{"id":75533,"date":"2017-06-28T10:15:43","date_gmt":"2017-06-28T17:15:43","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=75533"},"modified":"2025-06-03T22:10:24","modified_gmt":"2025-06-04T05:10:24","slug":"protect-petya-ransomware-mcafee-environment","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/protect-petya-ransomware-mcafee-environment\/","title":{"rendered":"How to Protect Against Petya Ransomware in a McAfee Environment"},"content":{"rendered":"<p><em>This post has been updated with information about\u00a0McAfee Enterprise Security Manager and\u00a0McAfee Web Gateway (June 28, 14:20 Pacific time).<\/em><\/p>\n<p>A new variant of the ransomware Petya (also called Petrwrap) began spreading around the world on June 27. Petya is ransomware that exploits the vulnerability CVE-2017-0144 in Microsoft&#8217;s implementation of the Server Message Block protocol.\u00a0This ransomware encrypts the master boot records of infected Windows computers, making the machines unusable.<\/p>\n<p>The initial attack vector is unclear, but aggressive worm-like behavior helps spread the ransomware. (Read McAfee\u2019s <a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/new-variant-petya-ransomware-spreading-like-wildfire\/\">detailed technical analysis<\/a> of the Petya ransomware.)<\/p>\n<p>Microsoft released a <a href=\"https:\/\/technet.microsoft.com\/en-us\/library\/security\/ms17-010.aspx?utm_campaign=Petya%2FNotPetya%20Ransomware%20Prospect%20Email%20-%206.27&amp;utm_medium=email&amp;utm_source=Eloqua\">set of critical patches<\/a> on March 14 to remove the underlying vulnerability in supported versions of Windows, but many organizations may not yet have applied these patches.<\/p>\n<h2><strong>How McAfee products can protect against Petya ransomware<\/strong><\/h2>\n<p>As with <a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/analysis-wannacry-ransomware\/\">WannaCry<\/a> and other similar attacks, a layered, integrated cyber defense system that combines advanced analytics, threat intelligence, signatures, and human expertise is the best way to protect your business against emerging threats. McAfee\u2019s collaborative cyber defense system leads the way for enterprises to protect against emerging threats such as Petya ransomware, remediate complex security issues, and enable business resilience. By empowering integrated security platforms with advanced malware analytics and threat intelligence, our system provides adaptable and continuous protection as a part of the threat defense life cycle.<\/p>\n<p>Attacks like Petya and its future variants cannot win against a collaborative cybersecurity ecosystem that works as a team and empowers protective tools to make better decisions at the point of attack.<\/p>\n<p>McAfee offers early protection for components of the initial Petya attack in the form of advanced malware behavior analysis with Real Protect Cloud and the brand-new Dynamic Neural Network (DNN) analysis techniques available in McAfee Advanced Threat Defense (ATD). ATD 4.0 introduced a new detection capability using a multilayered, back-propagation neural network (DNN) leveraging semisupervised learning.\u00a0DNN looks at certain features exercised by a malware to come up with a positive or negative verdict to determine whether the code is malicious.<\/p>\n<p>Whether in standalone mode or connected to McAfee endpoint or network sensors, ATD combines threat intelligence with sandbox behavior analysis and advanced machine learning to provide zero-day, adaptable protection. Real Protect, part of the Dynamic Endpoint solution, also uses machine learning and link analysis to protect against malware without signatures and provide rich intelligence to the Dynamic Endpoint and the rest of the McAfee ecosystem. Real Protect combined with Dynamic Application Containment provided early protection against Petya.<\/p>\n<p>Multiple McAfee products provide additional protection to either contain the attack or prevent further execution. This post provides an overview of those protections with the following products:<\/p>\n<h2><strong>McAfee Endpoint Security <\/strong><\/h2>\n<p><strong>Threat Prevention <\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/www.mcafee.com\/us\/products\/endpoint-protection\/endpoint-security.aspx\">McAfee Endpoint Security (ENS)<\/a> with<a href=\"https:\/\/www.mcafee.com\/us\/threat-center\/technology\/global-threat-intelligence-technology.aspx\"> Global Threat Intelligence (GTI)<\/a> and On Access Scan policy with the sensitivity level set to \u201cLow\u201d protect against known samples and variants. Learn more about recommended McAfee GTI file reputation settings in <a href=\"https:\/\/kc.mcafee.com\/corporate\/index?page=content&amp;id=KB74983\">KB74983,<\/a> with more information in <a href=\"https:\/\/kc.mcafee.com\/corporate\/index?page=content&amp;id=KB53735\">KB53735.<\/a><\/li>\n<li><a href=\"https:\/\/www.mcafee.com\/us\/products\/threat-intelligence-exchange.aspx\">McAfee Threat Intelligence Exchange (TIE)<\/a> with GTI protect against known samples and variants.<\/li>\n<\/ul>\n<p>Thus systems using McAfee ENS 10 are protected from known samples and variants with both signatures and Threat Intelligence.<\/p>\n<p><strong>Adaptive Threat Protection<\/strong><\/p>\n<ul>\n<li>Adaptive Threat Protection (ATP), with rule assignment configured in *Balanced mode\u201d (Default in ATP\\Options\\Rule Assignment setting), will protect against both known and unknown variants of the Petya ransomware.<\/li>\n<li>The ATP module protects against this unknown threat with several layers of advanced protection and containment:\n<ul>\n<li>ATP Real Protect Static uses client-side pre-execution behavioral analysis to monitor unknown malicious threats before they launch.<\/li>\n<li>ATP Real Protect Cloud uses cloud-assisted machine learning to identify and clean the threat, as shown below:<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/06\/20170628-Petya-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-75537 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/06\/20170628-Petya-1.png\" alt=\"\" width=\"1430\" height=\"854\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/06\/20170628-Petya-1.png 1430w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/06\/20170628-Petya-1-300x179.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/06\/20170628-Petya-1-768x459.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/06\/20170628-Petya-1-1024x612.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/06\/20170628-Petya-1-837x500.png 837w\" sizes=\"auto, (max-width: 1430px) 100vw, 1430px\" \/><\/a><\/p>\n<ul>\n<li>ATP Dynamic Application Containment (DAC) successfully contains the threat and prevents any potential damage from occurring (DAC events noted below):<\/li>\n<\/ul>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/06\/20170628-Petya-2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-75538 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/06\/20170628-Petya-2.png\" alt=\"\" width=\"2268\" height=\"1418\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/06\/20170628-Petya-2.png 2268w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/06\/20170628-Petya-2-300x188.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/06\/20170628-Petya-2-768x480.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/06\/20170628-Petya-2-1024x640.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/06\/20170628-Petya-2-800x500.png 800w\" sizes=\"auto, (max-width: 2268px) 100vw, 2268px\" \/><\/a><\/p>\n<p><strong>Advanced Threat Defense <\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/www.mcafee.com\/us\/products\/advanced-threat-defense.aspx\">McAfee Advanced Threat Defense<\/a> (ATD) 4.0 with Deep Neural Network and Dynamic Sandbox identified the threat and proactively updated the cyber defense ecosystem:<\/li>\n<\/ul>\n<p><strong><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/06\/20170628-Petya-3.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-75539 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/06\/20170628-Petya-3.png\" alt=\"\" width=\"724\" height=\"186\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/06\/20170628-Petya-3.png 724w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/06\/20170628-Petya-3-300x77.png 300w\" sizes=\"auto, (max-width: 724px) 100vw, 724px\" \/><\/a><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/06\/20170628-Petya-4.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-75540 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/06\/20170628-Petya-4.png\" alt=\"\" width=\"851\" height=\"194\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/06\/20170628-Petya-4.png 851w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/06\/20170628-Petya-4-300x68.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/06\/20170628-Petya-4-768x175.png 768w\" sizes=\"auto, (max-width: 851px) 100vw, 851px\" \/><\/a><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/06\/20170628-Petya-5.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-75541 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/06\/20170628-Petya-5.png\" alt=\"\" width=\"842\" height=\"150\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/06\/20170628-Petya-5.png 842w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/06\/20170628-Petya-5-300x53.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/06\/20170628-Petya-5-768x137.png 768w\" sizes=\"auto, (max-width: 842px) 100vw, 842px\" \/><\/a><a href=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/06\/20170628-Petya-6.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-75542 size-full\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/06\/20170628-Petya-6.png\" alt=\"\" width=\"700\" height=\"139\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/06\/20170628-Petya-6.png 700w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/06\/20170628-Petya-6-300x60.png 300w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/a><\/strong><\/p>\n<p><strong>McAfee Enterprise Security Manager\u00a0<\/strong><\/p>\n<p><a href=\"https:\/\/www.mcafee.com\/us\/products\/enterprise-security-manager.aspx\">McAfee Enterprise Security Manager<\/a> (ESM) is a security information and event management solution that delivers actionable intelligence and integrations to prioritize, investigate, and respond to threats. The <a href=\"https:\/\/www.mcafee.com\/us\/products\/mcafee-connect\/suspicious-activity-content-pack.aspx\">Suspicious Activity Content Pack<\/a> and <a href=\"https:\/\/www.mcafee.com\/us\/products\/mcafee-connect\/exploit-content-pack.aspx\">Exploit Content Pack<\/a> for McAfee ESM have been updated with WannaCry-specific rules, alarms, and watchlists so you can find and identify possible infections. These updates will also help protect against Petya. Both packs are <a href=\"https:\/\/www.youtube.com\/watch?v=j6CbdDNJWSU\">available for download in the McAfee ESM console<\/a> at no cost. Default correlation rules in McAfee ESM can also alert users of increased levels of horizontal SMB scans.<\/p>\n<p>Similar to WannaCry, the Petya attack presents a learning opportunity for security operations center analysts. <a href=\"https:\/\/securingtomorrow.mcafee.com\/business\/optimize-operations\/what_wannacry_means_soc\/\">Understanding and automating these best practices<\/a> will help you handle the next fast-moving attack.<\/p>\n<h2><strong>McAfee Web Gateway<\/strong><\/h2>\n<p><a href=\"https:\/\/www.mcafee.com\/us\/products\/web-gateway.aspx\">McAfee Web Gateway (MWG)<\/a> is a product family (appliance, cloud, and hybrid) of web proxies that provides another potential layer of protection against Petya variants delivered through the web (HTTP\/HTTPS) using multiple real-time scanning engines. Known variants will be blocked by GTI reputation and antimalware scanning as web traffic is processed through the proxy.<\/p>\n<p>The Gateway Anti-Malware (GAM) engine within MWG provides effective prevention of &#8220;zero-day&#8221; variants that have not yet been identified with a signature through GAM&#8217;s process of behavior emulation, conducted on files, HTML, and JavaScript. Emulators are regularly fed intelligence by machine learning models. GAM runs alongside GTI reputation and antimalware scanning as traffic is processed.<\/p>\n<p>Coupling MWG with ATD allows for further inspection and an effective prevention and detection approach.<\/p>\n<h2><strong>McAfee products using DAT files<\/strong><\/h2>\n<p>McAfee released an Extra.DAT to include coverage for Petya. McAfee also released an emergency DAT to include coverage for this threat. Subsequent DATs will include coverage. The latest DAT files are available via Knowledge Center article <a href=\"https:\/\/kc.mcafee.com\/corporate\/index?page=content&amp;id=KB89540\">KB89540.<\/a><\/p>\n<p>As our analysis continues, we will provide updates on how to leverage McAfee solutions to protect, detect, and correct against advanced cyber threats.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A new variant of the ransomware Petya (also called Petrwrap) began spreading around the world on June 27. Petya is ransomware that exploits the vulnerability CVE-2017-0144 in Microsoft\u2019s implementation of the Server Message Block protocol. This ransomware encrypts the master boot records of infected Windows computers, making the machines unusable.<\/p>\n","protected":false},"author":787,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[76],"coauthors":[4601,5064],"class_list":["post-75533","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-cybercrime"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Protect Against Petya Ransomware in a McAfee Environment | McAfee Blog<\/title>\n<meta name=\"description\" content=\"A new variant of the ransomware Petya (also called Petrwrap) began spreading around the world on June 27. Petya is ransomware that exploits the vulnerability CVE-2017-0144 in Microsoft\u2019s implementation of the Server Message Block protocol. This ransomware encrypts the master boot records of infected Windows computers, making the machines unusable.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Protect Against Petya Ransomware in a McAfee Environment | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"A new variant of the ransomware Petya (also called Petrwrap) began spreading around the world on June 27. Petya is ransomware that exploits the vulnerability CVE-2017-0144 in Microsoft\u2019s implementation of the Server Message Block protocol. This ransomware encrypts the master boot records of infected Windows computers, making the machines unusable.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/protect-petya-ransomware-mcafee-environment\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-06-28T17:15:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-04T05:10:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/06\/20170628-Petya-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1430\" \/>\n\t<meta property=\"og:image:height\" content=\"854\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Mo Cashman, Martin Ohl\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mo Cashman, Martin Ohl\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/protect-petya-ransomware-mcafee-environment\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/protect-petya-ransomware-mcafee-environment\/\"},\"author\":{\"name\":\"Mo Cashman\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/c9878f38cb73f700507b2718693e0816\"},\"headline\":\"How to Protect Against Petya Ransomware in a McAfee Environment\",\"datePublished\":\"2017-06-28T17:15:43+00:00\",\"dateModified\":\"2025-06-04T05:10:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/protect-petya-ransomware-mcafee-environment\/\"},\"wordCount\":976,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/protect-petya-ransomware-mcafee-environment\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/06\/20170628-Petya-1.png\",\"keywords\":[\"cybercrime\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/protect-petya-ransomware-mcafee-environment\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/protect-petya-ransomware-mcafee-environment\/\",\"name\":\"How to Protect Against Petya Ransomware in a McAfee Environment | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/protect-petya-ransomware-mcafee-environment\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/protect-petya-ransomware-mcafee-environment\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/06\/20170628-Petya-1.png\",\"datePublished\":\"2017-06-28T17:15:43+00:00\",\"dateModified\":\"2025-06-04T05:10:24+00:00\",\"description\":\"A new variant of the ransomware Petya (also called Petrwrap) began spreading around the world on June 27. Petya is ransomware that exploits the vulnerability CVE-2017-0144 in Microsoft\u2019s implementation of the Server Message Block protocol. This ransomware encrypts the master boot records of infected Windows computers, making the machines unusable.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/protect-petya-ransomware-mcafee-environment\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/protect-petya-ransomware-mcafee-environment\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/protect-petya-ransomware-mcafee-environment\/#primaryimage\",\"url\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/06\/20170628-Petya-1.png\",\"contentUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/06\/20170628-Petya-1.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/protect-petya-ransomware-mcafee-environment\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"How to Protect Against Petya Ransomware in a McAfee Environment\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/c9878f38cb73f700507b2718693e0816\",\"name\":\"Mo Cashman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/e9035a01a4599145df1d1d64135a5bd9\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/4-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/4-96x96.png\",\"caption\":\"Mo Cashman\"},\"description\":\"Mo Cashman is one of the company\u2019s passionate leaders in cyber security. As an Enterprise Security Architect and Principal Engineer at McAfee, Mo advises our largest global customers and partners on their cyber threat management and data protection strategies for the digital enterprise. Mo\u2019s passion is to inspire our next generation security professionals as well as help customers architect for future resilience. With that passion and over 20 years of experience, Mo leads our Security Architect and Executive Briefing Center programs in EMEA, where we host hundreds of customers each year. In previous roles at the company, Mo was the Chief Technical Strategist for the Global Public Sector and just prior to joining the company, lead Computer Security Incident Response and Threat Intelligence Teams investigating and responding to sophisticated cyber threats across the world.\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mo-cashman\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Protect Against Petya Ransomware in a McAfee Environment | McAfee Blog","description":"A new variant of the ransomware Petya (also called Petrwrap) began spreading around the world on June 27. Petya is ransomware that exploits the vulnerability CVE-2017-0144 in Microsoft\u2019s implementation of the Server Message Block protocol. This ransomware encrypts the master boot records of infected Windows computers, making the machines unusable.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"How to Protect Against Petya Ransomware in a McAfee Environment | McAfee Blog","og_description":"A new variant of the ransomware Petya (also called Petrwrap) began spreading around the world on June 27. Petya is ransomware that exploits the vulnerability CVE-2017-0144 in Microsoft\u2019s implementation of the Server Message Block protocol. This ransomware encrypts the master boot records of infected Windows computers, making the machines unusable.","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/protect-petya-ransomware-mcafee-environment\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2017-06-28T17:15:43+00:00","article_modified_time":"2025-06-04T05:10:24+00:00","og_image":[{"width":1430,"height":854,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/06\/20170628-Petya-1.png","type":"image\/png"}],"author":"Mo Cashman, Martin Ohl","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"Mo Cashman, Martin Ohl","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/protect-petya-ransomware-mcafee-environment\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/protect-petya-ransomware-mcafee-environment\/"},"author":{"name":"Mo Cashman","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/c9878f38cb73f700507b2718693e0816"},"headline":"How to Protect Against Petya Ransomware in a McAfee Environment","datePublished":"2017-06-28T17:15:43+00:00","dateModified":"2025-06-04T05:10:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/protect-petya-ransomware-mcafee-environment\/"},"wordCount":976,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/protect-petya-ransomware-mcafee-environment\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/06\/20170628-Petya-1.png","keywords":["cybercrime"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/protect-petya-ransomware-mcafee-environment\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/protect-petya-ransomware-mcafee-environment\/","name":"How to Protect Against Petya Ransomware in a McAfee Environment | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/protect-petya-ransomware-mcafee-environment\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/protect-petya-ransomware-mcafee-environment\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/06\/20170628-Petya-1.png","datePublished":"2017-06-28T17:15:43+00:00","dateModified":"2025-06-04T05:10:24+00:00","description":"A new variant of the ransomware Petya (also called Petrwrap) began spreading around the world on June 27. Petya is ransomware that exploits the vulnerability CVE-2017-0144 in Microsoft\u2019s implementation of the Server Message Block protocol. This ransomware encrypts the master boot records of infected Windows computers, making the machines unusable.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/protect-petya-ransomware-mcafee-environment\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/protect-petya-ransomware-mcafee-environment\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/protect-petya-ransomware-mcafee-environment\/#primaryimage","url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/06\/20170628-Petya-1.png","contentUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2017\/06\/20170628-Petya-1.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/protect-petya-ransomware-mcafee-environment\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"How to Protect Against Petya Ransomware in a McAfee Environment"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/c9878f38cb73f700507b2718693e0816","name":"Mo Cashman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/e9035a01a4599145df1d1d64135a5bd9","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/4-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/4-96x96.png","caption":"Mo Cashman"},"description":"Mo Cashman is one of the company\u2019s passionate leaders in cyber security. As an Enterprise Security Architect and Principal Engineer at McAfee, Mo advises our largest global customers and partners on their cyber threat management and data protection strategies for the digital enterprise. Mo\u2019s passion is to inspire our next generation security professionals as well as help customers architect for future resilience. With that passion and over 20 years of experience, Mo leads our Security Architect and Executive Briefing Center programs in EMEA, where we host hundreds of customers each year. In previous roles at the company, Mo was the Chief Technical Strategist for the Global Public Sector and just prior to joining the company, lead Computer Security Incident Response and Threat Intelligence Teams investigating and responding to sophisticated cyber threats across the world.","url":"https:\/\/www.mcafee.com\/blogs\/author\/mo-cashman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/75533","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/787"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=75533"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/75533\/revisions"}],"predecessor-version":[{"id":215072,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/75533\/revisions\/215072"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=75533"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=75533"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=75533"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=75533"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}