Thursday , March 28 2024
Kwork.ru - услуги фрилансеров от 500 руб.
Home / Science and technology / The expert told about the peculiarities of the virus Petya

The expert told about the peculiarities of the virus Petya

Эксперт рассказал об особенностях вируса PetyaThe main task of a virus Petya – the destruction of the data, said the expert.

Between viruses and Petya WannaCry a lot in common, even the names of the executable files, Trojan horses remained the same. Also experts do not exclude that the attack of this virus were registered and disguised as a commercial.

This was stated by the Director of the Ukrainian antivirus company “Zillya” Oleg Sych.

Kwork.ru - услуги фрилансеров от 500 руб.

According to him, the virus is commonly spread at breakneck speed, and it happens because computers work on the local network.

“Apparently, this is a new modification WannaCry, we fix a lot in common, even the names of the executable files, Trojan horses remained the same, and sometimes the same. That is, belong to the same authors. But we’re not sure, use the same vulnerability or new, but is information from users, their system was completely updated, but also suffered. This suggests that uses a new hole in the system. However, the mechanism is the same: the Trojan spreads in local networks and computers and get infected instantly” – pick rescue the expert.

Note that the virus Petya.A uses a communication Protocol in local networks, which usually combine large company, so the infection occurs quickly enough. Ordinary users usually do not use this communication Protocol, therefore, susceptible to much less.

In the anti-virus company also noted that the main goal of this virus-the extortioner – the destruction of the data, and not their kidnapping. Moreover, experts do not exclude that this is a biased attack disguised as a commercial.

“If the last attack was North Korea, now too early to say who was behind the attack on Ukraine. We have not yet received information from our colleagues from other countries. To exclude Russia it is impossible, but to claim as you can,” said the Owl.

The expert adds that all the organizations that suffered from attacks, may threaten an irreparable loss of information stored on their computers, but even more critical loss can be, if it is the servers, not just workstations, as it contains all your data .

At the same time, he reassured that the banks that fall under the infection, the threat level is the lowest, as almost all of them do a data backup.

I think soon everyone will know what vulnerability is being and using whose computer is infected. But if we talk about the health of your computers – it will take more time. For example, the last version WannaCry managed to decode a few weeks after the first infection. In this case, the Trojan is sophisticated, it restarts the computer. Talking about the transcript yet, it may take several weeks or more. Therefore, the restoration work for enterprises is to restore from backups, if they exist,
– summed up the Director of the Ukrainian antivirus company.

© 2017, paradox. All rights reserved.

Check Also

As the Chinese are manually cut down these caves?

In 1992, Wu anai, incredibly curious a resident of the Chinese village of Lunjiao, collected …

Leave a Reply

Your email address will not be published. Required fields are marked *