Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

A new malware swept across the globe Tuesday, incorporating facets of many ransomwares that have made headlines recently. While it originally appeared to be a variant of the Petya ransomware, it has been determined that it shares more in common with WannaCry. However, “NotPetya,” as it has been named, has a few additional features that experts say make it worse than either of its predecessors.

Why NotPetya Isn’t Really a Ransomware
The first clue that researchers had that NotPetya had a different motivation was the fact that the ransom only demanded the Bitcoin equivalent of $300. Secondly, the only means of getting the decryption key was to send an email to an address hosted by German email provider Posteo. Despite the lack of preparation the payment method appeared to have, NotPetya itself was clearly designed to be able to infiltrate as many networks as possible and do maximum damage once inside.

A Hybrid Hacking Attack
Since the attack commenced, researchers have ascertained that despite its initial similarities with Petya, NotPetya shares many traits with other malicious programs. Like WannaCry, the attack that affected much of Europe, NotPetya leverages EternalBlue. EternalBlue is a National Security Agency hacking tool that targets unpatched systems and steals the passwords that allow administrator access. In addition to EternalBlue, NotPetya also utilizes EternalRomance, another code that was stolen from the NSA.

Once NotPetya has infected one computer, it extracts passwords from its memory or the local filesystem to allow itself to spread--including onto updated and patched Windows 10 systems.

How To Protect Your Files
First off, don’t expect that you can retrieve your files just by paying the ransom. Even if those responsible for NotPetya intended to keep their word and return them once paid, Posteo has shut down the provided email account victims were to receive their keys from. As a result, unless a victim was already following certain best practices, their files are as of yet unrecoverable.

However, this does not mean that everyone is vulnerable to this attack. Before the EternalBlue and EternalRomance exploits were distributed on the dark web, Microsoft had already released patches for the vulnerabilities. However, if these patches were not applied, a user’s systems were (and are) still vulnerable.

The best method to avoid infection from this kind of attack is to ensure your users understand the importance of cyber security efforts, and that all of your business’ systems are reinforced against the latest threats by keeping your defenses up-to-date.

Furthermore, even an infected user is not without hope if they have been backing up their files. If they have done so, all they have to do is disconnect their computer from the Internet, reformat their hard drive and restore their data from their backup solution. However, for this to work, you have to also be sure that your backups are up-to-date, and that your backup is stored in an isolated location, separate from your network.

Total Tech Care has the experience and expertise to help prevent you from becoming a victim of a malware like this, whether we help you manage your backups or help educate your users to avoid attacks like these in the first place. Give us a call at 866-348-2602 today.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 24 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Efficiency Software Business Google Network Security Microsoft Internet Email Malware Workplace Tips Backup Innovation Data User Tips Computer Mobile Devices Hardware IT Services Android VoIP Disaster Recovery communications Business Continuity Smartphones Communication IT Support Miscellaneous Smartphone Mobile Device Network Browser Small Business Productivity Collaboration Quick Tips Cybersecurity Business Management Users Upgrade Phishing Managed IT Services Windows Outsourced IT Ransomware Data Backup Windows 10 Office Server Save Money Data Recovery Cloud Computing Windows 10 Passwords Saving Money Holiday Chrome Social Media Virtualization Tech Term Gadgets Microsoft Office Automation Managed Service Managed IT Services Artificial Intelligence Operating System Facebook Computers Cybercrime BYOD Mobile Device Management Wi-Fi Networking IT Support Hacking Internet of Things Health Spam Covid-19 Office 365 Managed Service Provider Telephone Systems Information Information Technology Remote Alert Bandwidth Social Engineering Mobility Router Recovery BDR Employer-Employee Relationship Application Remote Monitoring Password Money Encryption App Big Data History Applications Law Enforcement Data Breach Human Resources Mobile Computing Managed IT Mobile Office Apps How To Blockchain Paperless Office Office Tips Training Data Storage Patch Management VPN Government Private Cloud Remote Computing Mouse HaaS Bring Your Own Device Data Management Work/Life Balance Data Security Wireless Google Drive Vulnerability Gmail Windows 7 Avoiding Downtime Flexibility Word Settings Infrastructure Voice over Internet Protocol Marketing WiFi Servers Two-factor Authentication IT solutions Entertainment Website Budget USB Social Data Protection Vendor User Error Cleaning Managed Services Display Meetings End of Support Employee/Employer Relationship Risk Management Physical Security Education RMM Hacker Safety Staff Software as a Service Telephone System HIPAA Sports The Internet of Things Machine Learning Redundancy Lithium-ion battery Keyboard Conferencing Connectivity Remote Work Scam Firewall Virtual Reality Vendor Management Apple Save Time Charger Cryptocurrency Network Congestion Data storage Automobile eWaste Managed Services Provider Compliance Computer Care IT Consultant Database OneNote Computing Infrastructure Current Events Comparison Remote Workers Telephony Going Green Samsung CES Humor Processor Wearable Technology Hard Drives Retail Value Content Management Instant Messaging Battery Business Technology Hard Drive Access Control Robot Shadow IT Excel Legal Spam Blocking Electronic Medical Records Biometrics Virtual Assistant Authentication Virtual Desktop Internet Exlporer Computing Hiring/Firing DDoS PDF SharePoint Update Virus Proactive IT Digital Signage Best Practice Google Docs Unified Threat Management Business Intelligence Computer Accessories Customer Service YouTube Identity Theft Environment Audit Black Market Worker IT Management Procurement Fax Server Workplace Strategy Botnet Net Neutrality Augmented Reality Document Management IT Plan Printer Help Desk SaaS Solid State Drive Wireless Technology Fraud Bluetooth Printing How to Downtime Remote Worker Unsupported Software Recycling Bloatware Point of Sale Personal Cryptomining Software Tips Wiring Colocation Supercomputer Practices Uninterrupted Power Supply Supply Chain Management Monitoring Batteries Sync Emails Cache Amazon Web Services Tablets Monitor Criminal Entrepreneur Windows 8.1 Digitize Safe Mode Windows Server 2008 R2 GDPR Hosted Computing Customer relationships Netflix Wireless Internet Shortcut Two Factor Authentication Online Shopping Reputation Cost Management Streaming Media Email Best Practices IT Assessment Manufacturing Root Cause Analysis File Sharing Content HBO Camera Knowledge Inventory Social Networking Tech Support Music Specifications Computer Tips Managed IT Service Skype Security Cameras Techology Wire Laptop Evernote Customers Virtual CIO Travel OneDrive Biometric Security Data loss Audiobook Outlook Printers Running Cable Leadership Troubleshooting Millennials Consultant Peripheral Memory Digital Security Cameras Analytics Using Data Start Menu Smart Office Touchpad Wireless Charging Loyalty Copiers 5G Screen Mirroring Politics Frequently Asked Questions Virtual Private Network Advertising Books Workforce Best Available Quick Tip WIndows 7 Ergonomics Mobile Smartwatch Windows 10s Cables Notifications Development OLED Cast Virtual Machine Tip of the week Project Management webinar Nanotechnology Emergency Telecommuting Science PCI DSS 2FA Fiber Optics Professional Services Employee Public Cloud Employer Employee Relationship Cortana Relocation Assessment Digital Signature Messaging Cabling Hypervisor Windows Server 2008 Warranty Distributed Denial of Service Customer Relationship Management Policy Analyitcs User Dark mode PowerPoint Trend Micro Tools Windows Media Player Video Games HVAC Google Apps Television Analysis Programming SMS Default App Worker Commute Saving Time Experience Administrator Devices Procedure Managing Stress dark theme Shopping Google Search Scalability Enterprise Content Management MSP Antivirus Public Computer Accountants AI IT Infrastructure Business Owner Cameras Regulations Microchip Bing Thought Leadership NarrowBand Transportation Credit Cards Windows 8 FinTech Password Manager Social Network Search Computer Fan Password Management IT service Rootkit iPhone Multi-Factor Security Investment Employee/Employer Relationships Search Engine Workers Twitter Benefits Tablet Employees Business Mangement Windows 365 ISP FENG NIST Domains Files IBM Smart Tech Trending Video Conferencing ROI Printer Server Bitcoin Flash Shortcuts IaaS Addiction Maintenance Chromecast Smart Technology Amazon Sales

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code