Petya: Latest Global Ransomware Attack
Petya: There is a vaccine, but no kill switch.
A supermarket in Kharkov, Ukraine was paralyzed because of ransomware attack, along with most of the Ukraine government.
While Ukraine was clearly the target, throwing suspicion on Russia, global companies like Merck were collateral damage because the virus spread from offices in Ukraine across global networks. By 2 pm EST on Tuesday, Merck had asked all of its employees to not connect to their network to avoid spreading the infection.
Security experts are puzzled as to why firms and major businesses are still being hit. Windows released the patch and failure to implement could mean that companies face legal risks.
To immunize an individual computer, security experts discovered that placing a read-only file named “perfc” on in the “C:\\Windows” folder, the virus is stopped. However, it doesn’t stop the computer from spreading it to other computers if it is on a network.
What should we learn from yet another global cyber attack?
Was this article helpful?
For more information about how Domain Computer Services can benefit you.
Hiring third-party vendors to provide services at an affordable rate has gained traction as a major trend among businesses, and exponentially so for businesses in need of IT support. Here’s the catch: “risk” is a pretty broad umbrella term, with no two vendors or regulators defining risk in the same way. To effectively create assessments for third-party vendors, let’s break “risk” down.
Updated: Nov 6, 2018 Our 12-month forecast on Cloud migration, backup and disaster recovery plans, and other agile technology movements making waves in your industry. Moving to the Cloud Multi-Factor Authentication Cloud computing has taken the business world by...
The most influential component of a successful cyber security program to ensure your business maintains regulatory compliance for EU GDPA, NYDFS and HIPAA are effective policies and procedures designed for your business. With our CISOaaS solution, you can rest assured that your cybersecurity situation not only meets, but exceeds expectations.