OMNI Solutions Group Blog

OMNI Solutions Group has been serving the Washington D.C. metropolitan area since 1994, providing IT Support such as technical help-desk support, computer support, and consulting to small and medium-sized businesses.

Alert: Petya Ransomware May Be the Worst Yet

Alert: Petya Ransomware May Be the Worst Yet

Ransomware is such a popular method of attack used by hackers that new variants of it pop up every few months. Among these is Petya, a nasty new ransomware that masquerades as an unsolicited resume in an organization’s email inbox. Don’t be fooled, though; the only work these hackers are looking for is to work you out of a couple hundred dollars.

Once the file has been downloaded, Petya causes a Windows error and forces the system to endure the typical “blue screen of death,” causing a reboot. The computer will then display a red skull and crossbones, and a fraudulent “system check” infects and encrypts the master file table (MFT) with military-grade encryption protocol. This causes the computer to basically forget which files it has, and where they are stored.

Rather than closing access to particular files, Petya completely locks the user out of the system by overwriting the computer’s master boot record. The computer is essentially rendered useless by the user, who can’t even log in. Petya will display a list of demands, as well as how to meet them. As is the case with most ransomware, the ransom must be paid in Bitcoin. Once this has been done, the criminal supplies a decryption key that’s used to regain access to the files.

The initial cost for the decryption key is .99 Bitcoins, which is an estimated $430. However, paying for the decryption key isn’t that simple. Once the user accesses the payment page, they’re given a limited amount of time to access the key before the price is doubled. While there are some websites that claim there are commands that can allow users to skip the lock screen, the MFT will still be encrypted, rendering the files useless. Even if the user pays the ransom, there’s still no guarantee that the decryption key provided by the hackers will work. This is why we always suggest that you don’t pay the ransom, and instead contact a professional technician who can consult you on the situation.

In particular, business owners and human resources representatives who are responsible for the hiring procedure are the preferred targets. Petya is distributed through emails that are disguised as potential job seekers. The message will often contain a hyperlink that redirects to a Dropbox containing a resume, which is really just a Trojan horse containing Petya that’s capable of weaseling its way past your antivirus solution. Petya had been causing significant trouble for German businesses, but a programmer has found a solution. Admittedly, it’s a tricky solution to implement, but it’s still preferable to paying a ransom.

As is the case with most ransomware, your best chance of escaping unscathed is by dodging the attacks altogether. Ransomware is notoriously difficult to crack, even for seasoned IT veterans, but keeping a watchful eye on anything you find on the Internet can help you avoid infections. With OMNI Solutions Group’s security solutions, you can proactively detect and eliminate threats to your IT infrastructure. To learn more, give us a call at 301-869-6890.

Comments 1

 
AvaSneddon on Wednesday, 27 February 2019 04:22

The role of mistakes is well concern by the time as well as it also may concern by the time. There are well known best research writing services as well as by the relevant time which make the thing better as well as make it comfortable

The role of mistakes is well concern by the time as well as it also may concern by the time. There are well known [url=https://research-paper-writing-services.net/]best research writing services[/url] as well as by the relevant time which make the thing better as well as make it comfortable
Already Registered? Login Here
Guest
Wednesday, 22 January 2020
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Tip of the Week Technology Cloud Privacy Hackers Hosted Solutions Best Practices Backup Internet Business Business Computing IT Services Productivity Google Business Continuity Software Hardware Malware Miscellaneous Windows 10 Microsoft Disaster Recovery Mobile Device Management Innovation Computer Mobile Devices VoIP Mobile Computing Efficiency Data Windows Workplace Tips Managed Service Provider Smartphone Server IT Support Network Security Virtualization Save Money communications Upgrade Email Chrome Best Practice Small Business Office Android Budget Employer-Employee Relationship User Tips Holiday Hacking IT solutions Microsoft Office Network Data Management Outsourced IT BYOD VPN Information Technology Telephone Systems Recovery Application Quick Tips Apps Managed IT Avoiding Downtime Firewall Gmail Communication Computers Saving Money Bandwidth The Internet of Things Remote Computing Social Engineering Smartphones Ransomware Tablet Operating System Business Intelligence Automation Lithium-ion battery Hard Drives Wireless Technology Disaster Going Green Managed IT Services Passwords Hosted Solution Humor Government Streaming Media Mobility Telephony Unified Threat Management Cybercrime Office Tips Remote Monitoring Browser Private Cloud Risk Management Administration Network Congestion Big Data Health Proactive IT Phone System Cost Management BDR Spam Facebook DDoS WiFi Customer Service Gadgets Alert Biometrics Password Social Apple Saving Time Television Computer Accessories WIndows 7 Solid State Drive Buisness Science Domains Access Data Breach Antivirus Marketing History Customer Relationship Management Mouse Managing Stress Transportation IT consulting Law Enforcement App Avoid Downtime Robot Instant Messaging PowerPoint Wearable Technology Reputation Virtual Desktop SaaS Entertainment Networking Tech Support Bluetooth Data storage Phishing Regulations Presentation Running Cable Business Management Maintenance HaaS Shadow IT Human Resources Internet Exlporer Fax Server Google Drive Reliable Computing User Error Colocation IT Technicians Education Document Management Uninterrupted Power Supply Applications Bloatware hacker Storage User Analytics Save Time Internet of Things Collaboration Laptop Cameras iPhone Shortcut Trending Best Available HIPAA Benefits Sports SharePoint Touchpad Printer Distributed Denial of Service Search Update Safety Branding Files Social Media Teamwork Two-factor Authentication Printer Server eWaste Money Retail Excel Emergency Chromecast Meetings Operating Sysytem Near Field Communication intranet Virtual Reality Cybersecurity IT service Administrator