From the course: Ethical Hacking: Denial of Service

Unlock the full course today

Join today to access over 22,600 courses taught by industry experts or purchase this course individually.

Understanding Petya

Understanding Petya

From the course: Ethical Hacking: Denial of Service

Start my 1-month free trial

Understanding Petya

- Petya is an example of ransomeware. Released in March 2016 but is different to earlier ransomware in that it encrypts the master file table on a victim's Windows system. The result of this is that the victim cannot access any of their files. This is much quicker and more comprehensive but the file data does still remain on disk in accessible form, albeit difficult to piece together. The malware has been used in a malicious email campaign which targeted the human resource departments of German companies. Staff in the HR team received emails from an applicant seeking a position in the company. The email would include a hyperlink to a Dropbox storage location to download the applicant's CV. The Dropbox actually contained a JPEG of the applicant and a self-extracting executable. The first action of the executable, once loaded, was to connect to it's commanding control server and download the Petya malware onto the victim computer. When Petya first starts, it changes the master boot…

Contents