Petya Ransomware a 'Ruse' to Hide Cyber-Attack Culprit, Claim Researchers

Advertisement
By Ellen Nakashima, The Washington Post | Updated: 3 July 2017 09:39 IST
Highlights
  • Petya malware is doubted to be more than just a money-making ransomware
  • Petya ransomware attack hit major global companies on Tuesday
  • Mumbai's JNPT post also reported to be compromised by the attack

The cyber-attack that crippled computer systems in Ukraine and other countries this week employed a ruse - the appearance of being ransomware - that seems designed to deflect attention from the attacker's true identity, security researchers said.

And many companies initially fell for it.

The first reports out of cyber-security firms on Monday, when news of the attack hit, was that a new variant of WannaCry, a virus that encrypted data and demanded a ransom to restore it, was on the loose.

Advertisement

In fact, a number of researchers said this week, the malware - which researchers are calling NotPetya - does not encrypt data, but wipes its victims' computers. If the data is not backed up, it's lost, they said.

Advertisement

"It definitely wasn't ransomware and wasn't financially motivated," said Jake Williams, founder of Rendition Infosec, a cyber-security firm, which has analysed the virus. "The goal was to cause disruption in computer networks."

Moreover, the email address to make a payment to retrieve data is no longer accessible, said Matt Suiche, a hacker and founder of Comae Technologies, a cyber-security firm.

Advertisement

He said in a blog post this week that the ransomware feint was likely a way to make people think "some mysterious hacker group" was behind the attack rather than a nation state.

"The fact of pretending to be a ransomware while being in fact a nation state attack . . . is in our opinion a very subtle way for the attacker to control the narrative of the attack," Suiche said.

Advertisement

Security researchers cautioned that it is too early to know for sure who is behind it. But some say that the targeting and distribution method of the malware point to Russia.

More than half the victimized computers were in Ukraine, including banks, energy firms and an airport.

Russia, which has annexed Crimea and has backed separatists in eastern Ukraine, has carried out an aggressive campaign of cyber-attacks and harassment there.

In December, Russian government hackers disrupted the power grid in Kiev and a year earlier they knocked out power in western Ukraine.

In this case, to get into victims' computers, attackers infected a financial software program in Ukraine, called MEDoc, that delivers software updates to businesses through the Internet.

That's called a "watering hole" attack, which targets users who navigate to the site for updates or to browse. It is also a tactic that Russian government hackers have used in the past to compromise industrial control system networks, Williams noted.

MEDoc is one of only two software options Ukrainian businesses have to pay their taxes, noted Lesley Carhart, an information security expert.

"This was a clever choice" for several reasons, she noted in a blog post, including that the "distribution base" within the country was "extremely comprehensive" as many companies used the software.

NotPetya did not spread across the open Internet, she said in an email. "Its tactic was to compromise a few computers inside a network" once the hacker got in, say, by delivering the malware through MEDoc. Then it could rapidly spread to other computers in the same network using a variety of other methods.

"While most 'patient zero' computers were in Ukraine . . . the corporate networks those computers [connect to] could potentially span the globe, and infection could also spread to any customers, partners, or vendors with whom they had unrestricted network connections and shared accounts," she said.

That might explain how US pharmaceutical giant Merck, the Danish shipping firm Maerskeven and the Russian oil company Rosneft got infected.

The Rosneft infection might be an unintended consequence - collateral damage, Williams said.

Valentyn Petrov, head of the information security service at Ukraine's National Security and Defense Council, said that the attack's timing, on the eve of Ukraine's Constitution Day, indicated this was a political attack.

"We are in an interesting test phase in which Russia is using modern cyber weapons," Petrov said, "and everyone is interested to see how it is working - and how threats can be countered."

© 2017 The Washington Post

 

Get your daily dose of tech news, reviews, and insights, in under 80 characters on Gadgets 360 Turbo. Connect with fellow tech lovers on our Forum. Follow us on X, Facebook, WhatsApp, Threads and Google News for instant updates. Catch all the action on our YouTube channel.

Advertisement

Related Stories

Popular Mobile Brands
  1. DJI Osmo Pocket 4 Debuts With 1-inch CMOS Sensor, Improved Stabilisation
  2. Vivo X300 Ultra, Vivo X300 FE Confirmed to Launch in India Soon
  3. Asus Zenbook S14 (2026) First Impressions
  4. Indian Smartphone Shipments Dropped to a Six-Year Low in Q1 2026: Report
  5. Vivo X300 FE Could Be Available in These Two Storage Options in India
  1. Scientists Just Created the Largest 3D Map of the Universe Ever to Study Dark Energy
  2. Honor 600 Pro and Honor 600 Key Specifications, Features Revealed via Official Listing
  3. Ethereum NFT Platform Shuts Down After Blacklove Sale Falls Through
  4. Vivo X300 FE Storage Options Leaked Alongside Live Image With Telephoto Extender Kit
  5. Indian Smartphone Shipments Dropped to Six-Year Low in Q1 2026 as Vivo Topped Market, Nothing Led Growth: Counterpoint
  6. Canva Introduces Canva AI 2.0, Brings Agentic Capabilities and Memory to Perform Design Tasks
  7. MediaTek Dimensity 9600 Pro Leak Suggests 5GHz Clock Speed, High Benchmark Scores
  8. Oppo Find X9s Pro Key Specifications Surface Online as Launch Date Draws Closer
  9. Russian-Based Crypto Exchange Grinex Halts Operation After $14 Million Hack
  10. Assassin's Creed: Black Flag Resynced Will Reportedly Release in July, Reveal Set for Next Week
Download Our Apps
Available in Hindi
© Copyright Red Pixels Ventures Limited 2026. All rights reserved.