A new ransomware outbreak named "Petya", similar to WannaCry malware, was seen on June 27, 2017. This malware spread quickly and affected various organizations in Europe and the US. The ransomware was thought to be a variant of Petya family but researcher determined that they are not related and now renamed to "NotPetya".
Petya/NotPetya does not require EternalBlue SMB vulnerability for exploitation to spread in systems on a network. One infected host will allow ransomware to spread in any connected systems, provided that infected system has SMB credentials. So, unlike WannaCry, patching SMB and disabling SMBv1 will not prevent the spread.
Detection of Compromise
The LogPoint administrator may search for various indicators of compromise.
1. Check for file integrity. Possible indicators of compromise are hash values listed below
2. If command-line logging is available, check for various commands listed below
3. Possible Compromise of Network can be detected by looking at servers and workstation scanning tcp port 139 and 445
4. Vulnerability Scan: EternalBlue exploits (MS17-010 Vulnerability) are still applicable and this can be an indicator of compromise.
If you want to know more about Petya/NotPetya, read this article on our Help Center or contact us via the form below.
With LogPoint, you will discover a full enterprise SIEM solution.
LogPoint is EAL 3+ certified and the solution is tailored to solve the specific security management challenges of your business - whether the goal is compliance, forensics or operational insight.
And the best part..? We have the most predictable licensing model in the industry.