

Petya spreads through the Server Message Block (SMB) over the local network, such as Windows Management Instrumentation Commandline (WMIC). However, now that the attack is globally affecting tens of thousands of devices, there’s a renewed sense of urgency in securing personal and corporate devices from this threat. After the hack, the website was used to infect Ukrainian devices with malware.Īccording to a tweet (made with a meme on Ukraine’s official account), the country is handling the attack and there is “no need to panic”. On June 28, Costin Raiu, the chief risk officer (CRO) of Kaspersky Labs, tweeted that this attack could have also started from a hack on the Ukrainian City of Bahmut’s website. While the initial spread’s cause is still under debate, sources-including Microsoft in their latest blog-are pointing toward the automatic update feature on MeDoc, a popular Ukrainian Accounting software, as the cause of the initial infection. Rozenko Pavlo, Ukraine’s prime minister, tweeted a photo of his ransomed screen on June 27.

This ransomware attack infected government computers, companies, and banks, causing Kiev’s ATMs to stop working. Beginning initially in Ukraine, the new ransomware called Petya, NotPetya, or PetrWrap, hit critical services throughout the country.
