Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

Latest Ransomware Attack is Brutal Reminder of Cyber Security Importance

A new malware swept across the globe Tuesday, incorporating facets of many ransomwares that have made headlines recently. While it originally appeared to be a variant of the Petya ransomware, it has been determined that it shares more in common with WannaCry. However, “NotPetya,” as it has been named, has a few additional features that experts say make it worse than either of its predecessors.

Why NotPetya Isn’t Really a Ransomware
The first clue that researchers had that NotPetya had a different motivation was the fact that the ransom only demanded the Bitcoin equivalent of $300. Secondly, the only means of getting the decryption key was to send an email to an address hosted by German email provider Posteo. Despite the lack of preparation the payment method appeared to have, NotPetya itself was clearly designed to be able to infiltrate as many networks as possible and do maximum damage once inside.

A Hybrid Hacking Attack
Since the attack commenced, researchers have ascertained that despite its initial similarities with Petya, NotPetya shares many traits with other malicious programs. Like WannaCry, the attack that affected much of Europe, NotPetya leverages EternalBlue. EternalBlue is a National Security Agency hacking tool that targets unpatched systems and steals the passwords that allow administrator access. In addition to EternalBlue, NotPetya also utilizes EternalRomance, another code that was stolen from the NSA.

Once NotPetya has infected one computer, it extracts passwords from its memory or the local filesystem to allow itself to spread--including onto updated and patched Windows 10 systems.

How To Protect Your Files
First off, don’t expect that you can retrieve your files just by paying the ransom. Even if those responsible for NotPetya intended to keep their word and return them once paid, Posteo has shut down the provided email account victims were to receive their keys from. As a result, unless a victim was already following certain best practices, their files are as of yet unrecoverable.

However, this does not mean that everyone is vulnerable to this attack. Before the EternalBlue and EternalRomance exploits were distributed on the dark web, Microsoft had already released patches for the vulnerabilities. However, if these patches were not applied, a user’s systems were (and are) still vulnerable.

The best method to avoid infection from this kind of attack is to ensure your users understand the importance of cyber security efforts, and that all of your business’ systems are reinforced against the latest threats by keeping your defenses up-to-date.

Furthermore, even an infected user is not without hope if they have been backing up their files. If they have done so, all they have to do is disconnect their computer from the Internet, reformat their hard drive and restore their data from their backup solution. However, for this to work, you have to also be sure that your backups are up-to-date, and that your backup is stored in an isolated location, separate from your network.

Voyage Technology has the experience and expertise to help prevent you from becoming a victim of a malware like this, whether we help you manage your backups or help educate your users to avoid attacks like these in the first place. Give us a call at 800.618.9844 today.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 05 May 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware Phishing IT Support Workplace Tips Privacy Google Email Computer Workplace Strategy Collaboration Small Business Hosted Solutions Backup Users Ransomware AI Managed Service Mobile Device Productivity Microsoft Quick Tips Passwords Saving Money Communication Cybersecurity Data Backup Smartphone Data Recovery Disaster Recovery Android VoIP Upgrade Business Management Smartphones Mobile Devices communications Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Miscellaneous Information Holiday Automation Artificial Intelligence Facebook Covid-19 Gadgets Cloud Computing Training Compliance Remote Work Server Managed Service Provider IT Support Outsourced IT Encryption Spam Employee/Employer Relationship Office Windows 10 Government Data Management Business Continuity Virtualization Wi-Fi Business Technology Windows 10 Bandwidth Blockchain Data Security Vendor Apps Managed Services Two-factor Authentication Mobile Office Apple Networking App Employer-Employee Relationship BYOD Voice over Internet Protocol Mobile Device Management Tip of the week Chrome Gmail Budget WiFi Managed IT Services How To HIPAA BDR Applications Computing Physical Security Hacker Information Technology Avoiding Downtime Conferencing Marketing Access Control Office 365 Password Big Data Router Operating System 2FA Computers Help Desk Virtual Private Network Risk Management Website Health Healthcare Office Tips Analytics Augmented Reality Retail Storage Bring Your Own Device Social Solutions Going Green Patch Management Save Money Remote Monitoring Vulnerability End of Support Vendor Management Windows 11 Customer Service Cybercrime Monitoring Excel Display Printer Paperless Office Managed IT Service Remote Workers Infrastructure Telephone Firewall Document Management Cooperation Free Resource Project Management Windows 7 The Internet of Things Scam Data loss Microsoft 365 Administration Employees Integration Robot Modem Customer Relationship Management User Tip Processor Settings Mobile Security Printing Wireless Holidays Content Filtering Hacking IT Management Presentation VPN Data Storage YouTube Meetings Smart Technology Supply Chain Cryptocurrency Video Conferencing Wireless Technology Managed Services Provider Virtual Machines Computer Repair Professional Services Saving Time Virtual Desktop Data storage LiFi Downloads Word iPhone Outlook Machine Learning Licensing Money Vulnerabilities Humor Entertainment Data Privacy Maintenance Safety Images 101 Antivirus Sports Mobility Mouse Telephone System Multi-Factor Authentication Cost Management Mobile Computing Content Remote Working Wearable Technology Memory Vendors Search Comparison Google Play Be Proactive Health IT Tablet Motherboard Data Breach Directions Videos Application Best Practice Assessment Electronic Health Records Alert Permissions Workforce Managed IT Buisness File Sharing Wasting Time Threats Dark Data Trend Micro How To Specifications Security Cameras Workplace Strategies IBM Legal IT solutions Microchip Business Growth Internet Exlporer Software as a Service Notifications Fraud Meta Username Travel Managing Costs Amazon eCommerce Cortana Black Friday SSID Techology Google Maps Alt Codes Database Surveillance Virtual Assistant Outsource IT Media Competition Downtime Unified Threat Management IT Technicians Virtual Machine Environment Cookies Cyber Monday Medical IT Unified Threat Management Proxy Server Reviews Hosted Solution Typing Tactics Development Hotspot Transportation Small Businesses Mirgation Hypervisor Displays Network Congestion Nanotechnology Optimization Knowledge PowerPoint Google Drive User Error Shopping User Addiction Language Employer/Employee Relationships Outsourcing Navigation Management PCI DSS Point of Sale Chatbots 5G Screen Reader Experience Distributed Denial of Service Workplace IP Address Google Docs Gig Economy Unified Communications Bitcoin Network Management Service Level Agreement Internet Service Provider Running Cable Tech Support Computing Infrastructure Teamwork Hiring/Firing Evernote Paperless Google Wallet Regulations Compliance Identity Monitors Smart Tech Memes Co-managed IT Bookmark Recovery Hard Drives Windows 8 Download Net Neutrality Laptop Websites Alerts SQL Server Technology Care Business Communications Domains Drones Financial Data History Connectivity IT Electronic Medical Records Break Fix Scams SharePoint Browsers Smartwatch Refrigeration Upload Procurement Halloween Azure Hybrid Work Multi-Factor Security Tech Human Resources Public Speaking Lenovo Social Network Telework Cyber security Writing IoT Communitications Virtual Reality Dark Web Cables Lithium-ion battery CES Hacks Server Management Trends Supply Chain Management Entrepreneur Scary Stories Private Cloud Google Calendar Term Google Apps Superfish Customer Resource management FinTech Identity Theft Regulations Fun Deep Learning Star Wars IT Assessment Twitter Microsoft Excel IT Maintenance Data Analysis Undo Gamification Flexibility Error Staff Value Business Intelligence Social Engineering Legislation Shortcuts Organization Education Social Networking Smart Devices Remote Computing Ransmoware Fileless Malware Digital Security Cameras

Blog Archive