NotPetya: Good Practices Final Exam
June 27, 2017, 9:45am Petya has struck and InfoSec Twitter is in full crisis mode. Petya appears to be very sophisticated and I have heard many exploits given for it's methods of spreading and I'm going to touch on each one. I am not here to prove that each one of these things is true about Petya but just going over how each one of these things can be prevented in the future. Update, June 27, 2017, 10:10am: It is now being called NotPetya by Kapersky who decided it is unrelated. Either way this stuff still applies. CVE-2017-0199 I have heard that it is using CVE-2017-0199, which I wrote about here , as an initial entry to networks via email. This has been mentioned once or twice. It bypasses macros in Microsoft Office, but there are patches available and my notes show how to break code execution if you're really paranoid. Update : Loki, a different ransomware, might be using CVE-2017-0199 and not Petya. Even still... Update, June 27, 2017, 10:30am: Petya/...