Signs of a computer infection with the petya virus. Petya, NotPetya or Petna? Everything you need to know about the new epidemic. What happens after infection

The attack of the Petya virus was an unpleasant surprise for residents of many countries. Thousands of computers have been infected, as a result of which users have lost important data stored on their hard drives.

Of course, now the excitement around this incident has subsided, but no one can guarantee that this will not happen again. That is why it is very important to protect your computer from a possible threat and not take unnecessary risks. How to do this most effectively, and will be discussed below.

The consequences of the attack

First of all, we should remember the consequences of Petya.A's short activity. In just a few hours, dozens of Ukrainian and Russian companies suffered. In Ukraine, by the way, the work of the computer departments of such institutions as Dniproenergo, Novaya Pochta and Kiev Metro was almost completely paralyzed. Moreover, some state organizations, banks and mobile operators did not protect themselves from the Petya virus.

In the countries of the European Union, the ransomware also managed to do a lot of trouble. French, Danish, British and international companies have reported temporary outages related to the Petya computer virus attack.

As you can see, the threat is really serious. And even despite the fact that the attackers chose large financial institutions as their victims, ordinary users suffered no less.

How does Petya work?

To understand how to protect yourself from the Petya virus, you must first understand how it works. So, once on a computer, the malware downloads a special encryptor from the Internet that infects the Master Boot Record. This is a separate area on the hard drive, hidden from the user's eyes and designed to boot the operating system.

For the user, this process looks like the standard operation of the Check Disk program after a sudden system crash. The computer restarts abruptly, and a message appears on the screen about hard disk for errors and please do not turn off the power.

As soon as this process comes to an end, a screen saver appears with information about locking the computer. The creators of the Petya virus require the user to pay a ransom of $300 (more than 17.5 thousand rubles), promising in return to send the key needed to resume the PC.

Prevention

It is logical that it is much easier to prevent infection with the Petya computer virus than to deal with its consequences later. To secure your PC:

  • Always install the latest updates for the operating system. The same, in principle, applies to all software installed on your PC. By the way, "Petya" cannot harm computers running MacOS and Linux.
  • Use the latest versions of the antivirus and do not forget to update its databases. Yes, the advice is banal, but not everyone follows it.
  • Do not open suspicious files sent to you by email. Also, always check apps downloaded from dubious sources.
  • Make regular backups of important documents and files. It is best to store them on a separate medium or in the "cloud" (Google Drive, Yandex.Disk, etc.). Thanks to this, even if something happens to your computer, valuable information will not be affected.

Create a stop file

The developers of leading anti-virus programs have figured out how to remove the Petya virus. More precisely, thanks to their research, they were able to understand that during the initial stages of infection, the ransomware tries to find a local file on the computer. If he succeeds, the virus stops its work and does not harm the PC.

Simply put, you can manually create a kind of stop file and thus protect your computer. For this:

  • Open Folder Options and uncheck "Hide extensions for known file types".
  • Create a new file with notepad and place it in the C:/Windows directory.
  • Rename the created document by calling it "perfc". Then go to and enable the "Read Only" option.

Now the "Petya" virus, having got on your computer, will not be able to harm it. But keep in mind that attackers may modify the malware in the future and the stop file creation method will become ineffective.

If infection has already occurred

When the computer goes to reboot on its own and Check Disk starts, the virus is just starting to encrypt files. In this case, you can still save your data by doing the following:

  • Power off your PC immediately. This is the only way you can prevent the spread of the virus.
  • Next, connect your HDD to another PC (but not as a bootable one!) and copy important information from it.
  • After that, you need to completely format the infected hard drive. Naturally, then you will have to reinstall on it operating system And so on software.

Also, you can try to use a special boot disk to cure the "Petya" virus. Kaspersky Anti-Virus, for example, provides for these purposes Kaspersky Rescue Disk, which works bypassing the operating system.

Should I pay extortionists?

As mentioned earlier, the creators of Petya are demanding a $300 ransom from users whose computers have been infected. According to the extortionists, after paying the specified amount, the victims will be sent a key that removes the blocking of information.

The problem is that a user who wants to return his computer to a normal state needs to write to the attackers at email. However, all E-Mail ransomware is promptly blocked by authorized services, so it is simply impossible to contact them.

Moreover, many leading developers of anti-virus software are sure that it is completely impossible to unlock a computer infected with Petya with any code.

As you probably understood, it is not worth paying extortionists. Otherwise, you will not only be left with a non-working PC, but also lose a large amount of money.

Will there be new attacks

The Petya virus was first discovered in March 2016. Then security experts quickly noticed the threat and prevented its mass distribution. But already at the end of June 2017, the attack was repeated again, which led to very serious consequences.

It is unlikely that everything will end there. Ransomware attacks are not uncommon, so it's important to keep your computer protected at all times. The problem is that no one can predict what format the next infection will take. Be that as it may, it is always worth following the simple recommendations given in this article in order to reduce the risks to a minimum in this way.

The attack of the virus on the computers of Ukrainian public and private companies began at 11:30 am. Under the blow were large banks, retail chains, operators cellular communication, state-owned companies, infrastructure facilities and service industries.

The virus covered the entire territory of Ukraine, by 17:00 there was information that an attack had also been recorded in the very west of the country, in Transcarpathia: here, in connection with the virus, branches of OTR Bank and Ukrsotsbank were closed.

“The site Korrespondent.net, popular in Ukraine, and the 24 TV channel are not working. The number of companies that have been affected by the attack is increasing by the hour. Currently, most of the bank branches do not work in Ukraine. For example, in the offices of Ukrsotsbank, computers simply do not boot. It is impossible to receive or send money, pay receipts, etc. At the same time, there are no problems in PrivatBank, ”the Kiev correspondent of RT reports.

The virus infects only computers that run on the operating system. Windows system. It encrypts the master file table hard drive and extorts money from users for decryption. In this, it is similar to the WannaCry ransomware virus, which has been attacked by many companies around the world. At the same time, the results of checking infected computers have already appeared, showing that the virus destroys all or most of the information on infected disks.

At the moment, the virus has been identified as mbr locker 256, but another name has become widespread in the media - Petya.

From Kyiv to Chernobyl

The virus has also hit the Kiev metro, where there are currently difficulties with paying with bank cards.

Many large infrastructure facilities were hit, such as the state railway operator Ukrzaliznytsia, Boryspil airport. However, while they are operating normally, the air navigation system has not been affected by the virus, although Boryspil has already published a warning about possible changes in the schedule, and the arrivals board does not work at the airport itself.

In connection with the attack, two of the largest postal operators in the country are experiencing difficulties in their work: the state-owned Ukrposhta and the private Novaya Pochta. The latter announced that today there would be no charge for the storage of parcels, and Ukrposhta is trying to minimize the consequences of the attack with the help of the SBU.

Due to the risk of infection, the websites of those organizations that have not been affected by the virus also do not work. For this reason, for example, the servers of the website of the Kyiv City State Administration, as well as the website of the Ministry of Internal Affairs of Ukraine, were disabled.

Ukrainian officials predictably claim that the attacks are coming from Russia. Oleksandr Turchynov, Secretary of the National Security and Defense Council of Ukraine, said this. “Already now, after conducting an initial analysis of the virus, we can talk about the Russian trace,” the official website of the department quotes him.

By 5:30 p.m., the virus had even reached the Chernobyl nuclear power plant. Volodymyr Ilchuk, head of the Chernobyl nuclear power plant shift, reported this to the Ukrayinska Pravda publication.

“There is preliminary information that some computers have been infected with a virus. Therefore, as soon as this hacker attack began, a personal command was given to computer workers at the places of personnel to turn off their computers,” Ilchuk said.

Attack on sweets and oil and gas

The hacker attack on Tuesday, June 27, also affected some Russian companies, including the oil and gas giants Rosneft and Bashneft, the metallurgical company Evraz, Home Credit Bank, whose branches have suspended work, as well as the Russian representative offices of Mars, Nivea, Mondelez International, TESA and a number of other foreign companies.

  • Reuters
  • MAXIM SHEMETOV

Around 14:30 Moscow time, Rosneft announced a powerful hacker attack on the company's servers. At the same time, the company's microblog on Twitter notes that the attack could have led to serious consequences, but thanks to the transition to backup system management of production processes, neither the extraction nor the preparation of oil were stopped.

After the cyberattack, the websites of the Rosneft and Bashneft companies became inaccessible for some time. Rosneft also declared the inadmissibility of spreading false information about the attack.

“Distributors of false panic messages will be considered as accomplices of the organizers of the attack and will be held accountable together with them,” the company said.

At the same time, Rosneft noted that upon the fact of a cyber attack, the company turned to law enforcement, and expressed the hope that the incident had nothing to do with "current judicial procedures." On Tuesday, June 27, the arbitration court of Bashkiria began considering the merits of the claim of Rosneft, Bashneft and Bashkiria against AFK Sistema in the amount of 170.6 billion rubles.

WannaCry Jr.

At the same time, the hacker attack did not affect the operation of the computer systems of the presidential administration of Russia and the official website of the Kremlin, which, according to TASS, presidential press secretary Dmitry Peskov, "works stably."

The hacker attack also had no effect on the operation of Russian nuclear power plants, the Rosenergoatom concern noted.

Company Dr. Web on its website stated that, despite the resemblance, the current attack was carried out using a virus that is different from the already known malware-Petya ransomware, in particular, a mechanism for spreading the threat.

“Among the victims of the cyberattack were the networks of Bashneft, Rosneft, Mondelez International, Mars, Nivea, TESA and others,” the company said. At the same time, the press service of Mars in Russia said that the cyber attack caused problems with IT systems only for the Royal Canin brand, a pet food manufacturer, and not for the entire company.

The last major hacker attack on Russian companies and government institutions occurred on May 12 as part of a large-scale operation by unknown hackers who attacked Windows computers in 74 countries using the WannaCry encryption virus.

On Tuesday, the head of the International Committee of the Federation Council, Konstantin Kosachev, speaking at a meeting of the Federation Council Commission on the Protection of State Sovereignty, said that about 30% of all cyber attacks on Russia are carried out from the United States.

“No more than 2% of the total number of cyberattacks are committed from Russian territory to American computers, while 28–29% are from the United States to Russian electronic infrastructure,” RIA Novosti quoted Kosachev as saying.

According to the head of the international research team at Kaspersky Lab, Kostin Rayu, the Petya virus has spread to many countries around the world.