News Security

Organizations must take immediate action against Petya: Fortinet

Fortinet advised organizations and computer users to brace and take immediate action against a new ransomware variant called Petya that is sweeping across the world. The ransomware is currently having an impact on a wide range of industries and organizations, including critical infrastructure such as energy, banking, and transportation systems.

This is part of a new wave of multi-vector ransomware attacks that we are calling “ransomworm”, which takes advantage of timely exploits. The ransomworm is designed to move across multiple systems automatically, rather than stay in one place.  It appears that the Petya ransomworm is using similar current vulnerabilities that were exploited during the recent Wannacry attack.

Unlike WannaCry which encrypts a computer’s files, however, the Petra ransomware encrypts a segment of the hard drive that renders the entire computer inoperable. Older legacy systems and critical infrastructure are particularly vulnerable to this attack. The patch for this vulnerability was issued by Microsoft earlier this year. We advise organizations to update their systems immediately.

In addition, here are a few other steps organisations and individuals should take to protect themselves:

IT Department

  • Back up your critical systems’ files, and keep that backup offline.
  • Ensure you have a ‘gold standard’ operating system disk and configuration, to allow you to reconstruct your desktops with confidence.
  • Patch.
  • Check the currency of your patches.

Users

  • Don’t execute attachments from unknown sources.

Security Operations

  • Push out signatures and antiviruses.
  • Use sandboxing on attachments.
  • Use behavior-based detections.
  • At firewalls, look for evidence of Command & Control.
  • Segment, to limit the spread of the malware and backup data being encrypted.
  • Ensure that Remote Desktop Protocol is turned off, and/or is properly authenticated, and otherwise limit its ability to move laterally.

General Guidance

  • If affected, do not pay the ransom
  • Share facts of infiltration with trusted organizations such as the local police, to assist with overall community efforts to diagnose, contain, and remedy the attack.

Related posts

New Relic Named a Cloud Observability Leader by GigaOm

enterpriseitworld

Quantum Announces the Scalar i7 RAPTOR for Data Lakes

enterpriseitworld

HPE Leverages GenAI to Enhance AIOps Capabilities of HPE Aruba Networking Central Platform

enterpriseitworld