The Ransomware Threat: NotPetya Special Edition

A guide to detecting an attack before it's too late

Learn How to Defend Your Organisation Against Ransomware

On the morning of June 27, 2017, a new ransomware outbreak—similar to the WannaCry malware—was discovered in the Ukraine. The malware quickly spread across Europe, affecting varied industries such as banks, government, retail, and power, among others.

Although at first, it seemed that the ransomware was a variant of the Petya family, researchers determined that they were not related, renaming the malware “NotPetya.” The malware’s ability to self-duplicate even on secured systems was a timely reminder that preventive technologies cannot form an organisation’s only line of defense against cybercrime.

In this white paper, LogRhythm Labs researchers explain how ransomware attacks begin, how they progress through your endpoints and network, and what you can do to prevent, or limit the scope of an infection, to avoid serious repercussions.

You’ll learn:

  • A rapidly growing threat – a scourge called ransomware
  • How attacks are shifting from individuals to organisations
  • The 5 phases of a ransomware attack
  • The 5 steps of defence: How to handle a ransomware attack
NotPetya's ability to infect other systems within a network, without needing a vulnerability, shows just how important network and endpoint monitoring is in defending against today's evolving threat landscape. Bill Taylor-Mountford, Vice President of Asia Pacific & Japan