logo

Computer Security Breach - Notpetya Cyber Attack

8 Pages2322 Words148 Views
   

Added on  2020-02-24

Computer Security Breach - Notpetya Cyber Attack

   Added on 2020-02-24

ShareRelated Documents
PART ACOMPUTER SECURITY BREACH TOOK PLACE IN JUNE 2017- NOTPETYA CYBER ATTACKINTRODUCTIONThere seems to be a data security breach almost on a daily basis, so much that every time it hits an organization or a country, the loss is repairable. One such that took place in themont of June 2017 was by the name of Petya which is not a ransomware attack but a wiper. The said attack’s consequences are found to be much more alarming than construed by people. It had ended up attacking and destroying the networks of various companies across Europe. Generally security breaches lead to utilization of stolen data but not destruction of the same, however the said attack leads to the later i.e. destruction of data on a huge scale. The attackers were never inclined towards a motive of obtaining any sort of financial gain from these entities and such other victims. The earlier version of the same attack was not as deadly as the 2017 version which is termed as ‘wiper’ by various researchers. The malicious software is known as Petya, NotPetya, ExPet, Nyetya and such other names (Hackett, 2017). Here the issue lies is that the data once destroyed cannot be retrieved again. ASSESSMENT OF THE ISSUEThus it is understood that the said attack is even more worse than any such ransomware attacks wherein the victim at least has the surety to get hold of the stolen data. Unfortunately the latest version of this attack leads to permanent deletion of significant data. Europe and USA have been the main victims of the said attack. Companies such as WPP, Mondelez a food company, DLA Piper- a law firm and Danish Shipping and transport firm Maersk wherein the information has been taken into custody by the attackers and ransomware
Computer Security Breach - Notpetya Cyber Attack_1
is being demanded for. Petya has been found successful in abusing the EternalBlue and EternalRomance vulnerabilities in Microsoft’s systems ((Brandom, 2017). As per the security company, Kaspersky Lab, the hack had infected around 2000 systems in around more than a dozen countries. As mentioned above, the Eternal Blue was not only the way this virus could spread, however there were other means also (McGoogan. 2017). Unfortunately, this is even more dangerous than the WannaCry attack which took place in May 2017 since there seems to be no immediate remedy to deal with the said hack. Petya’s main motive is not to destroy the single files or documents but to infect the entire hard drive of a system. Thereby the issue here is not only the attacking of the systems but to ensure that they stop working in totality. Pravda, a Ukranian organization has stated that its systems at Chernobyl nuclear plant has been a victim of the said virus. Similarly, Maersk has also confirmed that its systems in Rotterdam has been infected. Seventeen shipping container terminals run by APM terminals have been infected too wherein two are stated in Rotterdam and the rest in various other partsof the world. However, the intensity of the virus attack is no deep and the rate at which it has been spread on a world wide scale infecting major business houses and infrastructural facilities, it seems that it is not possible to halt it from spreading further. Unfortunately the source of the said attack is still being searched upon by the researchers (Rothwell et.al. 2017).Although it being guessed that the main start is from Ukraine. SOLUTIONS TO PREVENT SUCH HACKSSince EternalBlue and EternalRomance weakness of the Microsoft has been one of the major issues behind the attack, one of the very prominent solution to prevent such attacks is by regular updating the MS Windows program, by mounting the March’s crucial patch which helps to fight against the said weakness is found to be one of the main ways out to stop
Computer Security Breach - Notpetya Cyber Attack_2
the spread of such an attack. This will also help to protect against the attacks in future as well with various payloads. Also various anti-virus entities have recently said that their software have already been updated to be able to detect and protect against the said anti-virus (Haynes,2017). Another very important way to safeguard oneself from such attacks is by taking a backup of all files on a regular basis so the impact of such attacks would not be felt too harshly. Apart from this, if the system is attacked by Petya, then the procedure for the same is that after infecting the PCs, it waits for an hour before the system is rebooted. Thus when the system is rebooting the user should switch off the machine so that files will not get corrupted and soon the system should be disconnected from the internet. The hard drive should be immediately reformatted and then the back-up files reloaded again. This would enable safeguarding of the system from the anti-virus attack (Solon & Hern, 2017).CONCLUSIONHence it can be summarized as an attack which is even more dangerous than those which demand ransom like the WannaCry. May 2017 had seen one fothe worst in the history of cyber attacks but June 2017 had seen even worser wherein the entire hard drive gets infected to such an extent that the files are destroyed permanently leaving the user with no option of recovery if back-ups are not taken. Thus full efforts should be made to ensure that the system is updated with the latest anti-virus along with adequate back-ups so that recovery is not an issue.
Computer Security Breach - Notpetya Cyber Attack_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Introduction to Cyber Attacks
|8
|2095
|327

Computer Security Breach in Notpetya Cyber Attack
|10
|2248
|160

ITC595 Information Security
|12
|2472
|132

Information Security in an Organization
|12
|2808
|45

ASSIGNMENT WHAT IS CYBER CRIME ?
|8
|1982
|28

Search the Web for News on Computer Security Breaches
|7
|2118
|43