Petya’s Ransomware Attacks Have Failed

As security and software vendors scramble to contain the spread of the Petya ransomware virus, analysts are speculating over what the attackers meant to accomplish by initiating the outbreak.

Ransomware is a money-making virus that encrypts the files on victims’ computers and locks them out until they pay out to obtain the decryption keys. In 2016, cyber-criminals netted about $1 billion from ransomware attacks.

But if the motive behind the Petya ransomware attacks was financial, it was far from a success.  

According to the Twitter bot that tracks bitcoin payments made to the address tied with the Petya ransomware, the attackers have so far netted little more than $10,000 in 46 payments, not a lot for an attack that has made the headlines across the globe and affected thousands of computers.
However, there are many signs indicating that the attackers were more interested in causing targeted mayhem and disruption rather than raising money.

The malware and the attack was carefully designed to cleverly spread across networks, even on computers that were patched up and secure. The developers of Petya avoided many of the mistakes of its recent predecessor, WannaCry, which caused a widespread outbreak last month, by using several techniques to propagate the virus across network and not incorporating any kill switch in the malware.

But as much as Petya’s launch and spreading mechanism are ingenious, the payment mechanism is poorly designed. Ransomware attacks usually assign unique Bitcoin wallets to each infected computer in order to automate the payment and key delivery process. 

But the Petya attackers have used a single Bitcoin address for all payments, which means decryption key delivery has to be done manually, not a wise choice for a virus that is destined to infect tens and possibly hundreds of thousands of computers. It will make also it much easier to trace the attackers as they move their money.

Moreover, the ransomware message that was displayed on infected computers contained an email address that victims had to contact with proof of payment in order to get their decryption keys. Unsurprisingly, the company that hosted the email account shut it down, which means victims are no longer able to recover their files. This is something that the cybercriminals should’ve seen coming.

Given those facts, some experts believe that the real purpose of the attack was to destroy the files on targeted computers. Comae Technologies explained how the malware was in fact a wiper—a virus that aims to destroy and damage—in the guise of ransomware. The virus is also being called NotPetya because it differs from the original Petya ransomware.

One of the noteworthy aspects of the attack was the method it was initiated. The attackers hacked the website of Ukrainian accounting software vendor MEDoc and used it as a beachhead to push virus-infected updates on the computers of its users. MEDoc counts among its customers the Ukrainian government agencies and large businesses. 

While ransomware attacks are usually sporadic and aimed at all kinds of users, the hacking of MEDoc gave the cybercriminals a venue to create a more targeted attack aimed at the economic and political infrastructures of Ukraine.
Also of concern is the fact that the attack came on the eve of the holiday marking Ukraine’s adoption of its first constitution in 1996. That could hardly be a coincidence.

A considerable number of computers outside of Ukraine were also affected by the virus, but that can be considered collateral damage when compared to the sheer number of devices that were hit by the attack in Ukraine.
Many indicators point to Russia, which stands accused of leading an aggressive cyberwarfare against Ukraine. In 2015 and 2016, hackers with alleged links to the Russian government hacked the Ukraine power grid and cut electricity in large swaths of the country. Ukraine’s president reported in December that there had been 6,500 attacks on 36 Ukrainian targets in the previous two months.

However, cyber-crime attribution is very difficult. Cyber-criminals often use tools and techniques that are associated with other hacking groups in order to deceive experts. Experts are reluctant to directly point the finger at the Kremlin, and some described the attack as too blatant and overt to be the work of Russian hacking groups.

We expect more details to emerge, but what is clear is that whoever unleashed the Petya outbreak wasn’t after the money.  

This marks a new chapter in the history of ransomware, a breed of virus that was created for purely financial purposes. With computers and connectivity being incorporated into every device, ransomware is fast turning into a weapon of mass disruption and destruction.

Daily Dot:

You Might Also Read:

Ukraine Police Trace Petya Attack Source:

 


 

 

« Is It Really Possible to Protect Your Health Data?
Germany Gets Tough On Social Media »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Acumin Recruitment

Acumin Recruitment

Acumin is an internationally established Cyber Security recruitment specialist.

Civica

Civica

Civica provides cloud-based managed IT services, hosting and outsourcing.

Redjack

Redjack

Redjack is a cutting-edge network analytics company focused on enterprise and ISP security and intelligence solutions.

Idaho National Laboratory (INL)

Idaho National Laboratory (INL)

INL is an applied engineering laboratory dedicated to supporting the US Dept of Energy's missions in energy research, nuclear science and national defense including critical infrastructure protection.

Gradiant

Gradiant

Gradiant’s mission is to contribute to the growth and competitive improvement of Galician businesses through technology development and innovation using ICT.

DeviceAssure

DeviceAssure

DeviceAssure enables organizations to reliably identify counterfeit and non-standard devices with a real-time check on a device's authenticity.

Accertify

Accertify

Accertify is a leading provider of fraud prevention, chargeback management, and payment gateway solutions.

Computer Network Defence (CND)

Computer Network Defence (CND)

Computer Network Defence (CND) are a Broad-Spectrum Cyber Security Consultancy and Recruitment Agency.

Consensys

Consensys

ConsenSys is a global blockchain company. We develop enterprise applications, invest in startups, build developer tools, and offer blockchain education.

oneclick

oneclick

oneclick is a central access and distribution platform in the cloud, enabling the management of the entire technology stack for application provisioning.

Lunio

Lunio

Lunio makes the internet a safer and more reliable place for everyone trying to grow their business by automatically getting rid of fake clicks, traffic, and leads on all ad platforms.

Gridware

Gridware

Gridware is a specialised cybersecurity consultancy firm and an emerging global player in the cybersecurity intelligence and advisory field.

Codean

Codean

The Codean Review Environment automates mundane software analysis tasks, so security experts can focus on finding vulnerabilities.

Aunalytics

Aunalytics

Aunalytics is a data platform company that delivers insights as a service to answer your most important IT and business questions.

ATSG

ATSG

ATSG is a global leader in transformational technology solutions for today’s digital enterprise. Cybersecurity ranging from Advisory & Assessment to Fully Managed Detection and Response Services.

Algoritha

Algoritha

Algoritha is a pioneering entity in the realm of security and forensic services.