We confirm our company's computer network was compromised today as part of global hack. Other organizations have also been affected (1 of 2)
— Merck (@Merck) June 27, 2017
The latest from @kaspersky researchers on #Petya: it’s actually #NotPetya pic.twitter.com/uTVBUul8Yt
— Kaspersky Lab (@kaspersky) June 27, 2017
Ransomware and obsolete systems
Petya was identified in March 2016 and updated earlier this year. BBC cited Andrei Barysevich, a spokesperson for the security firm Recorded Future, as saying the malware was for sale on multiple forums for as low as $22 over the last year.Petya uses the NSA Eternalblue exploit but also spreads in internal networks with WMIC and PSEXEC. That's why patched systems can get hit.
— Mikko Hypponen (@mikko) June 27, 2017
Petya ransomware encrypts the master boot records of infected Windows computers, making affected machines unusable. Open-source reports indicate that the ransomware exploits vulnerabilities in Server Message Block (SMB). US Computer Emergency Readiness Team statementW
A tipster sends along this photo taken outside DLA Piper's D.C. office around 10am. #Petya pic.twitter.com/HWS4UFlvQR
— Eric Geller (@ericgeller) June 27, 2017
Home users: As long as your Windows computer has updates, and Office is updated, you're safe from #Petya news today https://t.co/Wu2Jmyqjtz
— SwiftOnSecurity (@SwiftOnSecurity) June 27, 2017
This is standard operation for nuclear power plants during power loss, computer monitoring loss. Same thing occurred w/ Slammer worm in 2003 https://t.co/iMJy4Dcs4T
— Kim Zetter (@KimZetter) June 27, 2017
Monitoring systems at Chernobyl switched to manual as a result of #CyberAttack. #Ukraine needs to protect four major active nuclear plants.
— Maxim Tucker (@MaxRTucker) June 27, 2017
We confirm our company's computer network was compromised today as part of global hack. Other organizations have also been affected (1 of 2)
— Merck (@Merck) June 27, 2017
We are investigating the matter and will provide additional information as we learn more. (2 of 2)
— Merck (@Merck) June 27, 2017
Current situation of Petrwrap/wowsmith123456 ransomware – percentage of infections by country. pic.twitter.com/Q42WPlBlja
— Costin Raiu (@craiu) June 27, 2017