We confirm our company's computer network was compromised today as part of global hack. Other organizations have also been affected (1 of 2)
— Merck (@Merck) June 27, 2017
The latest from @kaspersky researchers on #Petya: it’s actually #NotPetya pic.twitter.com/uTVBUul8Yt
— Kaspersky Lab (@kaspersky) June 27, 2017
Ransomware and obsolete systems
Petya was identified in March 2016 and updated earlier this year. BBC cited Andrei Barysevich, a spokesperson for the security firm Recorded Future, as saying the malware was for sale on multiple forums for as low as $22 over the last year.Petya uses the NSA Eternalblue exploit but also spreads in internal networks with WMIC and PSEXEC. That's why patched systems can get hit.
— Mikko Hypponen (@mikko) June 27, 2017
Petya ransomware encrypts the master boot records of infected Windows computers, making affected machines unusable. Open-source reports indicate that the ransomware exploits vulnerabilities in Server Message Block (SMB). US Computer Emergency Readiness Team statementW
The bitcoin wallet tied to #Petya/#NotPetya ransomware has so far received 30 payments totaling 3.15524827 BTC ($7,731.38 USD)
— petya_payments (@petya_payments) June 27, 2017
Someone just paid 0.12219909 BTC ($303.99 USD) to a bitcoin wallet tied to the #Petya/#NotPetya ransomware attack https://t.co/0eWD0FtssI
— petya_payments (@petya_payments) June 27, 2017
"Since midday #petya blackmailers no longer have access to their #posteo email account/send emails." https://t.co/ODHQLnj3XH
— Zeina Zakhour (@ZeinaZakhour) June 27, 2017
#StopPetya We have found local “kill switch” for #Petya pic.twitter.com/mslppmLooF
— PT Security (@PTsecurity_UK) June 27, 2017