Petya Ransomware Cyber Attack
- Pens a message to the raw disk partition.
- Clears the Windows Event log using Wevtutil
- Restarts the machine
- Encrypts files matching a list of file extensions (including .3ds, .7z, .accdb, .ai, .asp, .aspx, .avhd, .back, .bak, .c, .cfg, .conf, .cpp, .cs, .ctl, .dbf, .disk, .djvu, .doc, .docx, .dwg, .eml, .fdb, .gz, .h, .hdd, .kdbx, .mail, .mdb, .msg, .nrg, .ora, .ost, .ova, .ovf, .pdf, .php, .pmf .ppt, .pptx, .pst, .pvi, .py .pyc, .rar, .rtf, .sln, .sql, .tar, .vbox, .vbs, .vcb, .vdi, .vfd, .vmc, .vmdk, .vmsd, .vmx, .vsdx, .vsv, .work, .xls, .xlsx, .xvd, and .zip)
- Leverages WMI or PsExec to spread
- Presents a text message on the screen of the user, demanding ransom for files recovery.
Prevention Of Petya In Microsoft Azure Security Center
- Deploy Endpoint Protection
- Compute pane
- Selection Of And Installation
- Availability
Detection Of Petya In Microsoft Azure Security Center
- Detection Feature For Standard-Tier Azure Security Center
- Alert For Petya Ransomware