28 Jun 2017
Menace de sécurité - Campagne de Petya Ransomware
Just a few weeks after the WannaCry ransomware attack that made a lot of noise in the news and affected various organizations globally, a new threat appears to be spreading quickly.
Multiple reports of Petya ransomware infections occurring in networks in many countries around the world have been reported. Similar to WannaCry, Petya uses the Eternal Blue exploit to propagate itself. Petya has been in existence since 2016. It differs from typical ransomware as it doesn’t just encrypt files, it also overwrites and encrypts the master boot record (MBR), making affected machines unusable. Reports indicate that the ransomware exploits vulnerabilities in Server Message Block (SMB).
Attached is an Emerging Threat Report from our partner and leader in Security with the largest Cyber Intelligence, Symantec, to enable you to better understand the Petya Threat.
As a reminder and general rule, a good cyber hygiene and security policies & procedures are extremely important within your organization and ensuring the following among others:
- Latest Windows security updates have been applied
- Symantec Endpoint Protection properly configured and updated
- IDS/IPS signatures deployed following recommendation by the vendor
- Create Cyber Security Awareness for employees
- Log Collection, Monitoring of Events and Incident Management
At Birger, we are at your disposal 24x7 in our Cyber Defense Center powered by Symantec. We want to make sure that you are protected and prepared to predict, prevent, detect and respond to the emerging threat landscape.
Click here to download the Emerging Threat Report
For more information on the topic and our Cyber Security Solutions & Services, please contact us by mail security@birger.technology.
You may also like
30 Jan 2019
BIRGER. Solutions de Dématérialisation Sécurisées
LA SOCIETE BIRGER. offre des solutions de dématérialisation qui aident simplifier et accroître la rapidité des recherches de documents et informations. La recherche des documents physiques est susceptible d’être laborieuse et peut prendre des heures ou même des jours comparativement aux recherches d’informations électroniques qui se font en quelques secondes et ce, « at finger tip ».
30 Apr 2021
Les entreprises doivent adapter leurs stratégies de cyber défenses aux nouvelles réalités liées à la Covid-19
Avec la Covid-19, la priorité des entreprises était d’assurer la continuité de leurs opérations. Elles ont dû mettre en place des nouveaux modèles d’opérations sans les validations habituelles.