging, as it encrypts not only certain user files, but also the computer’s file table and Master Boot Record. The victim will not be able to restart his or her computer.

How Petya spreads

The ransomware, which may be a variant of the Petya/Mischa/Petrwrap/GoldenEye ransomware family, seemed to be using the ETERNALBLUE networking exploit developed by the NSA several years ago, then stolen and posted online several months ago. WannaCry also used ETERNALBLUE, but WannaCry was clumsily made; this variant of Petya (which some researchers insist is not related to the original Petya at all) was crafted by more skilled hands.

“#WannaCry was the warning shot,” tweeted a security researcher using the pseudonym zerosum0x0. “#Petya #NotPetya is the real deal by someone who knows what they’re doing. Probably worst worm ever seen.”

Petya also uses the two aforementioned Windows administrative tools, called PSEXEC and WMC. Some reports indicated that a second Windows flaw that affected Office files was being used to infect networks via phishing emails. That flaw was patched with Microsoft’s April 2017 round of updates, but other reports attributed that attack to an entirely different strain of ransomware.

One theory was that infected Office files were being spread by phishing emails. However, Marcus Hutchins, the 22-year-old who single-handedly stopped the WannaCry attack, posited that the malware spread entirely within computer networks.

“All the current infection vectors I’ve seen would suggest the malware only spreads within an already infected network, therefore contained,” Hutchins tweeted.

So how did it get on so many machines? One clue was that all the original infected machines seemed to be running a piece of financial tracking software called MEDoc that is mandatory on all workplace computers in Ukraine, perhaps to combat tax evasion.

Petya “explicitly targets a Ukrainian software package, mandated by Ukrainian government,” tweeted British malware expert Kevin Beaumont. Kaspersky Lab thinks that the malware might have come in the form of a fake MEDoc software update.

The MEDoc company itself gave conflicting statements about the situation. It first posted a message in Ukrainian stating “Our server made a virus attack. We apologize for the inconvenience!” (according to Google Translate), then took that down. A subsequent post on the company’s Facebook page denied that it was the source of the infection.

The Petya worm could have traveled along corporate networks from Ukrainian subsidiaries to enterprise servers in other countries, some experts hypothesized.

However, other experts pointed out that there were still enough computers globally that had not patched against ETERNALBLUE, or closed the pathways that that exploit travels, to explain Petya’s spread.

From Russia with love

The fact that Petya seemed to target specifically Ukrainian software, and that the software seemed to be well made while the payment structure was not, got information-security researchers on Twitter thinking.

“[There’s a] development disparity between infection and spread vectors and the payment pipeline … the targeting and initial entry points for UA … No f[***]ing way this is criminals,” tweeted the pseudonymous zero-day broker and security expert The Grugq.

Ukraine’s big enemy is, of course, Russia.  The country is fighting a low-level civil war with Russian-backed separatists, has had one of its richest provinces annexed by Russia at gunpoint, and has been the targets of sophisticated cyberattacks in the past, most recently with malware that knocked out several power plants.

Paul Wagenseil, June 27, 2017 for www.tomsguide.com

Photo credit: Bacho/Shutterstock

What You Can Do

  • Immediately, install a FREE 30-day Trial of EZProtect Antivirus and connect it to your Salesforce org(s) to start scanning files, document uploads, or chatter for viruses or malicious content. Once this is complete, you will have a sense of how many files your organization scans per month and you will be well poised to convert to a paid plan.
  • You may also download the full brochure with FAQs and schedule a demo to better understand how the tool works inside and outside of Salesforce by visiting www.adaptus.com/portfolio/ezprotect/.

Or call 800-955-0573 to request a demo

Schedule-demo-button_cropped

 


EZAssign Version 1.31 Pre-Release for Customers Attending Dreamforce this week? Look for EZAssign and EZProtect in the Developer Lounges!