top of page

NotPetya Ransomware

webzonemarketing

NotPetya is a type of malware that was first discovered in June 2017. It was initially believed to be a variant of the Petya ransomware, but further analysis revealed that it was actually a wiper masquerading as ransomware. NotPetya was designed to spread quickly and infect as many computers as possible. It used a number of different techniques to propagate itself, including exploiting vulnerabilities in the Windows operating system and using infected documents to spread via email. Once it had infected a computer, it encrypted the victim's files and demanded a ransom payment in order to decrypt them. However, unlike other types of ransomware, it was not actually capable of decrypting the files even if the ransom was paid, making it effectively a wiper that destroys data rather than a legitimate ransom attack. NotPetya was highly destructive and caused significant damage to a number of organizations around the world. It was initially spread through the Ukrainian tax software company MEDoc, but quickly spread to other countries via infected software updates and email attachments. The attack was particularly damaging to the shipping company Maersk, which lost access to its computer systems for several weeks and reported hundreds of millions of dollars in losses as a result of the attack. Overall, NotPetya was a highly sophisticated and destructive piece of malware that caused significant damage to a number of organizations around the world. It serves as a reminder of the importance of having robust cybersecurity measures in place to protect against such threats.

How Does it works?

NotPetya is a malware that was designed to spread quickly and infect as many computers as possible. It uses a number of different techniques to propagate itself, including:

  1. Exploiting vulnerabilities in the Windows operating system: NotPetya uses a number of different vulnerabilities in the Windows operating system to spread itself. For example, it can exploit the EternalBlue vulnerability in Windows to propagate through networks and infect other computers.

  2. Using infected documents to spread via email: NotPetya can spread itself through email attachments, such as infected Word or Excel documents. When a user opens the infected attachment, the malware is installed on their computer.

  3. Using infected software updates: NotPetya can also spread itself through infected software updates. For example, it was initially spread through the Ukrainian tax software company MEDoc, which distributed infected software updates to its users.

Once NotPetya has infected a computer, it begins to encrypt the victim's files and demands a ransom payment in order to decrypt them. However, unlike other types of ransomware, it is not actually capable of decrypting the files even if the ransom is paid, making it effectively a wiper that destroys data rather than a legitimate ransom attack. NotPetya is highly sophisticated and was able to cause significant damage to a number of organizations around the world. It serves as a reminder of the importance of having robust cybersecurity measures in place to protect against such threats.

Methodology Use in the Building NotPetya

It is not clear exactly how NotPetya was built or the methodology used in its development. However, based on the features and behavior of the malware, it is likely that the developers used a number of different tools and techniques to create it. Some of the tools and techniques that may have been used in the development of NotPetya include:

  1. Reverse engineering: NotPetya was likely developed using reverse engineering techniques, in which the developers analyzed the code of other malware and used this knowledge to build their own.

  2. Malware development frameworks: There are a number of different frameworks and tools available that can be used to build malware, such as Metasploit and Cobalt Strike. These frameworks provide a range of features and capabilities that can be used to create sophisticated malware.

  3. Vulnerability research: NotPetya exploits vulnerabilities in the Windows operating system in order to spread itself, so it is likely that the developers researched and identified these vulnerabilities in order to use them in the malware.

  4. Encryption: NotPetya uses encryption to encrypt the victim's files and demand a ransom payment in order to decrypt them. The developers would have needed to have a strong understanding of encryption algorithms and techniques in order to implement this aspect of the malware.

Overall, the development of NotPetya likely required a high level of technical expertise and a range of different tools and techniques. It is a highly sophisticated piece of malware that was able to cause significant damage to a number of organizations around the world.

2 views0 comments

Recent Posts

See All

Comments


  • Instagram
  • Facebook
  • Twitter
  • LinkedIn
Azahadinc @2022
Physical office address: No 11, ipaja lagos Nigeria.
Email us at azahadinc@gmail.com
bottom of page