How You Can Stay Safe from Future Ransomware Attacks Like Petya
In June 2017, yet another type of complex ransomware has infected computers worldwide. It goes by the name ‘Petya,’ and it caused companies like DLA Piper and Maersk to freeze up their systems. The only way for these companies to have unlocked their systems, is, of course, by paying a hefty ransom.
If your company was safe from Petya this time around, how can you continue to stay safe from ransomware attacks in the future?
What is Petya?
The interesting thing about the Petya virus is that the authors of Petya demanded the large ransom (100-bitcoin) only after many companies infected already resumed their operations. Though it looks like some victims had decided to pay a smaller ransom, Petya’s financial success didn’t amount to much.
While all ransomware viruses typically work in the same way, each one possesses a unique attribute that makes it stand out from the others. Perhaps it infects more companies, demands more money than other forms of ransomware, or is simply that much harder to prevent.
Before Petya, the big ransomware virus to look out for was WannaCry. Though WannaCry could fall into its own category of headline-making ransomware, it actually shares some similarities with Petya. Like WannaCry, Petya infiltrated networks through systems that used Microsoft Windows. And, although it seems that Petya’s main goal was to disrupt Ukrainian infrastructure (where the virus was sourced from) rather than just make money, it’s important for everyone to be aware of such a virus’ capabilities. Knowing what’s out there makes you less likely to become a victim yourself since you know how to prevent an attack in the future.
How Can You Protect Yourself Against Attacks Like Petya
It goes without saying that not all cyber attacks can be prevented. Because technology is so complex and because there is so much we cannot see on the Internet, hackers are finding new ways to get what they want. But, first and foremost, we must educate ourselves about what kind of hacks are out there, how we may possibly be vulnerable to those attacks, and how to protect ourselves in every way possible.
From what we know from this attack, only Windows systems were targeted. Those who haven’t updated their software were more at risk, as well as businesses. Home networks weren’t really a target in this case, which is pretty true for most cyber attacks (but not always).
Unlike WannaCry or other types of ransomware, Petya locks up entire data systems instead of individual files. A worm is sent out and encrypts machines. This on its own is a reminder that although we may not be able to prevent attacks, we can back up our data separately so that we can access it even if it gets hacked.
Lastly, it’s important that you’re doing what you can to protect your network. The first step is seeking out the help of a managed service provider that’s up to date on cyber attacks and knows how to evaluate your system for any inconsistencies. Generally, a good antivirus should work, but only if that antivirus’ usage is being constantly monitored by an expert.
Hopefully, you’ll never fall victim to a ransomware attack like Petya. But, if you do, remember that you should never pay up to the perpetrator. This only encourages these hackers to continue doing what they do.
Working together with your team and the expertise of a managed service provider, you can spend less time worrying about these hacks and more time doing what you do best; running your business.
Are you a C-level IT CHUMP or CHAMP?
Take our 2 minute, anonymous C-level IT Quiz to see where you rate as a steward of your IT people / department:
► Business continuity
Go here to take a 2 minute completely anonymous C-level IT Quiz: