It was a state-sponsored cyberattack which targeted systems to infect them and destroy data in Ukraine but quickly spread globally, affecting numerous organisations. The malware exploited the vulnerabilities of the computer systems of multiple companies and government agencies to destroy data and stop their operations.
Jan 28, 2024
People also ask
What is the NotPetya attack method?
What damage did NotPetya do?
What happened in NotPetya?
What vulnerabilities were exploited in the NotPetya attack?
The NotPetya ransomware infected more than 80 companies on Tuesday, affecting computers of a Russian oil company and shipping giant AP Moller-Maersk.
It spread suddenly and rapidly, and it quickly infected entire networks using various vulnerability exploits and credential theft methods. Notably, NotPetya was ...
Mar 4, 2022 · In June 2017, the world was introduced to the most destructive malware ever deployed – one that ushered in a new era of state-sponsored cyber warfare.
NotPetya takes its name from the ransomware Petya, which encrypted files and demanded digital currency payment in exchange for decryption.
An additional hypothesis surmises that the attack was just a fake ransomware scam to make money. Although the responsible actors and the motivation behind their ...
In summary, the motive behind NotPetya appears to be the use of cyber operations to achieve geopolitical objectives, specifically the destabilization and ...
Aug 22, 2018 · It's the story of a nation-state's weapon of war released in a medium where national borders have no meaning, and where collateral damage ...
Dec 1, 2021 · NotPetya infected the computer systems of Mondelez, disrupting the company's email systems, file access, and logistics for weeks.
The NotPetya attacks have been blamed on the Russian government, specifically the Sandworm hacking group within the GRU Russian military intelligence ...