Petya-Like Ransomeware Outbreak – RAVENii has you Protected

Current Situation:

As you probably are aware, there is a global ransomware attack currently crippling unprepared organizations called Petya. The ransomware primarily functions and spreads by exploiting the inherent trust in corporate networked environments, allowing the malware to log into other machines using stolen credentials. If someone is infected with this “Petya-like” ransomware, there is no way to decrypt the data.

We repeat, there is no way to decrypt the data. The email address that the bad actors included in the ransomware has been disabled, so do not pay as there is no mechanism to recover your files.

If you are a current RAVENii customer with our Anti-Virus as a service subscription or CTVM, you already have a mechanism in place to detect and prevent potential attacks.

The situation is fluid and still developing. RAVENii’s security team along our extended eco-system partners are actively engaged in tracking this threat, and continue to hunt for more files both internally and in public repositories.

If you are not currently a customer of these RAVENii services, we encourage you to stay up-to-date with this latest threat and please call us if you have any questions about how to improve your security posture as it relates to these type of attacks. RAVENii has proven highly effective in preventing ransomware attacks.



Everything you need to know about the ‘WannaCrypt’ ransomware attack

If you're using traditional signature-based security, you are at risk. RAVENii’s anti-ransomware technology uses a dedicated real-time detection and blocking engine that continuously monitors for ransomware behaviors, like those seen in WanaCrypt0r.