Tag Archive: Petya

Cyber Attack Trends: Mid-Year Report

August 17, 2017 6:00 am

Looking back at the first half of 2017, the word ransomware is probably one of the first that come to mind, courtesy of WannaCry and the more recent Petya attacks that dominated the... Click to Read More

2017-8-7 Global Cyber Attack Reports

August 7, 2017 5:18 pm

TOP ATTACKS AND BREACHES Marcus Hutchins, the British security expert who discovered WannaCry’s kill-switch back in May and consequently stopped the first wave of the attack, was arrested in the US with accusations... Click to Read More

2017-7-31 Global Cyber Attack Reports

July 31, 2017 5:24 pm

TOP ATTACKS AND BREACHES The Swedish government is in turmoil, with 2 ministers already having resigned, following the discovery that a government contract has led to a massive leak of nearly all of... Click to Read More

BROKERS IN THE SHADOWS – Part 2: Analyzing Petya’s DoublePulsarV2.0 Backdoor

July 3, 2017 5:58 pm

Background In the wake of WannaCry, a new cyber threat has emerged from the NSA leak. Making use of previously exposed tools, Petya once again is engaged in another large scale attack. Important... Click to Read More

Preventing Petya – stopping the next ransomware attack

June 28, 2017 8:02 am

Check Point’s Incident Response Team has been responding to multiple global infections caused by a new variant of the Petya malware, which first appeared in 2016 and is currently moving laterally within customer... Click to Read More

Threat Brief: Petya Ransomware, A Global Attack

June 27, 2017 8:35 am

[updated 6/28] A worldwide attack erupted on June 27 with a high concentration of hits in Ukraine – including the Ukrainian central bank, government offices and private companies. The attack is distributing what seems... Click to Read More

BROKERS IN THE SHADOWS: Analyzing vulnerabilities and attacks spawned by the leaked NSA hacking tools

May 25, 2017 9:39 am

Background Rarely does the release of an exploit have such a large impact across the world. With the recent leak of the NSA exploit methods, we saw the effects of powerful tools in... Click to Read More