Free Web Submission http://addurl.nu FreeWebSubmission.com Software Directory www britain directory com education Visit Timeshares Earn free bitcoin http://www.visitorsdetails.com CAPTAIN TAREK DREAM: Breaking: Petya Ransomware Warning عاجل : مجلس الوزراء يحذر من فيروس فدية جديد

Wednesday, June 28, 2017

Breaking: Petya Ransomware Warning عاجل : مجلس الوزراء يحذر من فيروس فدية جديد


مركز المعلومات ودعم اتخاذ القرار بمجلس الوزراء - مصر

"يحذر المصريين أفراد ومؤسسات وشركات"

على الجميع وبخاصة المؤسسات ان تأخذ الحذر من تطبيق الفدية الخبيث الجديد

(Petya) 

(هذا التنويه يحتوي بعض التفاصيل الفنية الخاصة بانظمة تشغيل الحاسب الآلي ولكن هامة جدا لحماية الجميع من مخاطر الاحتيال والتعرض لضياع ملفات الكترونية هامة وما يصاحب هذا من أضرار مؤسسية وشخصية)


الملخص المفيد ان Petya يستغل نفس الثغرة الخاصة ب WannaCry و الموجودة فى بعض إصدارات نظام التشغيل ويندوز واللى اسمها Eternal Blue والتى تم تسريبها بواسطة مجموعة Shadow Brokers من NSA او وكالة الامن القومى الامريكية، وايضا بتستغل ال Open Shares على الشبكة الداخلية من خلال PSEXEC و WMIC، بالنسبة لتشفير الملفات Petya لديها نظام جديد فى تشفير الملفات بأنها لا تقوم بتشفير ملف ملف مثل WannaCry، بل تقوم بتشفير ال Master Boot Record او MBR الخاصة بالهارد ديسك بالكامل (فى حالة الحصول على صلاحيات Administrator) بحيث انها تمنع ال loader من انه يقرا اى file tables او جداول الملفات اللتى يكون بها كل معلومات الملفات الموجوده على جهازك بالكامل وتقوم بعرض رسالة؛ الرساله دى بتفيد ان ال MBR تم تشفيره بالكامل وانك يجب ان تدفع ٣٠٠ دولار فدية لكي تسترد ملفاتك، اما فى حالة عدم حصول Petya على صلاحيات Admin تقوم بتشفير الملفات بطريقة عادية جدا مثل اى ransomware سابق.

طريقة تشفير Petya لل MBR ليست جديده وهي اخطر كثيرا من تشفير الملفات لانه يصعب المهمه على ال researchers فى إيجاد علاج لهذا النوع بشكل سريع، تطبيق الفديه Petya ضرب الى الان اكتر من مؤسسة سواء حكومية او مؤسسات عامة دوليا ولذا وجب التنويه.


لتحقيق الحماية من هذا النوع من ال Ransomwares 
- اولا يجب تحديث نظام التشغيل ويندوز الخاص بك بأخر التحديثات وتحديدا التحديث اللى بيقوم بسد الثغرة الموضحه اعلاه، التحديث ومعلومات عن الثغرة نفسها موجود هنا: https://goo.gl/orDfJL 

- ثانيا يجب تعطيل بروتوكول SMB الاصدار ١ (مايكروسوفت قامت بتعطيله بالفعل فى اخر اصدار هيتم اصداره من ويندوز ١٠) طرق تعطيل البروتوكول بجميع اصداراته هنا: https://goo.gl/wNoNCN

- ثالثا حاول تتأكد ان ليس لديك اى فولدرات او اى موارد تمت مشاركتها على الشبكه المحلية وحاول تغلق ال sharing بالكامل وتفعل ال firewall الخاص بويندوز (ليس مجدى دائما لكن احيانا ينفع) 

- رابعاً الوقاية خير من العلاج فيجب الا يتم تحميل تطيبقات او انك تستلم ملفات من اشخاص غير معلومين ولا يتم الضغط على اى لينكات مشبوهه 

- خامساً النسخ الاحتياطى ثم النسخ الاحتياطى ثم النسخ الاحتياطى فى اماكن معزوله عن الانترنت بالكامل.


--- تحديث ١:

في حالة إصابة جهازك ب Petya Ransomware ماذا تفعل؟

اى جهاز يصاب ب الرانسوموير Petya بيحاول بعدها ان يعيد تشغيل جهازك وتظهر لك الرساله الخاصة بالدفع وفى ذات الوقت تحديدا بيبدأ Petya بتشفير ملفات الهارد درايف او ال MBR على حسب الصلاحيات اللى وصل لها قبل ال restart فيجب في هذا التوقيت بدلا من ان تعيد التشغيل او تبوت او boot من الهارد درايف الخاص بالجهاز، حاول تنزيل Hiren's Boot CD او اى Live CD وعدل خيارات ال boot فى جهازك بحيث ان يتم التشغيل من ال Live CD ثم يتم عمل نسخ احتياطى او ريكوفر للملفات الخاصة بالجهاز على قرص صلب خارجى مع عدم محاولة القيام بالتشغيل boot من القرص الصلب المتاح اطلاقاً.

(هذه المعلومات بمشاركة كريمة من احد الخبراء المصريين المميزين دوليا في مجال الامن السيبراني)


الحروب القادمة اقتصادية واجتماعية وسياسية ومعلوماتية سيكون جزء كبير منها من خلال الانترنت ولهذا اصبح الحذر والوعي والوقاية امر شديد الأهمية لكافة المؤسسات العامة والخاصة وكذلك للمجتمع.

'Petya' ransomware attack: what is it and how can it be stopped?

Companies have been crippled by global cyberattack, the second major ransomware crime in two months. We answer the key questions


The website homepage of British advertising company WPP after it was targeted by international cyber-attack ‘Petya’.

Many organizations in Europe and the US have been crippled by a ransomware attack known as “Petya”. The malicious software has spread through large firms including the advertiser WPP, food company Mondelez, legal firm DLA Piper and Danish shipping and transport firm Maersk, leading to PCs and data being locked up and held for ransom.

It’s the second major global ransomware attack in the past two months. In early May, Britain’s National Health Service (NHS) was among the organizations infected by WannaCry, which used a vulnerability first revealed to the public as part of a leaked stash of NSA-related documents released online in April by a hacker group calling itself the Shadow Brokers.


The WannaCry or WannaCrypt ransomware attack affected more than 230,000 computers in over 150 countries, with the NHS, Spanish phone company Telefónica and German state railways among those hardest hit.

Like WannaCry, “Petya” spreads rapidly through networks that use Microsoft Windows, but what is it, why is it happening and how can it be stopped?


What is ransomware?

Ransomware is a type of malware that blocks access to a computer or its data and demands money to release it.

How does it work?

When a computer is infected, the ransomware encrypts important documents and files and then demands a ransom, typically in Bitcoin, for a digital key needed to unlock the files. If victims don’t have a recent back-up of the files they must either pay the ransom or face losing all of their files.


How does the “Petya” ransomware work?

The ransomware takes over computers and demands $300, paid in Bitcoin. The malicious software spreads rapidly across an organization once a computer is infected using the EternalBlue vulnerability in Microsoft Windows (Microsoft has released a patch, but not everyone will have installed it) or through two Windows administrative tools. The malware tries one option and if it doesn’t work, it tries the next one. “It has a better mechanism for spreading itself than WannaCry,” said Ryan Kalember, of cybersecurity company Proofpoint.


Is there any protection?

Most major antivirus companies now claim that their software has updated to actively detect and protect against “Petya” infections: Symantec products using definitions version 20170627.009 should, for instance, and Kaspersky also says its security software is now capable of spotting the malware. Additionally, keeping Windows up to date – at the very least through installing March’s critical patch defending against the EternalBlue vulnerability – stops one major avenue of infection, and will also protect against future attacks with different payloads.


For this particular malware outbreak, another line of defence has been discovered: “Petya” checks for a read-only file, C:\Windows\perfc.dat, and if it finds it, it won’t run the encryption side of the software. But this “vaccine” doesn’t actually prevent infection, and the malware will still use its foothold on your PC to try to spread to others on the same network.

Why is it called “Petya”?

Strictly speaking, it is not. The malware appears to share a significant amount of code with an older piece of ransomware that really was called Petya, but in the hours after the outbreak started, security researchers noticed that “the superficial resemblance is only skin deep”.

Researchers at Russia’s Kaspersky Lab redubbed the malware NotPetya, and increasingly tongue-in-cheek variants of that name – Petna, Pneytna, and so on – began to spread as a result. On top of that, other researchers who independently spotted the malware gave it other names: Romanian’s Bitdefender called it Goldeneye, for instance.


Where did it start?

The attack appears to have been seeded through a software update mechanism built into an accounting program that companies working with the Ukrainian government need to use, according to the Ukrainian cyber police.

This explains why so many Ukrainian organizations were affected, including government, banks, state power utilities and Kiev’s airport and metro system. The radiation monitoring system at Chernobyl was also taken offline, forcing employees to use hand-held counters to measure levels at the former nuclear plant’s exclusion zone. A second wave of infections was spawned by a phishing campaign featuring malware-laden attachments.


How far has it spread?

The “Petya” ransomware has caused serious disruption at large firms in Europe and the US, including the advertising firm WPP, French construction materials company Saint-Gobain and Russian steel and oil firms Evraz and Rosneft.

The food company Mondelez, legal firm DLA Piper, Danish shipping and transport firm AP Moller-Maersk and Heritage Valley Health System, which runs hospitals and care facilities in Pittsburgh, also said their systems had been hit by the malware.

Crucially, unlike WannaCry, this version of ‘Petya’ tries to spread internally within networks, but not seed itself externally. That may have limited the ultimate spread of the malware, which seems to have seen a decrease in the rate of new infections overnight.


Shipping company Maersk’s IT system was impacted by the cyber-attack.

So is this just another opportunistic cybercriminal?

It initially looked like the outbreak was just another cybercriminal taking advantage of cyberweapons leaked online. However, security experts say that the payment mechanism of the attack seems too amateurish to have been carried out by serious criminals.

Firstly, the ransom note includes the same Bitcoin payment address for every victim – most ransomware creates a custom address for every victim. Secondly, the malware asks victims to communicate with the attackers via a single email address which has been suspended by the email provider after they discovered what it was being used for.

This means that even if someone pays the ransom, they have no way to communicate with the attacker to request the decryption key to unlock their files.


Who is behind the attack?

It is not clear, but it seems likely it is someone who wants the malware to masquerade as ransomware, while actually just being destructive, particularly to the Ukrainian government.

Security researcher Nicholas Weaver told cybersecurity blog Krebs on Security that ‘Petya’ was a “deliberate, malicious, destructive attack or perhaps a test disguised as ransomware”

Pseudonymous security researcher Grugq noted that the real Petya “was a criminal enterprise for making money,” but that the new version "is definitely not designed to make money".


“This is designed to spread fast and cause damage, with a plausibly deniable cover of ‘ransomware,’” he added, pointing out that, among other tells, the payment mechanism in the malware was inept to the point of uselessness: a single hardcoded payment address, meaning the money can be traced; the requirement to email proof of payment to a webmail provider, meaning that the email address can be – and was – disabled; and the requirement to send an infected machine’s 60-character, case sensitive “personal identification key” from a computer which can’t even copy-and-paste, all combine to mean that “this payment pipeline was possibly the worst of all options (sort of ‘send a personal cheque to: Petya Payments, PO Box … ’)”.


Ukraine has blamed Russia for previous cyber-attacks, including one on its power grid at the end of 2015 that left part of western Ukraine temporarily without electricity. Russia has denied carrying out cyber-attacks on Ukraine.

What should you do if you are affected by the ransomware?

The ransomware infects computers and then waits for about an hour before rebooting the machine. While the machine is rebooting, you can switch the computer off to prevent the files from being encrypted and try and rescue the files from the machine, as flagged by @HackerFantastic on Twitter.


If the system reboots with the ransom note, don’t pay the ransom – the “customer service” email address has been shut down so there’s no way to get the decryption key to unlock your files anyway. Disconnect your PC from the internet, reformat the hard drive and reinstall your files from a backup. Back up your files regularly and keep your anti-virus software up to date.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.