Petya ransomware outbreak
As you have probably seen on the news a new ransomware outbreak called Petya / NotPetya is causing havoc globally. The outbreak is smaller than the Wannacry variant a few weeks back but it seems to have still caused disruption to many businesses.
Petya/NotPetya appears to be targeting the same vulnerability in Microsoft Windows (SMB) that Wanncry so successfully exploited, this has been confirmed by a number of security vendors including Symantec and Bitdefender.
This ransomware targets the boot records of Windows, stopping you from loading the operating system and was delivered as a supposed accountancy software update in Ukraine.
What can you do?
It is as simple as patching your machines and servers up to date. A patch was originally released by Microsoft in March for the specific “ETERNALBLUE” SMB flaw that is being exploited. It is important that all updates, especially critical security patches, are installed as quickly as possible after release. We are seeing an increase in exploits targeting new vulnerabilities in a much faster timescale than before.
Education will also help – bringing staff up to speed on what they should and shouldn’t be opening can help increase security across any organisation. Reducing the number of attack vectors that can be exploited will reduce your risk of being targeted.
Check you have backups in place and they are working. In the worst case scenario you can revert to back up if you are impacted by the malware.
Making sure you have a patch management and change process procedure is essential. If you are unsure about your current systems and solutions and are not confident you are receiving the right service levels from you provider please get in touch. We can sit down and discuss your requirements to make sure you are secure.
To find out more, please call us on 0845 504 8989, or complete our contact form.