MalwareDatabase/ransomwares/Petya.A.zip at master
Petya ransomware outbreak: Here's what you need to know
Similar to WannaCry, Petya uses the EternalBlue exploit as one of the means to propagate itself. However, it also uses classic SMB network spreading techniques, ...
New ransomware, old techniques: Petya adds worm capabilities
On June 27, 2017 reports of a ransomware infection began spreading across Europe. We saw the first infections in Ukraine, where more than ...
Endermanch/MalwareDatabase: One of a few malware ... - GitHub
The following repository is one of the few malware collections on GitHub. Almost every sample here is malicious, so you should neither ...
NotPetya leverages multiple propagation methods to spread within an infected network. According to malware analysis, NotPetya attempts the ...
Malware analysis https://github.com/Endermanch/MalwareDatabase ...
Online sandbox report for https://github.com/Endermanch/MalwareDatabase/raw/master/ransomwares/Petya.A.zip, verdict: Malicious activity.
MalwareDatabase/ransomwares/Petya.A.zip at master
One of a few malware collections on the GitHub. Contribute to Endermanch/MalwareDatabase development by creating an account on GitHub.
Inside Petya and Mischa ransomware - Avast Blog
The Avast Threat Intelligence team takes a deeper look into the double ransomware, Petya and Mischa.
Petya (malware family) - Wikipedia
Petya is a family of encrypting malware that was first discovered in 2016. The malware targets Microsoft Windows–based systems, infecting the master boot ...
What Is Bad Rabbit Ransomware? - BlackBerry
Bad Rabbit is a ransomware strain that emerged in 2017 and was initially considered a potential successor to Petya/NotPetya.
Petya: the two-in-one trojan - Securelist
Infecting the Master Boot Record (MBR) and encrypting files is nothing new in the world of malicious programs. Back in 1994, the virus ...
Contribute to 0xBADBAC0N/malware development by creating an account on GitHub.
Petya Ransomware: History, Targets, How it works - Heimdal Security
Find out more about what is Petya / NotPetya ransomware and how it works. Don't forget to take measures to prevent a ransomware attack!
Analyzing Petya ransomware - Mr Empy - Medium
Hello hackers! In this article I will analyze the Petya ransomware that I found while browsing my social networks. Hope you like the article ...
Malware analysis https://github.com/NTFS123/MalwareDatabase ...
Online sandbox report for https://github.com/NTFS123/MalwareDatabase/blob/master/Ransomware/Trojan.Ransom.Petya.zip, verdict: Malicious ...
Petya - Taking Ransomware To The Low Level | Malwarebytes Labs
Instead of encrypting files one by one, it denies access to the full system by attacking low-level structures on the disk. This ransomware's ...
On June 27, 2017, a global ransomware campaign targeting computers around the world with a new ransomware variant referred to as NotPetya.
Petya Ransomware Attack – What's Known - MalwareTech
Petya. The jury is still out on whether the malware is Petya or something that just looks like it (it messes with the Master Boot Record in a ...
Petya Ransomware Outbreak Wreaking Havoc Across the Globe
UPDATE: This article was published in the first moments of the Petya/NotPetya ransomware outbreak. The article has been heavily redacted to ...
What Is Petya and NotPetya Ransomware? - Trellix
Learn about Petya ransomware, find out how the Petya virus spreads and infects devices, and gain insights to identify and prevent Petya attacks.
A technical analysis of the recent Petya ransomware attack - Seqrite
This new version of Petya is more dangerous than other ransomware in a way that it doesn't just encrypt user's data, it also encrypts master ...