Oh no, you're thinking, yet another cookie pop-up. Well, sorry, it's the law. We measure how many people read us, and ensure you see relevant ads, by storing cookies on your device. If you're cool with that, hit “Accept all Cookies”. For more info and to customize your settings, hit “Customize Settings”.

Review and manage your consent

Here's an overview of our use of cookies, similar technologies and how to manage them. You can also change your choices at any time, by hitting the “Your Consent Options” link on the site's footer.

Manage Cookie Preferences
  • These cookies are strictly necessary so that you can navigate the site as normal and use all features. Without these cookies we cannot provide you with the service that you expect.

  • These cookies are used to make advertising messages more relevant to you. They perform functions like preventing the same ad from continuously reappearing, ensuring that ads are properly displayed for advertisers, and in some cases selecting advertisements that are based on your interests.

  • These cookies collect information in aggregate form to help us understand how our websites are being used. They allow us to count visits and traffic sources so that we can measure and improve the performance of our sites. If people say no to these cookies, we do not know how many people have visited and we cannot monitor performance.

See also our Cookie policy and Privacy policy.

This article is more than 1 year old

A year after devastating NotPetya outbreak, what have we learnt? Er, not a lot, says BlackBerry bod

Say it with me: 'Patch outdated systems.' Good, and again...

Today (27 June) marks the first anniversary since the NotPetya ransomware ravaged a range of businesses from shipping ports and supermarkets to ad agencies and law firms.

Once in a system, the code sought to encrypt files and destroyed master boot records, leaving infected Windows machines useless. The malware spread using the US National Security Agency's leaked EternalBlue exploit, which was also abused by WannaCry months earlier.

Updates of MeDoc, Ukraine's most popular accounting software, covertly tainted with NotPetya by hackers, distributed the ransomware payload. Once installed, the backdoored code spread like wildfire across flat networks, scrambling files as it went. The effects were devastating. Western intel agencies subsequently blamed Russia for the attack.

Most victims were based in Ukraine, but several global corporations were also infected – including shipping giant Maersk, advertising firm WPP, pharmaceutical outfit Merck, and FedEx's TNT Express division.

FedEx estimated that NotPetya cost it $300m in lost business and cleanup. Maersk also said it was out of pocket by the same amount as a result of the outbreak. Reckitt Benckiser – the firm behind the Dettol and Durex brands – said the attack cost it £100m ($136m). Other victims included Russian oil company Rosneft and multinational law firm DLA Piper.

Mikko Hypponen, chief research officer at Finnish infosec firm F-Secure, told El Reg: "I believe that NotPetya was the single most expensive computer security incident in history. I believe it created bigger losses than any malware outbreak ever, or any hacking incident ever, or any data leak ever. It was historic."

NCC Group rebuilt the malware without the destructive element to test what a real-life attack would look like on an organisation's infrastructure. The exercise showed how quickly malware of this type was capable of spreading across poorly segmented networks.

BlackBerry CTO Charles Eagan reckoned organisations have still not learnt from the mistakes WannaCry and NotPetya exposed.

"Just weeks after WannaCry crippled the NHS and broader industries, NotPetya hit," Eagan said. "One year on from NotPetya, it seems lessons still haven't been learned.

"A lack of regular patching of outdated systems because of the issues of downtime and disruption to organisations was the path through which both NotPetya and WannaCry spread, and this fundamental problem remains." ®

 

Similar topics

TIP US OFF

Send us news


Other stories you might like