Eskenzi PR ad banner Eskenzi PR ad banner
  • About Us
Monday, 25 September, 2023
IT Security Guru
Eskenzi PR banner
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us
No Result
View All Result
IT Security Guru
No Result
View All Result

Six years on from NotPetya: an analysis from Tom Gol, CTO for research at Armis

by Guru Writer
June 27, 2023
in Featured, Insight
Six years on from NotPetya: an analysis from Tom Gol, CTO for research at Armis
Share on FacebookShare on Twitter

Six years have passed since the infamous NotPetya cyber attack sent shockwaves through the cybersecurity landscape. Initially disguised as ransomware, NotPetya quickly revealed its true destructive nature, spreading damage to businesses and governments around the world, resulting in billions of dollars in losses. Six years later, the impact of the NotPetya attack is still being felt, and the lessons learned from this incident continue to shape the way we approach cybersecurity. Tom Gol, CTO for research at Armis provides his take on what happened and lessons learned.

Background

NotPetya first emerged in June 2017, when it quickly spread across various countries, primarily targeting organizations in Ukraine. However, it soon became apparent that this cyber threat was not limited to a specific region, as it rapidly infected systems worldwide.

The destructive malware was initially disguised as a ransomware attack, with victims being presented with a ransom note demanding a payment in Bitcoin to unlock their encrypted files. However, it soon became evident that the true intention of NotPetya was not financial gain, but rather widespread disruption and destruction.

Technical Analysis

NotPetya employed a combination of advanced techniques and exploited known vulnerabilities to propagate and wreak havoc. At its core, the attack relied on the EternalBlue exploit (CVE-2017-0144) that leveraged a vulnerability in the SMB protocol of Windows systems. This exploit, originally developed by the National Security Agency (NSA) and later leaked by a hacking group called Shadow Brokers, allowed for remote code execution without user interaction.

Upon infecting a system, NotPetya would employ a multi-stage infection process. It would exploit the EternalBlue vulnerability to gain initial access and then employ credential theft techniques using tools like Mimikatz to escalate privileges and move laterally within the network. The malware would also leverage legitimate administrative tools, including PsExec, to propagate across interconnected systems.

NotPetya’s primary objective was to disrupt operations and destroy data rather than generate financial gain. Once inside a network, the malware would overwrite the master boot record (MBR) and the master file table (MFT), rendering the affected systems inoperable. It then displayed a ransom note, demanding a Bitcoin payment for the decryption key. However, the attackers’ email address had been shut down, making it impossible for victims to communicate and recover their data.

It is worth noting that the security patch for EternalBlue was released several months before the attack occurred. Organisations that had diligently applied the available security updates and patched their systems would have significantly reduced their vulnerability to this specific attack.

Tallying the Impact

The impact of NotPetya was felt around the world, with businesses and governments in more than 60 countries affected. Global entities faced significant financial losses, with shipping giant Maersk counting a staggering $300 million in damages. Even critical infrastructure, exemplified by the Chernobyl nuclear power plant, experienced disruptions, emphasizing the far-reaching consequences of this cyber assault.

One of the challenges highlighted by the NotPetya attack is the difficulty in distinguishing cyber attacks as acts of war. In a related case, Zurich Insurance Group refused to pay a $100 million claim for damages caused by the NotPetya attack, arguing that the ransomware was an Act of War and therefore not covered by the policy. However, a judge rejected this argument, stating that the clause protecting Zurich from paying out for losses caused by hostile or warlike actions did not apply to the NotPetya cyber attack.

Six Years Later – Still Eternal

An analysis performed using Armis Collective Asset Intelligence indicates that the number of computers still vulnerable to EternalBlue today is extremely low. This is not surprising given the fact that it is a Windows vulnerability and the very public nature of NotPetya. However, around 74% of organizations today still have at least one vulnerable device in their network. With exploit attempts still going (Armis detects between a few hundreds to a few thousands exploit attempts of EternalBlue every day) patching this vulnerability continues to be relevant.

Transformative Effect on Cyberwarfare

NotPetya marked a significant turning point in the realm of cyberwarfare, reshaping the understanding of destructive cyber attacks. It blurred the lines between traditional ransomware and state-sponsored cyber operations, as its primary goal was not financial gain but the disruption of critical infrastructure and data destruction. This attack demonstrated the potential for highly destructive malware to cause widespread economic and operational disruptions, posing significant risks to national security and global stability.

Lessons Learned

The legacy of NotPetya offers crucial lessons that resonate with us today. Foremost among them is the significance of effective vulnerability management. NotPetya exploited a known vulnerability, emphasising the importance of promptly applying security patches and conducting regular vulnerability assessments.

Proactive mitigation of known vulnerabilities can significantly reduce the risk of falling victim to similar devastating attacks.

Another critical lesson is the power of asset visibility. Maintaining an up-to-date inventory of networked systems enables organizations to identify potential weak points and take proactive measures to strengthen their defences. By having a clear understanding of their digital ecosystem, organisations can respond swiftly and effectively to emerging threats.

Lastly, network segmentation plays a vital role in containing the impact of cyber attacks. By dividing networks into isolated segments, organizations can limit the lateral movement of malware and prevent the widespread damage associated with attacks like NotPetya.

 

The NotPetya cyber attack remains a stark reminder of the evolving threats faced in the digital age. Six years on, the impact and lessons learned from this devastating attack continue to resonate. Organisations must invest in robust cybersecurity practices, including asset visibility, vulnerability management, and network segmentation. By adopting a proactive and comprehensive approach to cybersecurity, organisations can fortify their defences and mitigate the risks posed by increasingly sophisticated cyber adversaries.

 

This piece originally appeared on the Armis blog

FacebookTweetLinkedIn
ShareTweet
Previous Post

Cato Networks Revolutionizes Network Security with Real-Time, Machine Learning-Powered Protection

Next Post

Crack the Code: How to Secure Your Dream Cybersecurity Career

Recent News

Adarma Names James Todd as Chief Technology Officer, Reinforcing Dedication to Security Operations Excellence

Adarma Names James Todd as Chief Technology Officer, Reinforcing Dedication to Security Operations Excellence

September 25, 2023
Nurturing Our Cyber Talent

Nurturing Our Cyber Talent

September 25, 2023
The Journey to Secure Access Service Edge (SASE)

The Journey to Secure Access Service Edge (SASE)

September 22, 2023
WatchGuard

WatchGuard acquires CyGlass for AI-powered network anomaly detection

September 21, 2023

The IT Security Guru offers a daily news digest of all the best breaking IT security news stories first thing in the morning! Rather than you having to trawl through all the news feeds to find out what’s cooking, you can quickly get everything you need from this site!

Our Address: 10 London Mews, London, W2 1HY

Follow Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

  • About Us
No Result
View All Result
  • Home
  • Features
  • Insight
  • Channel News
  • Events
    • Most Inspiring Women in Cyber 2022
  • Topics
    • Cloud Security
    • Cyber Crime
    • Cyber Warfare
    • Data Protection
    • DDoS
    • Hacking
    • Malware, Phishing and Ransomware
    • Mobile Security
    • Network Security
    • Regulation
    • Skills Gap
    • The Internet of Things
    • Threat Detection
    • AI and Machine Learning
    • Industrial Internet of Things
  • Multimedia
  • Product Reviews
  • About Us

© 2015 - 2019 IT Security Guru - Website Managed by Calm Logic

This site uses functional cookies and external scripts to improve your experience.

Privacy settings

Privacy Settings / PENDING

This site uses functional cookies and external scripts to improve your experience. Which cookies and scripts are used and how they impact your visit is specified on the left. You may change your settings at any time. Your choices will not impact your visit.

NOTE: These settings will only apply to the browser and device you are currently using.

GDPR Compliance

Powered by Cookie Information