Home Business IT and Tech Organisations and Computer Users Must Take Immediate Action to Protect against Petya Ransomware

Organisations and Computer Users Must Take Immediate Action to Protect against Petya Ransomware

0
111
Fujitsu

Fortinet, a global leader in high-performance cyber security solutions, today advised organisations and computer users to brace and take immediate action against a new ransomware variant called Petya that is sweeping across the world. The ransomware is currently having an impact on a wide range of industries and organizations, including critical infrastructure such as energy, banking, and transportation systems.

This is part of a new wave of multi-vector ransomware attacks that we are calling “ransomworm”, which takes advantage of timely exploits. The ransomworm is designed to move across multiple systems automatically, rather than stay in one place.  It appears that the Petya ransomworm is using similar current vulnerabilities that were exploited during the recent Wannacry attack.

 

Unlike WannaCry which encrypts a computer’s files, however, the Petya ransomware encrypts a segment of the hard drive that renders the entire computer inoperable. Older legacy systems and critical infrastructure are particularly vulnerable to this attack.

The patch for this vulnerability was issued by Microsoft earlier this year. We advise organizations to update their systems immediately.

 

In addition, here are a few other steps organisations and individuals should take to protect themselves:

IT Department

  • Back up your critical systems’ files, and keep that backup offline.
  • Ensure you have a ‘gold standard’ operating system disk and configuration, to allow you to reconstruct your desktops with confidence.
  • Check the currency of your patches.

Users

  • Don’t execute attachments from unknown sources.

Security Operations

  • Push out signatures and antiviruses.
  • Use sandboxing on attachments.
  • Use behavior-based detections.
  • At firewalls, look for evidence of Command & Control.
  • Segment, to limit the spread of the malware and backup data being encrypted.
  • Ensure that Remote Desktop Protocol is turned off, and/or is properly authenticated, and otherwise limit its ability to move laterally.

General Guidance

  • If affected, do not pay the ransom
  • Share facts of infiltration with trusted organizations such as the local police, to assist with overall community efforts to diagnose, contain, and remedy the attack.

Further cautions and an analysis of the ransomware landscape can be found here: http://blog.fortinet.com/2017/06/27/new-ransomware-follows-wannacry-exploits

 

 

About Fortinet

Fortinet (NASDAQ: FTNT) secures the largest enterprise, service provider, and government organizations around the world. Fortinet empowers its customers with intelligent, seamless protection across the expanding attack surface and the power to take on ever-increasing performance requirements of the borderless network – today and into the future. Only the Fortinet Security Fabric architecture can deliver security without compromise to address the most critical security challenges, whether in networked, application, cloud or mobile environments. Fortinet ranks #1 in the most security appliances shipped worldwide and more than 310,000 customers trust Fortinet to protect their businesses. Learn more at http://www.fortinet.com, the Fortinet Blog, or FortiGuard Labs.

Load More Related Articles
Load More By MNLtoday.ph
Load More In IT and Tech

Check Also

Fortinet Offers Essential Cyber-Safety Tips Amidst Escalating Cyber-Attacks

 Individual devices and user data becoming prime targets for cyber-criminals; 1 in 20 atta…