• There seems to be an uptick in Political comments in recent months. Those of us who are long time members of the site know that Political and Religious content has been banned for years. Nothing has changed. Please leave all political and religious comments out of the forums.

    If you recently joined the forums you were not presented with this restriction in the terms of service. This was due to a conversion error when we went from vBulletin to Xenforo. We have updated our terms of service to reflect these corrections.

    Please note any post refering to a politician will be considered political even if it is intended to be humor. Our experience is these topics have a way of dividing the forums and causing deep resentment among members. It is a poison to the community. We appreciate compliance with the rules.

    The Staff of SOH

  • Server side Maintenance is done. We still have an update to the forum software to run but that one will have to wait for a better time.

HU: New Peyta style ransomware demanding 300 Bitcoin

gman5250

Charter Member
Just wanted to post this heads up.

There's a new ransomware, similar to the WannaCry and using the same protocols, on the loose right now.

Be cautious with downloads, even from trusted vendors. It's more prevalent in Europe, and demanding 300 Bitcoin...again. It's disguising itself as an approved Microsoft file, so it initially got by some antivirus programs. I wouldn't count on the latest Win10 update to have the protections for this one built in yet.

FYI...
 
Thanks for the warning.


It's still imperative to use grey matter as a first line defense when downloading files and to keep Windows updated.
 
Its hitting Australia and is expected to hit New Zealand next.

From what I have heard it is traveling via email in an attachment. Dont get tricked into opening attachments. .I would hope downloads will be ok
 
300 US dollars are demanded, not 300 bitcoins - a ruinous sum. Reports are that machines hit are those which haven't updated despite the last outbreak, so if you think WannaCry was dealt with and you don't need to do anything to avoid it, you're wrong and should get security updates right away. This one uses the same vulnerabilities, so don't be an ostrich and stick your head in the sand!
 
Last edited:
300 US dollars are demanded, not 300 bitcoins - a ruinous sum. Reports are that machines hit are those which haven't updated despite the last outbreak, so if you think WannaCry was dealt with and you don't need to do anything to avoid it, you're wrong and should get security updates right away. This one uses the same vulnerabilities, so don't be an ostrich and stick your head in the sand!


Yep... $300 worth of Bitcoin...not 300 Bitcoin. That would be a tidy sum. :dizzy:


So far ESET has proved to be the best security I have employed to date.
Win10 did another update this AM, and I'm still running within tolerances.

As a precaution, I back up all of my work daily to an external that is only connected to the system during data transfer.

Thanks for the data correction Tom. :encouragement:
 
Last edited:
As a precaution, I back up all of my work daily to an external that is only connected to the system during data transfer.
:encouragement:
Thanks for the reminder my 2 MyBook's are now disconnected. That would be 4TB of data lost in the event :encouragement:
 
As Tuesday's ransomware attack continues to spread around the world, several security analysts are saying that this virus may not be ransomware after all. New reports are claiming the virus has been designed to permanently delete a system's Master Boot Record before a victim even gets the chance to read the ransom demand. This points to the virus potentially using the guise of ransomware as cover for a more destructive and politically-orientated cyberattack.
Early reports hypothesizing the source of the infection as coming from some Ukranian accounting software called MeDoc have now been confidently verified by Microsoft. The company's security blog says, "Microsoft now has evidence that a few active infections of the ransomware initially started from the legitimate MEDoc updater process."

This is interesting from the article...

The allegations that this virus was a cyberattack disguised as ransomware certainly fit with the strangely inept and complicated ransom method outlined by the virus. The odd tactic of using a single Bitcoin wallet and asking victims to email a specific email address is not only unconventional for a ransomware attack, but also fundamentally ineffective. As the email address attached to the ransomware demand was quickly inactivated by the company owning the domain, it seemed to suggest that money was not the primary motive of this attack.

More info...

http://newatlas.com/notpetya-cyberattack-disguised-ransomware-ukraine/50265/
 
Back
Top