SimplerCloud Pte Ltd

×
×

News: Security Advisory: Petya Malware Affecting Windows Systems

Published: 28/06/2017 Back

Update on 28 June 2017 at 1:21pm:


According to some reports, it's possible to prevent Petya from executing by creating a dummy file called: C:\Windows\perfc on the Windows system. More information can be found here.


===

This advisory is provided as a courtesy.


We would like to bring to your attention on a wide-spread infections of a malware similar to WannaCry and known as "Petya", which is also targeting unpatched Windows systems. The malware can spread over the network by looking for any vulnerable systems and infecting them.


Impact

It is reported that Petya is more dangerous and intrusive than WannaCry. Once a system is infected, the malware will encrypt the Master File Tree (MFT) tables and overrides the Master Boot Record (MBR) with a custom boot-loader, to display a ransom note and prevents the infected computer from booting-up.


Affected OS

Most of the Microsoft Windows operating systems are known to be vulnerable if they have not been updated with the latest patches. Those include:

- Windows Server 2016
- Windows Server 2012 R2
- Windows Server 2012
- Windows Server 2008 R2
- Windows Server 2008

Some of the Windows workstations, namely Windows 10, 8.1, 7 and Vista, among others, are also affected.

How to Fix the Problem

To ensure that your Windows servers and workstations are not vulnerable to the malware, please run Windows Update to install all the critical updates and patches. Restart the server once all the updates have been installed.



More information

https://en.wikipedia.org/wiki/Petya_(malware)
https://www.csa.gov.sg/singcert/news/advisories-alerts/petyaransomwareoutbreak
https://www.theguardian.com/technology/2017/jun/27/petya-ransomware-cyber-attack-who-what-why-how
https://www.bleepingcomputer.com/news/security/vaccine-not-killswitch-found-for-petya-notpetya-ransomware-outbreak/



Request Assistance

We can perform Windows Update on your Windows servers / servelets at a one-time discounted fee of $45. Please submit your order at Order -> Additional Services -> Vulnerability Fix - WINDOWS: HTTP.sys; Schannel; Freak Attack; WannaCry; Petya (Win) - $45.

Or please first open a support ticket and give us the hostname, IP address and OS template. You can find this information on your servelet's control panel.

For example:

Hostname: yourservelethostname
IP Address: 103.25.202.81
OS Template: Windows Server 2012 R2

Thank you.