-
The grugq: PetyaWrap causing lots of havoc, making little profit
Dan Goodin at Ars Technica has the definitive report on the latest ransomware outbreak:
A new ransomware attack similar to last month’s self-replicating WCry outbreak is sweeping the world with at least 80 large companies infected, including drug maker Merck, international shipping company Maersk, law firm DLA Piper, UK advertising firm WPP, and snack food maker Mondelez International. It has attacked at least 12,000 computers, according to one security company.
If you haven’t seen the grugq’s technical analysis, it’s well worth a gander.
Although the worm is camouflaged to look like the infamous Petya ransomware, it has an extremely poor payment pipeline.
Of course, you have nothing to worry about because you installed MS17-010 last month, right?
Vess Bontchev nudged me about the spreading mechanisms. At this point, we don’t really know how PetyaWrap spread, but once it infects one machine on a system, the MS17-010 patch doesn’t block it from moving from machine to machine on that same network. I have no idea how it spread so rapidly.
Microsoft has a security blog on the topic. It lists one of the spreading mechanisms and says that one is blocked by MS17-010 — but there are two other identified mechanisms.
We recommend customers that have not yet installed security update MS17-010 to do so as soon as possible. Until you can apply the patch, we also recommend two possible workarounds to reduce the attack surface:
-
Disable SMBv1 with the steps documented at Microsoft Knowledge Base Article 2696547 and as recommended previously
-
Consider adding a rule on your router or firewall to block incoming SMB traffic on port 445
If you want to double down on your protection, you can also block PetyaWrap by creating a read-only file called c:\Windows\perfc. Full instructions on Bleeping Computer.
-