Petya (malware family)

Petya
ASCII art of a skull and crossbones is displayed as part of the payload on the original version of Petya.
Malware details
TypeMalware
SubtypeCryptovirus
ClassificationRansomware
Technical details
PlatformWindows

Petya is a family of encrypting malware that was first discovered in 2016. The malware targets Microsoft Windows–based systems, infecting the master boot record to execute a payload that encrypts a HDD or SSD file system table and performs a fake CHKDSK after a restart. This prevents Windows from booting, as the master boot record is overwritten; subsequently, Petya demands that users make a Bitcoin payment to regain access.

Variants of Petya were first seen in March 2016, which propagated via infected e-mail attachments. In June 2017, a new variant of Petya was used for a global cyberattack, primarily targeting Ukraine. The new variant propagates via the EternalBlue exploit, which is generally believed to have been developed by the U.S. National Security Agency (NSA), and was used earlier in the year by the WannaCry ransomware. Kaspersky Lab referred to this new version as NotPetya to distinguish it from the 2016 variants, due to these differences in operation. Although it appeared to be ransomware, due to its lack of a decryption method, it was equivalent to a wiper. The NotPetya attacks have been blamed on the Russian government, specifically the Sandworm hacking group within the GRU Russian military intelligence organization, by security researchers, Google, and several governments.