NotPetya


Also found in: Dictionary.

NotPetya

A malware infection that targeted Windows computers in Ukraine. Introduced in 2017, and alleged to be from Russia, NotPetya malware spread across Europe causing billions of dollars' worth of damage. Merck, FedEx, Maersk and other companies each lost hundreds of millions of dollars. Unlike its Petya namesake (see Petya), NotPetya encrypts everything on the hard drive, and it spreads on its own accord rather than in an email attachment. A Windows patch for the NSA-exploited SMB flaw known as EternalBlue avoided the NotPetya infection. See malware.
Mentioned in ?
References in periodicals archive ?
"We have an exceptional vulnerability with tremendous potential for damage here, and all businesses and organizations have the opportunity to effectively protect themselves from cyberattacks and avoid a crisis scenario." The experience with WannaCry and NotPetya has shown that In 2017, despite the availability of security mechanisms, there were far too many vulnerable systems attacked in just a few weeks, which is why we again and explicitly point out this vulnerability and urge Windows users to implement the available IT security measures, " said BSI President Arne Schnbohm.
For example, the NotPetya cyber attack in the Ukraine affected companies such as Merck, FedEx and Maersk that were not direct targets of the attack (see sidebar).
In February 2018, the US and the UK identified Russia as the source of the NotPetya ransomware attack, which originally targeted Ukraine but is estimated to have caused over a billion dollars of damage to companies in Europe, the Americas and Asia.
'The global 'Wannacry' incident in 2017 and more recently, the 'NotPetya' hacking of the Russian national grid, the raiding of the Central Bank in Bangladesh have illustrated that cyber-security remains a major threat even in the most advanced countries.
Marsh said that the "severe economic and operational disruptions" stemming from the 2017 WannaCry and notPetya malware attacks are still on the minds of organizations ill-equipped to handle such a disruption.
According to the Mondelez complaint, the 2017 NotPetya attack, which has been attributed to state-sponsored Russian hackers, rendered 1,700 company computer servers and approximately 24,000 laptops "permanently dysfunctional." Mondelez sought coverage under an all-risk property policy mat protected against property damage and business interruption losses and promised protection for computer-related harm.
A malicious malware called NotPetya blanked out nearly 45,000 computers connected to its IT network across the world, disrupting operations of a company that has a ship docking at a port every 15 minutes.
The cybersecurity world changed forever on June 27, 2017, the day of the NotPetya attack.
Recent cyberattacks such as WannaCry, NotPetya, and TRITON demonstrate that ICS and Operational Technology (OT) networks continue to be soft targets for adversaries -- increasing the risk of costly production outages, safety failures, environmental incidents, and theft of sensitive intellectual property.
officials also helped ride herd on coordinated action by the U.S., British and European governments to publicly name and shame Russia for cyber mischief, including the NotPetya cyberattack that wreaked havoc on banks around the world.