New global ransomware attack hits East Europe and spreading

Page 2 of 10 FirstFirst 1234 ... LastLast

  1. Posts : 56,830
    Multi-boot Windows 10/11 - RTM, RP, Beta, and Insider
       #11

    Whew!!!!!

    Zero-hour protection

    Malwarebytes detected this ransomware in the zero hour, meaning those that have Malwarebytes Premium or our standalone anti-ransomware technology have been protected from the instant this attack began. Both Malwarebytes business users and consumers users are protected if they are using the latest version of the above products.
      My Computers


  2. Posts : 30,603
    Windows 10 (Pro and Insider Pro)
    Thread Starter
       #12

    There are some instructions how to create perfc file in C:/Windows folder over at BleepingComputers:

    www.bleepingcomputer.com | news/security/vaccine-not-killswitch-found-for-petya-notpetya-ransomware-outbreak

    Basically, copying the Notepad.exe and renaming it to "perfc", than giving it "read only" permission.
      My Computers


  3. Posts : 1,079
    10 + Linux
       #13

    Defender: 1.247.197.0/Petya


    We have been protected now since Jun 27,2017 10:23 PM UTC: 1.247.197.0

    What's New - Microsoft Malware Protection Technologies
    Attached Thumbnails Attached Thumbnails New global ransomware attack hits East Europe and spreading-petya.png  
      My Computer


  4. Posts : 9,790
    Mac OS Catalina
       #14

    I was checking out the Norse tracking map and Microsoft was sending out a lot of attacks to servers in Washington DC. It looks like DC is the main target right now. Norse Attack Map
      My Computer


  5. Posts : 7,904
    Windows 11 Pro 64 bit
       #15

    AndreTen said:
    There are some instructions how to create perfc file in C:/Windows folder over at BleepingComputers:

    www.bleepingcomputer.com | news/security/vaccine-not-killswitch-found-for-petya-notpetya-ransomware-outbreak

    Basically, copying the Notepad.exe and renaming it to "perfc", than giving it "read only" permission.
    Beware of using the batch file in that link. It creates some other files including perfc.dat which Kaspersky Total Security promptly deleted.
      My Computers


  6. Posts : 30,603
    Windows 10 (Pro and Insider Pro)
    Thread Starter
       #16

    Steve C said:
    Beware of using the batch file in that link. It creates some other files including perfc.dat which Kaspersky Total Security promptly deleted.
    Thanks for warning Steve. One can usually trust the guys at Bleeping Computers. Will check it out. Kaspersky could react to changes in Windows dir...

    Edit: can't imagine what would trigger Kaspersky, except that it just reacts to creating files in C:\Windows..

    There are just 3 files, filled with some text (don't delete this.. is a vaccine ...) named perfc, perfc.dll and perfc.somtething else
      My Computers


  7. Posts : 2,979
    Windows 11
       #17

    I'm curious, how are these hackers able to get hold of NSA exploits?
    @bro67 Can you tell me what Norse tracking map is?
      My Computer


  8. Posts : 5,478
    2004
       #18

    AndreTen said:
    Disabling SMBv1 is smart move.
    but only if you don't use it to connect to you NAS or whatever of course...

    It was patched in march so if you run Windows update you should be OK.

    https://www.us-cert.gov/ncas/current...-Vulnerability
      My Computer


  9. Posts : 30,603
    Windows 10 (Pro and Insider Pro)
    Thread Starter
       #19

    lx07 said:
    but only if you don't use it to connect to you NAS or whatever of course...

    It was patched in march so if you run Windows update you should be OK.

    https://www.us-cert.gov/ncas/current...-Vulnerability
    Not really..
    "Petya uses the NSA Eternalblue exploit but also spreads in internal networks with WMIC and PSEXEC. That's why patched systems can get hit." Mikko Hypponen confirms, Chief Research Officer at F-Secure.
    System is patched for original Eternalblue (WannyCry), but not for other exploits.

    All major AV and Antimalware companies updated their software, so users are on the safe side by now. Industrial solutions are other story...
      My Computers


  10. Posts : 5,478
    2004
       #20

    AndreTen said:
    Not really..
    "Petya uses the NSA Eternalblue exploit but also spreads in internal networks with WMIC and PSEXEC. That's why patched systems can get hit." Mikko Hypponen confirms, Chief Research Officer at F-Secure.
    Ah interesting, I missed that bit. These only work if you are running Admin account (or with Admin rights) though correct?
      My Computer


 

  Related Discussions
Our Sites
Site Links
About Us
Windows 10 Forums is an independent web site and has not been authorized, sponsored, or otherwise approved by Microsoft Corporation. "Windows 10" and related materials are trademarks of Microsoft Corp.

© Designer Media Ltd
All times are GMT -5. The time now is 23:58.
Find Us




Windows 10 Forums