• Latest
  • All
  • How To
“Petya” Virus Probably a Cyber Attack Against Ukraine and Not Ransomware

“Petya” Virus Probably a Cyber Attack Against Ukraine and Not Ransomware

June 29, 2017
Kenya cyber threats 2025

Kenya Detects Over 2.5 Billion Cyber Threats in Three Months

June 30, 2025
Which ISP is best in Kenya

Kenya’s Best ISP: Faiba Claims the Crown for Fastest Internet

June 30, 2025
Cars in port awaiting clearing

Relief for Kenyans as Court Blocks KRA Tax Increase for Imported Cars

June 30, 2025
kenya nil returns process

KRA Extends Tax Return Deadline After iTax System Crashes

June 30, 2025
DHgate Tablet Cases deals
the process of setting up an Internet service provider (ISP) in Kenya

Airtel Rises While Safaricom Drops in Network Quality Scores

June 30, 2025
google gmail

Google Rolls Out AI Cleanup Tool on Web for Messy Gmail Inboxes

June 30, 2025
KRA's eTIMS System Targets Fuel Tax Cheats

Fuel Stations Must Now Link to KRA’s eTIMS or Risk Penalties

June 30, 2025
Facebook

New Facebook AI Tool Can Access Private Images on Your Phone

June 30, 2025
Windows 11 25H2

Microsoft Confirms Windows 11 25H2 As the Next Big Upgrade

June 30, 2025
Infinix Hot 60i

Infinix Quietly Launches the Hot 60i in Bangladesh

June 29, 2025
Counterfeit Products Infiltrate Kenya's Online Market

Counterfeit Goods Flood Kenyan Online Shops Like Jumia and Facebook

June 29, 2025
Top 5 Platforms to Sell Bitcoin for Cash Without Stress

Top 5 Platforms to Sell Bitcoin for Cash Without Stress

June 30, 2025
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
  • News
  • Entertainment
  • Reviews
  • Features
  • Editorial
No Result
View All Result
Techweez | Tech News, Reviews, Deals, Tips and How To
No Result
View All Result

“Petya” Virus Probably a Cyber Attack Against Ukraine and Not Ransomware

Saruni Maina by Saruni Maina
June 29, 2017
in News
Reading Time: 2 mins read
258
0

Following the spread of the initially thought to be ransomware, Petya, security analysts have a theory that Petya might not be a virus after all but a cyber attack against Ukraine.

According to a report by Kaspersky, The virus appeared to primarily target Ukraine, paralyzing major infrastructures in the country, including; the country’s central bank, the state telco, an airport and one electricity supplier.

The latest on today's #ransomware outbreak includes #YARA rules. https://t.co/23wVF8OmUc @kaspersky #petya #notpetya pic.twitter.com/Ryc9GO0Cia

— Securelist (@Securelist) June 27, 2017

Those who were unfortunate to get infected by Petya, were required to pay $300 as ransom to have all their files back. However, it was revealed that there was no way of actually getting your files back, even after paying the ransom. This led to security analysts diving deeper into the Petya code to try and understand what was going on.

Matt Suiche, founder of the cybersecurity firm Comae, found that after analyzing the virus, his team determined that it was a “wiper,” not ransomware. Matt claims that the current version of Petya got rewritten to be a wiper and not a actual ransomware. “We noticed that the current implemented that massively infected multiple entities Ukraine was in fact a wiper which just trashed the 25 first sector blocks of the disk,” wrote Matt in a blog post.

This means that Petya  or “NotPetya”, was modified to completely wipe a disk a opposed to encrypting it and demanding for ransom.

To support this claim, it was revealed that the payment email address that had been given to send payments, was no longer active.

Victims keep sending money to Petya, but will not get their files back: No way to contact the attackers, as their email address was killed. pic.twitter.com/68vxThNIPM

— @mikko (@mikko) June 28, 2017

Kaspersky also supports the claims that Petya is actually a wiper and not ransomware:

The latest from @kaspersky researchers on #Petya: it’s actually #NotPetya pic.twitter.com/uTVBUul8Yt

— Kaspersky (@kaspersky) June 27, 2017

Matt believes that the Petya’s disguise as a ransomware virus was meant to control the media narrative to make it look like some hacker group was behind the attack with the aim of making money as opposed to a “Cyber attack” against a nation.

The Verge points out that evidence shows that the perpetrator could actually be Russia. “The broader political context makes Russia a viable suspect. Russia has been engaged in active military interventions in Ukraine since former president Viktor Yanukovych was removed from power in 2014.” The Verge goes ahead to mention that there could be a link between the Petya attack and Ukrainian colonel Maksim Shapoval being killed in a car bomb on the exact same day the virus sprouted.

However, there’s a group of people who particularly believe that Petya nothing more than a ransomware, citing that claims that Petya destroys Windows Master Boot Record (MBR) – a boot sector on your hard disk) that holds information about the partitions of your hard drive and acts as a loader for the operating system – are false since Windows has about 2048 free sectors and thus the deleted 24 sectors are actually empty, thus making it possible to reverse the encryption process.

https://twitter.com/MalwareTechBlog/status/880170234497380352

Outside Ukraine, a number of huge corporates have publicly announced that their systems have been infected. Such corporates include FedEx Dutch, Maersk and WPP Marketing Agency in London. Closer home, there have been reports that the virus has hit some companies in South Africa.

Tags: Cyber Attacks
SendShare146Tweet92
Saruni Maina

Saruni Maina

I Google Bing until it Yahoos! | Email: [email protected]

Related Posts

Kenya cyber threats 2025

Kenya Detects Over 2.5 Billion Cyber Threats in Three Months

June 30, 2025
Iran cyberattacks

Cyber Attacks Soar After US Airstrikes on Iran Sites

June 27, 2025
NSSF Hacking Claims Disputed: Fund Says No Member Data Compromised

NSSF Denies Allegations of Massive 2.5TB Data Breach

May 21, 2025
Web DDOS Tsunami Attack

Web DDoS Tsunamis Are the Next Big Cyber Threat to Organizations

April 25, 2025
Paris Olympics on High Alert: Cyberattacks, Disinformation, and Sabotage Threaten Games

Paris Olympics Strategy as Cyberattacks, Disinformation, and Fiber Cuts Threaten Games

July 30, 2024
2024 Cyber Attack Report

2024 Cyber Attacks Report Reveals Africa Was the Hardest Hit Region

July 25, 2024

Latest

Kenya cyber threats 2025

Kenya Detects Over 2.5 Billion Cyber Threats in Three Months

June 30, 2025
Which ISP is best in Kenya

Kenya’s Best ISP: Faiba Claims the Crown for Fastest Internet

June 30, 2025
Cars in port awaiting clearing

Relief for Kenyans as Court Blocks KRA Tax Increase for Imported Cars

June 30, 2025
kenya nil returns process

KRA Extends Tax Return Deadline After iTax System Crashes

June 30, 2025
the process of setting up an Internet service provider (ISP) in Kenya

Airtel Rises While Safaricom Drops in Network Quality Scores

June 30, 2025
google gmail

Google Rolls Out AI Cleanup Tool on Web for Messy Gmail Inboxes

June 30, 2025

Best devices

budget smartwatches 2025

Best Budget Smartwatches To Buy in Kenya 2025

February 13, 2025

Best Infinix Smartphones To Buy in Kenya 2024

February 13, 2025

Best Laptops for Battery Life in 2024

August 21, 2024

Best “Battery Warrior” Smartphones To Buy in 2024

August 22, 2024

Kenya Detects Over 2.5 Billion Cyber Threats in Three Months

June 30, 2025

Kenya’s Best ISP: Faiba Claims the Crown for Fastest Internet

June 30, 2025

Techweez is a fast growing influential source of technology news, reviews and analysis by leading tech geeks in the industry.

Follow Us

Editorials

Abductions and Arrests! Kenyan Government’s Fear and Hate of X Users Makes No Sense

Actors and Film Crews Are Worried About Veo 3 Taking Their Jobs

Samsung QLED TVs Now Officially Certified for Real Quantum Dot Technology

Trump’s Tariffs Will Be the End of Affordable Tech

5 Ways to Prep Your Tech for Resale

The Weaponization of PDFs: How Cybercriminals Are Exploiting a Trusted Format

More News

Fuel Stations Must Now Link to KRA’s eTIMS or Risk Penalties

New Facebook AI Tool Can Access Private Images on Your Phone

Microsoft Confirms Windows 11 25H2 As the Next Big Upgrade

Infinix Quietly Launches the Hot 60i in Bangladesh

Counterfeit Goods Flood Kenyan Online Shops Like Jumia and Facebook

Top 5 Platforms to Sell Bitcoin for Cash Without Stress

  • Terms Of Use
  • Techweez Brand
  • Privacy & Policy
  • Contact Us

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!

Hey there! Just a heads-up: we're big fans of cookies - both the digital and edible kind! 🍪 We use our cookies and some from third parties to ensure your browsing experience on our site is smooth sailing and secure.

 

But wait, there's more! We also use cookies to gather stats and insights on how you navigate our site. It's like getting a behind-the-scenes peek at your digital adventures!

 

Don't worry, you're in control. You can adjust your cookie settings anytime to suit your preferences. Feeling curious? Dive into our Privacy Policy for all the juicy details. Happy browsing! 🚀

Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
Techweez | Tech News, Reviews, Deals, Tips and How To
Crunchy Cookies 🍪 Ahead!
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
Listen, this legal stuff is about as exciting as watching paint dry. But it basically says we only use your stuff for what you asked us to do, and nobody else gets to peek!
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
It's those sneaky cookie crumbs websites leave behind to count visitors, like counting ants at a picnic! Totally harmless, just for fun facts. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
Hey there! Just letting you know we use some fancy gizmos to remember your preferences. This way, we can show you ads that are, well, not completely bananas.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
Make cookies
{title} {title} {title}
No Result
View All Result
  • News
  • Reviews
  • Features
  • Editorial
  • Automotive
  • Entertainment

© 2024 Techweez - Palahala Media Group may earn a commission when you buy through links on our sites.
A Palahala Media Group Brand. All rights reserved.
.