The malware requires administrator rights to the local computer. Standard users should not have this in permission. Consider restricting who has local admin rights to prevent execution of exploit code within organisations. Home users should also consider using a Standard User Account for day-to-day operations.
Access Director can help you by removing permanent local admins.
Recommendations for Enterprises
- Deploy the latest Microsoft patches, including MS17-010 which patches the SMB vulnerability.
- Consider disabling SMBv1 to prevent spreading of malware.
- Educate end-users to remain vigilant when opening attachments or clicking on links from senders they do not know.
- Ensure you have the latest updates installed for your anti-virus software.
- Ensure you have backup copies of your files stored on local disks. Generally, user files on local drives are replicated from a network share
- Prevent users from writing data outside of designated areas on the local hard disk to prevent data loss if attack occurs.
- Operate a least privileged access model with employees. Restrict who has local administration access.
Petya does not encrypt files. it encrypts the Master File Table, which is the index of where all the files are stored on a hard disk drive.
“Petya uses the NSA Eternalblue exploit but also spreads in internal networks with WMIC and PSEXEC. That’s why patched systems can get hit.”
Mikko Hypponen confirms, Chief Research Officer at F-Secure.
PT Security, a UK-based cyber security company and Amit Serper from Cybereason, have discovered a Kill-Switch for Petya ransomware. According to a tweet, company has advised users to create a file i.e. “C:\Windows\perfc” to prevent ransomware infection.
You must log in to post a comment.