Security Blog

Protecting your systems from cyber attacks cyber security

Written by Vision Security Technologies | Jun 27, 2017 8:50:05 PM

What is Petya?

Petya is a new Ransomware variant currently propagating the Internet.  Protecting your systems from this and other cyber attacks is essential.

The ransomware outbreak is smaller than WannaCry, but the volume is considerable. This variant encrypts the Master File Tree of the Windows operating system and overwrites the boot record that shows the ransom note that prevents victims from booting their computer. Because of this, Petya is more dangerous and intrusive compared to other strains because it reboots systems and prevents them from working altogether. It is spread via email spam in the form of booby-trapped Office documents.

These documents use an Office RTF vulnerability to download and run the Petya installer, which then executes the SMB worm and spreads to new computers on the same network.

How can I protect my systems?

Even though taking the usual steps such as ensuring the latest patches and software updates are installed, you still need to educate your users on what to look for and what to do if they suspect they’ve been compromised.

Rick Burton, Vision Security Technologies’ Manager of Information Systems, continuously educates our team on how to identify these threats within our own organization. Here are some of his recommendations:

  • Be cautious of email attachments of all kinds. Treat all attachments with the UTMOST CAUTION. Even attachments on your phone can have the effect of harvesting company contacts that can trigger a spear phishing episode.
  • Do not open any unsolicited attachments, even from people you know. Remember, if there is a question, THERE IS NO QUESTION!
  • Keep software up to date. AV applications and patterns, Anti Exploit, Windows Updates including Security updates for Office applications.
  • Save and scan any attachments before opening them
  • Trust your instincts – If an email or email attachment seems suspicious, don’t open it, even if your anti-virus software indicates that the message is clean. Attackers are constantly releasing new viruses, and the anti-virus software might not have the signature.
  • Discuss any concerns with your Technology Departments. Communication is key!

 

Your protection is our priority and our goal is to create awareness about the dangers of this threat with these key points. We encourage you to do your research and further educate yourself and your organization on cyber attacks and protecting your systems from them!