dglobalnews.com Chernobyl's radiation monitoring hit by cyberattack: spokeswoman
Published: Thu, June 29, 2017
Markets | By Armando Jensen

Chernobyl's radiation monitoring hit by cyberattack: spokeswoman

Chernobyl's radiation monitoring hit by cyberattack: spokeswoman

The Ukrainian central bank said a number of banks and companies, including the state power distributor, were hit by a cyber attack that disrupted some operations.

NZ Cert is advising organisations running Windows XP through to Windows 2008 R2 and Small Business Server to install the security patch released by Microsoft at the time of the WannaCry attack (it's on Microsoft's website here). According to a statement by Cadbury owner Mondelez International Inc, last night, staff were facing technical problems in various regions but it is still unclear that it was due to cyber attack.

The ransomware - as is the wont of this category of malware - is encrypting the hard drives of infected computers and demanding $300 in return for the drive to be decrypted.

The payment method via an email address that was quickly shut down, is considered amateurish and led to speculation that the virus' objective was not monetary gain, but rather to simply cause damage. About 80 miles away, workers were forced to manually monitor radiation at the old Chernobyl nuclear plant when their computers failed.

Ukrainian Prime Minister Volodymyr Groysman, described the attack as "unprecedented" in a post on Facebook.

Russia's Rosneft oil company also reported falling victim to hacking and said it had narrowly avoided major damage, as did Danish shipping giant AP Moller-Maersk.

Ukrainian officials confirmed a possible link to MeDoc.

Blackhawks get Saad back in trade with Blue Jackets
The Blackhawks received defenseman Connor Murphy and center Laurent Dauphin from the Coyotes [for Hjalmarsson]. Motte, 22, scored four goals and three assists in 33 games for the Blackhawks a year ago in his rookie season.

The private terminal, one of three at the Jawaharlal Nehru Port Trust, was operated by Maersk. "Not so long ago the world was caught off-guard by the widespread cyber-attack carried out using a unsafe "#Ransomware" called #WannaCry.

By creating a read-only file - named perfc - and placing it within a computer's "C:\Windows" folder, the attack will be stopped in its tracks.

The malware is widely referred to as "Petya" because it shared a significant amount of code with an older ransomware called "Petya" but researchers later found that the similarities between the recent and previous malwares were superficial.

There are no reports of Petya ransomware infection in Singapore, the Cyber Security Agency of Singapore (CSA)'s Singapore Computer Emergency Response Team (SingCert) said in a joint statement with the Government Technology Agency (GovTech) on Wednesday (June 28).

The U.S. Department of Homeland Security is also monitoring the cyberattacks. Petya was for sale on the so-called dark web, where its creators made the ransomware available as "ransomware as a service" - a play on Silicon Valley terminology for delivering software over the internet, according to the security firm Avast Threat Labs.

It encrypts files on a PC, displaying a flashing red-and-white skull and crossbones before a demand for $US300 to free them.

It has been reported that Petya is also referred to as NotPetya. His method tricks the ransomware into thinking that it's already operating on a machine.

Like this: