Prevent the Next Petya: Block New Exploits by Defending Vulnerabilities

This blog was written by Nat Smith. For ransomware enthusiasts, the April release of stolen NSA Windows exploits is a gift that will not stop giving. Just weeks after the Shadowbrokers’ “Lost in Translation” file drop, WannaCry brought havoc and destruction to networks worldwide. Now a new Petya variant is ...


Cybercriminals Behind Petya Make First Public Statement, Demand Over $250,000 For Decryption

Over the past week, Petya has continued to unravel, with more and more details emerging about the global cyberattack each day. At first, Petya was believed to be the next WannaCry, until experts soon determined the malware was intended for destruction rather than profit, destroying files while using a faux ...

Enterprise McAfee Labs

Petya More Effective at Destruction Than as Ransomware

At the beginning of the recent Petya malware campaign, the world was quick to exclaim this attack was ransomware. Now, with time to analyze the facts and make comparisons to other ransomware campaigns, this Petya attack does not look so much like ransomware. To back up this claim, let’s examine ...

McAfee Labs

New Variant of Petya Ransomware Spreading Like Wildfire

The world woke up today to another ransomware outbreak wreaking havoc throughout companies’ networks. This time, the family causing the fuss is Ransomware Petya, a nasty variant that encrypts files and the computer’s master boot record (MBR), rendering the machine unusable.

Consumer Threat Notices

Petya is Here, And It’s Taking Cues from WannaCry

Just over a month after the infamous WannaCry attack, a new worldwide cyberattack is here again. Its name is Petya, or Petwrap, it’s hit companies everywhere across Europe, including Ukraine’s government facilities, electric grids, banks, and public transportation, demanding a $300 ransom in Bitcoin in the process. So how does this Petya attack work, exactly? Going ...

Subscribe to McAfee Securing Tomorrow Blogs