Skip to main content

Arm your PC against the global NotPetya ransomware attack with these easy tips

NotPetya ransomware
Trend Micro
On June 26, 2017, a new type of ransomware called NotPetya began attacking computing systems across the globe. It originally targeted major systems in the Ukraine including banks, postal services, airports, power companies, and more. But it quickly spread outside its targeted zone, expanding across 64 countries including Brazil, Germany, Russia, and even the United States. We take a look at what this NotPetya ransomware is, what systems are affected, and how you can stand guard against this specific attack.

What is the NotPetya ransomware?

NotPetya (or Petwrap) is based on an older version of the Petya ransomware, which was originally designed to hold files and devices hostage in turn for Bitcoin payment. However, despite NotPetya’s attempt to collect money in its fast-moving global attack, it doesn’t appear to be strictly out for money. Instead, NotPetya is encrypting the filesystems of machines to damage companies. The ransomware aspect is apparently just a cover.

What makes NotPetya dangerous is that underneath the ransomware-based front is an exploit called EternalBlue, allegedly designed by the United States National Security Administration (aka the NSA). It targets a specific, vulnerable network protocol called Server Message Block (version 1) used for sharing printers, files, and serial ports between networked Windows-based PCs. Thus, the vulnerability allows remote attackers to send and execute malicious code on a target computer. The Shadow Brokers hacker group leaked EternalBlue in April of 2017.

The NotPetya ransomware also includes a “worm” component. Typically, victims fall prey to ransomware by downloading and executing malware disguised as a legitimate file attached in an email. In turn, the malware encrypts specific files and posts a popup window on the screen, demanding payment in Bitcoins to unlock those files.

However, the Petya ransomware that surfaced in early 2016 took that attack a step further by encrypting the PC’s entire hard drive or solid state drive by infecting the master boot record, thus overwriting the program that begins the Windows boot sequence. This resulted in an encryption of the table used to keep track of all local files (NTFS), preventing Windows from locating anything stored locally.

Despite its ability to encrypt an entire disk, Petya was only capable of infecting a single target PC. However, as seen with the recent WannaCry outbreak, ransomware now has the capability to move from PC to PC on a local network without any user intervention. The new NotPetya ransomware is capable of the same lateral network infestation, unlike the original Petya version.

According to Microsoft, one of NotPetya’s attack vectors is its ability to steal credentials or re-use an active session.

“Because users frequently log in using accounts with local admin privileges and have active sessions opens across multiple machines, stolen credentials are likely to provide the same level of access the user has on other machines,” the company reports. “Once the ransomware has valid credentials, it scans the local network to establish valid connections.”

The NotPetya ransomware can also use file-shares to multiply itself across the local network, and infest machines that are not patched against the EternalBlue vulnerability. Microsoft even mentions EternalRomance, another exploit used against the Server Message Block protocol supposedly conjured up by the NSA.

“This is a great example of two malware components coming together to generate more pernicious and resilient malware,” said Ivanti Chief Information Security Officer Phil Richards.

On top of NotPetya’s fast, widespread attack, there exists another problem: payment. The ransomware provides a popup window demanding victims to pay $300 in Bitcoins using a specific Bitcoin address, Bitcoin wallet ID, and personal installation number. Victims send this information to a provided email address that responds with an unlock key. That email address was quickly shut down once German parent email provider Posteo discovered its evil intent.

“We became aware that ransomware blackmailers are currently using a Posteo address as a means of contact. Our anti-abuse team checked this immediately – and blocked the account straight away,” the company said. “We do not tolerate the misuse of our platform: The immediate blocking of misused email accounts is the necessary approach by providers in such cases.”

That means any attempt to pay would never get through, even if payment were the goal of the malware.

Finally, Microsoft indicates that the attack originated with Ukrainian company M.E.Doc, the developer behind the MEDoc tax accounting software. Microsoft doesn’t appear to be pointing fingers, but instead stated that it has proof that “a few active infections of the ransomware initially started from the legitimate MEDoc updater process.” This type of infection, notes Microsoft, is a growing trend.

What systems are at risk?

For now, the NotPetya ransomware seems to be focused on attacking Windows-based PCs in organizations. For example, the entire radiation monitoring system located in the Chernobyl nuclear power plant was knocked offline in the attack. Here in the United States, the attack hit the entire Heritage Valley Health System, affecting all facilities that rely on the network, including the Beaver and Sewickley hospitals in Pennsylvania. The Kiev Boryspil Airport in the Ukraine suffered flight schedule delays, and its website was knocked offline due to the attack.

Unfortunately, there’s no information pointing to the exact versions of Windows the NotPetya ransomware is targeting. Microsoft’s security report doesn’t list specific Windows releases, although to be safe, customers should assume that all commercial and mainstream releases of Windows spanning Windows XP to Windows 10 fall within the attack window. After all, even WannaCry targeted machines with Windows XP installed.

Who do you protect yourself against it?

Microsoft has already issued updates blocking the EternalBlue and EternalRomance exploits used by this latest malware outbreak. Microsoft addressed both on March 14, 2017, with the release of security update MS17-010. That was more than three months ago, meaning companies attacked by NotPetya through this exploit have yet to update their PCs. Microsoft suggests that customers install security update MS17-010 immediately, if they haven’t done so already.

Installing the security update is the most effective way to protect your PC

For organizations that can’t apply the security update just yet, there are two methods that will prevent the spread of the NotPetya ransomware: disabling Server Message Block version 1 completely, and/or creating a rule in the router or firewall that blocks incoming Server Message Block traffic on port 445.

There’s one other simple way to prevent infection. Start by opening File Explorer and loading up the Windows directory folder, which is typically “C:\Windows.” There you will need to create a file named “perfc” (yes with no extension) and set its permissions to “Read Only” (via General/Attributes).

Of course, there’s no actual option to create a new file in the Windows directory, just the New Folder option. The best way to create this file is to open Notepad and save a blank “perfc.txt” file in the Windows folder. After that, simply delete the “.txt” extension in the name, accept Window’s popup warning, and right-click on the file to change its permissions to “Read Only.”

Thus, when NotPetya infects a PC, it will scan the Windows folder for that specific file, which is actually one of its own filenames. If the perfc file is already present, NotPetya assumes that the system is already infected, and becomes dormant. However, with this secret now public, hackers may go back to the drawing board and revise the NotPetya ransomware to depend on a different file.

Editors' Recommendations

Kevin Parrish
Former Digital Trends Contributor
Kevin started taking PCs apart in the 90s when Quake was on the way and his PC lacked the required components. Since then…
This 17-inch HP laptop is on sale for just $300 — but hurry!
The HP 17t-cn300 17.3-inch laptop against a white background.

If you want to buy a laptop with a relatively large screen, the good news is that you don't have to break the bank with your purchase because you can get the HP Laptop 17t for a very affordable $300. It's on sale from HP with a $200 discount on its original price of $500, but there's no telling how much time is remaining before this offer expires. We don't think it will stay available for long because laptop deals like this almost always get sold out quickly, so complete the transaction as soon as possible to make sure that you don't miss out on the savings.

Why you should buy the HP Laptop 17t
With the 17.3-inch display of the HP Laptop 17t, you'll have a lot of screen real estate to work on your projects and watch streaming shows. It's pretty affordable for a laptop with this large screen, which offers HD+ resolution for sharp details and vibrant colors. However, despite its big display, the HP Laptop 17t maintains portability because it's only 0.78 of an inch thick, which makes it easy to slide into your bag when you're on the go, and it won't be too heavy to carry around because it only weighs about 4.6 pounds.

Read more
What to do if your Intel CPU keeps crashing
Pins on Core i9-12900K.

Despite being among the best processors you can buy, some high-end Intel CPUs have faced a wave of instability over the past few months. Intel is investigating the problem, but the company and its motherboard partners have already worked toward some temporary fixes to improve stability on high-end Intel CPUs -- even if it comes at a performance cost.

Before getting into the fixes, keep in mind that they are temporary. Intel will release a statement on the instability soon, likely with more direct guidance on what affected users should do. In addition, the scope of the problem isn't clear -- if you're not experiencing issues, you shouldn't have anything to worry about.
Who's affected

Read more
HP Envy deals: HP’s most popular laptop starts at $630
An HP Envy 17-inch laptop sits on an office desk.

HP is one of the best laptop brands in the laptop space, with a huge selection of laptops to pick from, including some of the best laptops on the market. More specifically, though, the HP lineup is probably at the top when it comes to versatile and relatively well-valued laptops. While there are quite a few variations and configurations of the HP Envy, we've gone ahead and put together the ones that we think will give you the most bang for your buck. That said, if you haven't found something you're specifically looking for, be sure to check out some of these other great laptop deals as well.
HP Envy x360 2-in-1 laptop 15Z-FH000 — $650, was $900

The HP Envy x360 convertible laptop is a great option for just about anyone, particularly anyone who enjoys the touchscreen functionality of a tablet. It’s well designed and super slim, making it a truly go-anywhere device. Despite its portability, it still has an immersive 15.6-inch touchscreen that’s great for creators, note-takers, and binge watchers. Top notch build quality and durability, fast charging technology, a fingerprint reader, and great battery life round out the top features of the HP Envy x360 convertible touchscreen laptop. It competes well with the best 2-in-1 laptops. Its versatility and all-around capability make it a worthy companion on any desk, and on any lap.

Read more