4IT Blog

4IT has been serving the Miami area since 2003, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance


A new malware swept across the globe Tuesday, incorporating facets of many ransomwares that have made headlines recently. While it originally appeared to be a variant of the Petya ransomware, it has been determined that it shares more in common with WannaCry. However, “NotPetya,” as it has been named, has a few additional features that experts say make it worse than either of its predecessors.

Why NotPetya Isn’t Really a Ransomware
The first clue that researchers had that NotPetya had a different motivation was the fact that the ransom only demanded the Bitcoin equivalent of $300. Secondly, the only means of getting the decryption key was to send an email to an address hosted by German email provider Posteo. Despite the lack of preparation the payment method appeared to have, NotPetya itself was clearly designed to be able to infiltrate as many networks as possible and do maximum damage once inside.

A Hybrid Hacking Attack
Since the attack commenced, researchers have ascertained that despite its initial similarities with Petya, NotPetya shares many traits with other malicious programs. Like WannaCry, the attack that affected much of Europe, NotPetya leverages EternalBlue. EternalBlue is a National Security Agency hacking tool that targets unpatched systems and steals the passwords that allow administrator access. In addition to EternalBlue, NotPetya also utilizes EternalRomance, another code that was stolen from the NSA.

Once NotPetya has infected one computer, it extracts passwords from its memory or the local filesystem to allow itself to spread--including onto updated and patched Windows 10 systems.

How To Protect Your Files
First off, don’t expect that you can retrieve your files just by paying the ransom. Even if those responsible for NotPetya intended to keep their word and return them once paid, Posteo has shut down the provided email account victims were to receive their keys from. As a result, unless a victim was already following certain best practices, their files are as of yet unrecoverable.

However, this does not mean that everyone is vulnerable to this attack. Before the EternalBlue and EternalRomance exploits were distributed on the dark web, Microsoft had already released patches for the vulnerabilities. However, if these patches were not applied, a user’s systems were (and are) still vulnerable.

The best method to avoid infection from this kind of attack is to ensure your users understand the importance of cyber security efforts, and that all of your business’ systems are reinforced against the latest threats by keeping your defenses up-to-date.

Furthermore, even an infected user is not without hope if they have been backing up their files. If they have done so, all they have to do is disconnect their computer from the Internet, reformat their hard drive and restore their data from their backup solution. However, for this to work, you have to also be sure that your backups are up-to-date, and that your backup is stored in an isolated location, separate from your network.

4IT has the experience and expertise to help prevent you from becoming a victim of a malware like this, whether we help you manage your backups or help educate your users to avoid attacks like these in the first place. Give us a call at 305-278-7100 today.



No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Sunday, 18 February 2018
If you'd like to register, please fill in the username, password and name fields.

Mobile? Grab this Article!

Qr Code

Tag Cloud

security Tip of the Week Technology Cloud Privacy Best Practices Microsoft software Internet Business Computing Backup Hackers Productivity Hosted Solutions Business Management Managed Service Provider Google Malware IT Services Business Efficiency Windows IT Support Innovation Disaster Recovery Business Continuity Hardware VoIP Workplace Tips Mobile Devices User Tips Saving Money Computer Miscellaneous Virtualization Windows 10 Network Security Upgrade Mobile Device Management Data Server communications Mobile Computing Email Alert Save Money Microsoft Office Communication Network Social Media Quick Tips Smartphone Small Business Smartphones BYOD Going Green Managed IT Services Mobile Office Outsourced IT Information Technology Android Office Apps Health Chrome Application Ransomware Browser Gadgets Operating System Firewall The Internet of Things Avoiding Downtime Disaster Productivity Managed IT Tablet Cybersecurity WiFi Holiday Mobility Cybercrime Data Recovery Passwords Remote Computing Telephone Systems Unified Threat Management IT Solutions Data Backup Spam BDR Risk Management History Search Best Practice Data Management VPN Apple Facebook Employer-Employee Relationship Vendor Management Marketing Budget Hard Drives Automation Saving Time Hacking Remote Monitoring Password Wireless Technology Hosted Solution Computers Money Big Data Recovery Phone System Content Filtering Proactive IT Office Tips User Error iPhone Customer Relationship Management Law Enforcement Collaboration Phishing Vulnerability Current Events Telephony Printer Bring Your Own Device USB Analytics Encryption Router Gmail Humor Administration Government Wearable Technology Intranet Work/Life Balance Lithium-ion battery Antivirus Maintenance PowerPoint Shortcut Virus Social Office 365 Politics Windows 8 Education Social Engineering Trending Personal Information Net Neutrality Wireless Private Cloud Tech Support Unsupported Software Google Drive Cloud Computing Outlook Point of Sale Save Time IT COnsultant Data Security Computer Repair App Data Protection Flexibility SaaS Cost Management Audit HaaS Bandwidth Printer Server Business Intelligence Laptop Users OneNote Virtual Reality hacker Meetings Transportation Data Loss Display Battery Robot Instant Messaging Emails Computer Care HIPAA Redundancy Augmented Reality Data Storage Automobile Entertainment Network Congestion Paperless Office End of Support Benefits Computer Accessories DDoS Fax Server Help Desk Data Breach Internet Exlporer Mouse Compliance Workplace Internet of Things Streaming Media Identity Theft Two-factor Authentication Uninterrupted Power Supply Solid State Drive Managing Stress Sports Excel online currency Travel Social Networking Samsung Wi-Fi Emergency IT Support Artificial Intelligence Customer Service Efficency Update Applications Windows 10 Biometrics Retail Black Market Access Busines Continuity Company Culture Regulation Touchscreen Software as a Service Networking Near Field Communication Website IT Security Cleaning Sync Experience iOS Human Resources IT consulting OneDrive Keyboard Managed IT Service Avoid Downtime Running Cable Wiring Managed IT Services Amazon Adobe Information Co-managed IT Google Docs Music Computer Fan Reliable Computing Hiring/Firing Data storage Bloatware Debate Licensing Microsoft Excel Lifestyle Books Dark Web Ebay Smart Technology Screen Mirroring Video Games Document Management Computing File Sharing Advertising Branding Cast Legal Distributed Denial of Service Windows 10s Touchpad Mobile Device Nokia systems Managed Security Nanotechnology WIndows 7 Storage Inbound Marketing Scam eWaste Hard Disk Drive Regulations Tablets hack Root Cause Analysis Value Twitter Employer Employee Relationship HBO Worker Commute best practices Operating Sysytem Cameras NFL Cortana Surge Protector CrashOverride PDF User Files Science Television IT Management Scalability data breach Virtual Desktop 3D Printing Presentation Project Management Word Legislation Safety Settings Text Messaging Bluetooth Best Available Chromecast WIndows Server 2008 How To IT Technicians Windows Ink Hard Drive risk management MSP Upgrades SharePoint ISP Administrator Training Patch Management Consultant Google Maps Images Colocation Uograde Blogging The Blindside Of Commerce Teamwork Programming Updates Sales Identities Conferencing Managed Service Provder Shadow IT Microsoft Word Webinar Relocation Gifts Device Security Webinar Devices Credit Cards IT solutions Spyware Mobile FAQ Fraud Professional Services Charger Tutorial Edge Taxes IT service Wireless Charging Ciminal Supercomputer Electronic Medical Records Domains WannaCry IT Budget Evernote Reputation Comparison Gift Giving Workers Microblogging Youtube Buisness Blockchain Specifications