<?xml version="1.0" encoding="UTF-8"?><feed
	xmlns="http://www.w3.org/2005/Atom"
	xmlns:thr="http://purl.org/syndication/thread/1.0"
	xml:lang="en-US"
	>
	<title type="text">Petya ransomware: everything we know about the massive cyber attack &#8211; The Verge</title>
	<subtitle type="text">The Verge is about technology and how it makes us feel. Founded in 2011, we offer our audience everything from breaking news to reviews to award-winning features and investigations, on our site, in video, and in podcasts.</subtitle>

	<updated>2017-07-05T16:08:10+00:00</updated>

	<link rel="alternate" type="text/html" href="https://www.theverge.com/2017/6/28/15888094/petya-ransomware-attack-news-virus" />
	<id>https://www.theverge.com/rss/stream/15652135</id>
	<link rel="self" type="application/atom+xml" href="https://www.theverge.com/rss/stream/15652135" />

	<icon>https://platform.theverge.com/wp-content/uploads/sites/2/2025/01/verge-rss-large_80b47e.png?w=150&amp;h=150&amp;crop=1</icon>
		<entry>
			
			<author>
				<name>Russell Brandom</name>
			</author>
			
			<title type="html"><![CDATA[Petya ransomware authors demand $250,000 in first public statement since the attack]]></title>
			<link rel="alternate" type="text/html" href="https://www.theverge.com/2017/7/5/15922216/petya-notpetya-ransomware-authors-bitcoin-demand-decrypt" />
			<id>https://www.theverge.com/2017/7/5/15922216/petya-notpetya-ransomware-authors-bitcoin-demand-decrypt</id>
			<updated>2017-07-05T12:08:10-04:00</updated>
			<published>2017-07-05T12:08:10-04:00</published>
			<category scheme="https://www.theverge.com" term="Crypto" /><category scheme="https://www.theverge.com" term="Security" /><category scheme="https://www.theverge.com" term="Tech" />
							<summary type="html"><![CDATA[The group responsible for last week's globe-spanning ransomware attack has made their first public statement. Motherboard first spotted the post, which was left on the Tor-only announcement service DeepPaste. In the message, the Petya authors offer the private encryption key used in the attack in exchange for 100 bitcoin, the equivalent of over $250,000 at [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="Illustration by Alex Castro / The Verge" data-has-syndication-rights="1" src="https://platform.theverge.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/8792137/acastro_170629_1777_0008_v2.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>The group responsible for <a href="https://www.theverge.com/2017/6/28/15888094/petya-ransomware-attack-news-virus">last week's globe-spanning ransomware attack</a> has made their first public statement. <a href="https://motherboard.vice.com/en_us/article/8xagk4/hackers-connected-to-notpetya-ransomware-surface-online-empty-bitcoin-wallet"><em>Motherboard</em> first spotted the post</a>, which was left on the Tor-only announcement service DeepPaste. In the message, the Petya authors offer the private encryption key used in the attack in exchange for 100 bitcoin, the equivalent of over $250,000 at current rates.</p>
<img src="https://platform.theverge.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/8800623/petya_statement.jpeg?quality=90&amp;strip=all&amp;crop=0,0,100,100" alt="Petya statement" title="Petya statement" data-has-syndication-rights="1" data-caption="" data-portal-copyright="">
<p>Crucially, the message includes a file signed with Petya's private key, which is strong evidence that the message came from the group responsible for Petya. More specifically, it proves that whoever left the message has the necessary private key to decrypt individual files  …</p>
<p><a href="https://www.theverge.com/2017/7/5/15922216/petya-notpetya-ransomware-authors-bitcoin-demand-decrypt">Read the full story at The Verge.</a></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Russell Brandom</name>
			</author>
			
			<title type="html"><![CDATA[Ukranian company that spread Petya could face criminal charges for vulnerability]]></title>
			<link rel="alternate" type="text/html" href="https://www.theverge.com/2017/7/3/15916060/petya-medoc-vulnerability-ransomware-cyberattack" />
			<id>https://www.theverge.com/2017/7/3/15916060/petya-medoc-vulnerability-ransomware-cyberattack</id>
			<updated>2017-07-03T15:00:32-04:00</updated>
			<published>2017-07-03T15:00:32-04:00</published>
			<category scheme="https://www.theverge.com" term="Security" /><category scheme="https://www.theverge.com" term="Tech" />
							<summary type="html"><![CDATA[Last week's globe-spanning ransomware outbreak may have started with a remarkably simple attack. This morning, independent security analyst Jonathan Nichols discovered an alarming vulnerability in the update servers for Ukrainian software company MeDoc, one of the companies at the center of the attack. Researchers believe that many of the initial Petya infections were the result [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="Illustration by Alex Castro / The Verge" data-has-syndication-rights="1" src="https://platform.theverge.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/8726997/acastro_170621_1777_0006_v2_fin.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>Last week's globe-spanning ransomware outbreak may have started with a remarkably simple attack. <a href="https://wvusoldier.wordpress.com/2017/07/03/notpetya-so-easy-anyone-could-do-it/">This morning</a>, independent security analyst Jonathan Nichols discovered an alarming vulnerability in the update servers for Ukrainian software company MeDoc, one of the companies at the center of the attack.</p>
<p>Researchers believe that many of the initial Petya infections were the result of <a href="https://www.theverge.com/2017/6/27/15883110/petya-notpetya-ransomware-software-update-wannacry-exploit">a poisoned update</a> from MeDoc, which sent out malware disguised as a software update. But according to Nichols' research, sending out that poisoned update may have been a relatively simple task, thanks to underlying weaknesses in the company's security.</p>
<figure class="wp-block-pullquote alignleft"><blockquote><p>"It's very …</p></blockquote></figure>
<p><a href="https://www.theverge.com/2017/7/3/15916060/petya-medoc-vulnerability-ransomware-cyberattack">Read the full story at The Verge.</a></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Kwame Opam</name>
			</author>
			
			<title type="html"><![CDATA[NATO could be forced to respond to the Petya attack, says new report]]></title>
			<link rel="alternate" type="text/html" href="https://www.theverge.com/2017/7/2/15910826/nato-response-petya-attack-state-actor-russia-ukraine" />
			<id>https://www.theverge.com/2017/7/2/15910826/nato-response-petya-attack-state-actor-russia-ukraine</id>
			<updated>2017-07-02T14:15:57-04:00</updated>
			<published>2017-07-02T14:15:57-04:00</published>
			<category scheme="https://www.theverge.com" term="Security" /><category scheme="https://www.theverge.com" term="Tech" />
							<summary type="html"><![CDATA[In the wake of last week's massive Petya ransomware attack in Eastern Europe, researchers are reaching consensus that the incident was a politically-motivated cyberattack. According to CNBC, the NATO Cooperative Cyber Defence Centre of Excellence (CCD COE) recently put out a statement claiming that the attack was like done by a state actor or a [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="Illustration by Alex Castro / The Verge" data-has-syndication-rights="1" src="https://platform.theverge.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/8726993/acastro_170621_1777_0001_fin.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>In the wake of last week's massive Petya ransomware attack in Eastern Europe, researchers are reaching consensus that the incident was a politically-motivated cyberattack. <a href="http://www.cnbc.com/2017/06/30/petya-ransomware-attack-nato-says-state-actor-to-blame.html">According to CNBC</a>, the NATO Cooperative Cyber Defence Centre of Excellence (CCD COE) recently put out a statement claiming that the attack was like done by a state actor or a group with state approval. The development means that the cyberattack could be viewed as an act of war, triggering <a href="http://www.nato.int/cps/cn/natohq/topics_110496.htm">Article 5 of the Washington Treaty</a> and compelling NATO allies to respond.</p>
<p>"As important government systems have been targeted, then in case the operation is attributed to a state this co …</p>
<p><a href="https://www.theverge.com/2017/7/2/15910826/nato-response-petya-attack-state-actor-russia-ukraine">Read the full story at The Verge.</a></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Sean O&#039;Kane</name>
			</author>
			
			<title type="html"><![CDATA[FedEx’s Dutch operations have been ‘significantly affected’ by the Petya virus]]></title>
			<link rel="alternate" type="text/html" href="https://www.theverge.com/2017/6/28/15887726/fedex-tnt-express-petya-virus-spread" />
			<id>https://www.theverge.com/2017/6/28/15887726/fedex-tnt-express-petya-virus-spread</id>
			<updated>2017-06-28T13:55:54-04:00</updated>
			<published>2017-06-28T13:55:54-04:00</published>
			<category scheme="https://www.theverge.com" term="Security" /><category scheme="https://www.theverge.com" term="Tech" />
							<summary type="html"><![CDATA[The global Petya virus has "significantly affected" the worldwide operations of TNT Express, a subsidiary of FedEx that's based in the Netherlands. Both the domestic and international shipping services remain operational, but they are experiencing delays, the companies say. FedEx halted trading of its shares shortly after the announcement, but all other FedEx-owned companies are [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="Photo by Drew Angerer/Getty Images" data-has-syndication-rights="1" src="https://platform.theverge.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/8767501/691611326.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>The global <a href="https://www.theverge.com/2017/6/27/15879480/petrwrap-virus-ukraine-ransomware-attack-europe-wannacry">Petya virus</a> has "significantly affected" the worldwide operations of TNT Express, a subsidiary of FedEx that's based in the Netherlands. Both the domestic and international shipping services remain operational, but they are experiencing delays, the companies say. FedEx <a href="https://www.darkreading.com/attacks-breaches/after-cyber-attack-fedex-halts-trading-of-its-shares-temporarily/d/d-id/1329244">halted trading of its shares</a> shortly after the announcement, but all other FedEx-owned companies are so far unaffected.</p>
<p>"We cannot measure the financial impact of this service disruption at this time, but it could be material," FedEx <a href="http://investors.fedex.com/news-and-events/investor-news/news-release-details/2017/TNT-Express-Operations-Disrupted/default.aspx?hootPostID=3e7437150ee5dbe3f69e1d39f103d39b">writes in a statement</a> about the service disruption. The company adds that "remediation steps and contingency plans are being implemen …</p>
<p><a href="https://www.theverge.com/2017/6/28/15887726/fedex-tnt-express-petya-virus-spread">Read the full story at The Verge.</a></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Jacob Kastrenakes</name>
			</author>
			
			<title type="html"><![CDATA[Petya virus is something worse than ransomware, new analysis shows]]></title>
			<link rel="alternate" type="text/html" href="https://www.theverge.com/2017/6/28/15887496/petya-virus-not-actually-ransomware-analysis-shows" />
			<id>https://www.theverge.com/2017/6/28/15887496/petya-virus-not-actually-ransomware-analysis-shows</id>
			<updated>2017-06-28T13:20:55-04:00</updated>
			<published>2017-06-28T13:20:55-04:00</published>
			<category scheme="https://www.theverge.com" term="Security" /><category scheme="https://www.theverge.com" term="Tech" />
							<summary type="html"><![CDATA[The virus that began spreading through European computers yesterday informed users that they could unlock their machines by paying a $300 ransom. But it looks like the program's creators had no intention of restoring the machines at all. In fact, a new analysis reveals they couldn't; the virus was designed to wipe computers outright. Matt [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="Illustration by Alex Castro / The Verge" data-has-syndication-rights="1" src="https://platform.theverge.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/8726997/acastro_170621_1777_0006_v2_fin.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>The virus that began <a href="https://www.theverge.com/2017/6/27/15879480/petrwrap-virus-ukraine-ransomware-attack-europe-wannacry">spreading through European computers yesterday</a> informed users that they could unlock their machines by paying a $300 ransom. But it looks like the program's creators had <a href="https://www.theverge.com/2017/6/27/15881110/petya-notpetya-paying-ransom-email-blocked-ransomware">no intention of restoring the machines</a> at all. In fact, a <a href="https://www.cyberscoop.com/petya-ransomware-destructive-microsoft-windows-master-boot-record/">new analysis reveals they couldn't</a>; the virus was designed to wipe computers outright.</p>
<p>Matt Suiche, founder of the cybersecurity firm Comae, writes in <a href="https://blog.comae.io/petya-2017-is-a-wiper-not-a-ransomware-9ea1d8961d3b">a blog post</a> today that after analyzing the virus, known as Petya, his team determined that it was a "wiper," not ransomware. "We can see the current version of Petya clearly got rewritten to be a wiper and not a actual ransomware," Suiche writes.</p>
<figure class="wp-block-pullquote alignleft"><blockquote><p>" …</p></blockquote></figure>
<p><a href="https://www.theverge.com/2017/6/28/15887496/petya-virus-not-actually-ransomware-analysis-shows">Read the full story at The Verge.</a></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Russell Brandom</name>
			</author>
			
			<title type="html"><![CDATA[The global ransomware attack weaponized software updates]]></title>
			<link rel="alternate" type="text/html" href="https://www.theverge.com/2017/6/27/15883110/petya-notpetya-ransomware-software-update-wannacry-exploit" />
			<id>https://www.theverge.com/2017/6/27/15883110/petya-notpetya-ransomware-software-update-wannacry-exploit</id>
			<updated>2017-06-27T18:09:51-04:00</updated>
			<published>2017-06-27T18:09:51-04:00</published>
			<category scheme="https://www.theverge.com" term="Report" /><category scheme="https://www.theverge.com" term="Security" /><category scheme="https://www.theverge.com" term="Tech" />
							<summary type="html"><![CDATA[When the Wannacry ransomware tore through the UK and Europe in May, there was a certain logic to the heightened scale of damage. Ransomware attacks were nothing new, but this one had a secret weapon, a sophisticated software exploit known as EternalBlue, published by the Shadow Brokers in April and believed to have been developed [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="Illustration by Alex Castro / The Verge" data-has-syndication-rights="1" src="https://platform.theverge.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/8726989/acastro_170621_1777_0003_fin.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>When <a href="https://www.theverge.com/2017/5/15/15641198/microsoft-ransomware-wannacry-security-patch-upgrade-wannacrypt">the Wannacry ransomware</a> tore through the UK and Europe in May, there was a certain logic to the heightened scale of damage. Ransomware attacks were nothing new, but this one had a secret weapon, <a href="https://www.fireeye.com/blog/threat-research/2017/05/smb-exploited-wannacry-use-of-eternalblue.html">a sophisticated software exploit known as EternalBlue</a>, published by the Shadow Brokers in April and believed to have been developed by the NSA. It was nation-state level weaponry turned against soft, civilian targets, like robbing a small-town bank with an Abrams tank. If you were looking for answers on how it spread so far so fast, you didn't have to look far.</p>
<p>Now, just over a month later, <a href="https://www.theverge.com/2017/6/27/15879480/petrwrap-virus-ukraine-ransomware-attack-europe-wannacry">a new strain of ransomware</a> has inflicted similar damag …</p>
<p><a href="https://www.theverge.com/2017/6/27/15883110/petya-notpetya-ransomware-software-update-wannacry-exploit">Read the full story at The Verge.</a></p>
						]]>
									</content>
			
					</entry>
			<entry>
			
			<author>
				<name>Russell Brandom</name>
			</author>
			
			<title type="html"><![CDATA[It’s already too late for today’s ransomware victims to pay up and save their computers]]></title>
			<link rel="alternate" type="text/html" href="https://www.theverge.com/2017/6/27/15881110/petya-notpetya-paying-ransom-email-blocked-ransomware" />
			<id>https://www.theverge.com/2017/6/27/15881110/petya-notpetya-paying-ransom-email-blocked-ransomware</id>
			<updated>2017-06-27T15:24:00-04:00</updated>
			<published>2017-06-27T15:24:00-04:00</published>
			<category scheme="https://www.theverge.com" term="Security" /><category scheme="https://www.theverge.com" term="Tech" />
							<summary type="html"><![CDATA[After thousands of infections, the new Petya ransomware has run into its first major problem, as a German email provider has blocked the email account the virus was using to manage ransom demands. Victims should be advised not to pay into the wallet, since it's unlikely the attackers can successfully decrypt systems at this point. [&#8230;]]]></summary>
			
							<content type="html">
											<![CDATA[

						
<figure>

<img alt="" data-caption="" data-portal-copyright="Illustration by Alex Castro / The Verge" data-has-syndication-rights="1" src="https://platform.theverge.com/wp-content/uploads/sites/2/chorus/uploads/chorus_asset/file/8726999/acastro_170621_1777_0006_fin.jpg?quality=90&#038;strip=all&#038;crop=0,0,100,100" />
	<figcaption>
		</figcaption>
</figure>
<p>After thousands of infections, <a href="https://www.theverge.com/2017/6/27/15879480/petrwrap-virus-ukraine-ransomware-attack-europe-wannacry">the new Petya ransomware</a> has run into its first major problem, as a German email provider has blocked the email account the virus was using to manage ransom demands. Victims should be advised not to pay into the wallet, since it's unlikely the attackers can successfully decrypt systems at this point.</p>
<p>The problem is caused in part by Petya's unorthodox method for collecting ransom payments. Most ransomware programs create a unique wallet for each infection, making it easy to know which victim is responsible for each payment. But Petya broke with that practice, asking every victim to send their $300 payment to t …</p>
<p><a href="https://www.theverge.com/2017/6/27/15881110/petya-notpetya-paying-ransom-email-blocked-ransomware">Read the full story at The Verge.</a></p>
						]]>
									</content>
			
					</entry>
	</feed>
