{
	"id": "bb72e1f3-8c06-4d7f-b7b7-e53f7faaaa04",
	"created_at": "2026-04-06T00:12:54.074605Z",
	"updated_at": "2026-04-10T13:11:44.606498Z",
	"deleted_at": null,
	"sha1_hash": "3f35b632effe76505ba58b0401ce675c482922b6",
	"title": "New WannaCryptor-like ransomware attack hits globally: All you need to know",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 6896996,
	"plain_text": "New WannaCryptor-like ransomware attack hits globally: All you\r\nneed to know\r\nBy Editor\r\nArchived: 2026-04-05 13:44:14 UTC\r\nNumerous reports are coming out on social media about a new ransomware attack in Ukraine, which could be\r\nrelated to the Petya family.\r\n27 Jun 2017  •  , 4 min. read\r\nUpdate (June 28 - 15:00 CEST): ESET researchers have confirmed that further affected systems had access to\r\nUkraine networks through VPN. Presently, it has not been seen in the malware a functionality to spread outside of\r\nthe LAN network.\r\nUpdate (June 27 - 23.34 CEST): Shutting down the computer and not booting again could prevent the disk\r\nencryption, though several files can be already encrypted after the MBR is replaced and further infection through\r\nthe network is attempted. \r\nUpdate (June 27 - 22.28 CEST): Paying is no longer possible as the email to send the Bitcoin wallet ID and\r\n“personal installation key” has been shut down by the provider. Thus, people shouldn’t  pay for the ransom as\r\nthey will not be able to receive the decryption key.\r\nhttps://www.welivesecurity.com/2017/06/27/new-ransomware-attack-hits-ukraine\r\nPage 1 of 8\n\nUpdate (June 27 - 21.20 CEST): ESET researchers have located the point from which this global epidemic has all\r\nstarted. Attackers have successfully compromised the accounting software M.E.Doc, popular across various\r\nindustries in Ukraine, including financial institutions. Several of them executed a trojanized update of M.E.Doc,\r\nwhich allowed attackers to launch the massive ransomware campaign today which spread across the whole\r\ncountry and the rest of the world. M.E.Doc has today released a warning on its website.\r\nNumerous reports are coming out on social media about a new ransomware attack in Ukraine, which could be\r\nrelated to the Petya family (subsequently being referred to as NotPetya and ExPetya, due to its particularly unique\r\ncharacteristics), which is currently detected by ESET as Win32/Diskcoder.C Trojan. If it successfully infects the\r\nMBR, it will encrypt the whole drive itself. Otherwise, it encrypts all files, like Mischa.\r\nFor spreading, it appears to be using a combination of the SMB exploit (EternalBlue) used by WannaCryptor for\r\ngetting inside the network, then spreading through PsExec for spreading within the network.\r\nThis dangerous combination may be the reason why this outbreak has spread globally and rapidly, even after the\r\nprevious outbreaks have generated media headlines and hopefully most vulnerabilities have been patched. It only\r\ntakes one unpatched computer to get inside the network, and the malware can get administrator rights and spread\r\nto other computers.\r\nThe journalist Christian Borys, for example, tweeted that the cyberattack has “allegedly hit” banks, power grid\r\nand postal companies, among others. Moreover, it appears that the government has also come under attack. Borys\r\nhas also tweeted an image put up on Facebook by Ukraine’s deputy prime minister, Pavlo Rozenko, which shows\r\na computer apparently being encrypted.\r\nThe National Bank of Ukraine has also put out a message on its website warning other banks of the ransomware\r\nattack.\r\nhttps://www.welivesecurity.com/2017/06/27/new-ransomware-attack-hits-ukraine\r\nPage 2 of 8\n\nIt stated: “Currently, the financial sector strengthened security measures and counter hacker attacks all financial\r\nmarket participants.”\r\nForbes said that while there appear to be similarities with WannaCryptor – with others describing it as WannaCry-esque – it is likely to be a variant of Petya.\r\nAn image, similar to the one witnessed by WannaCryptor victims, reportedly showing the ransomware message is\r\nmaking the rounds online, with one from Group-IB showing the following message (paraphrased):\r\n“If you see this text, then your files are no longer accessible, because they have been encrypted … We guarantee\r\nthat you can recover all your files safely and easily. All you need to do is submit the payment [$300 bitcoins] and\r\npurchase the decryption key.”\r\nHowever, a spokesman said that “there is no effect on power supplies”, although it may be too early to ascertain\r\nthis.\r\nIt appears that the ransomware attack is not specific to Ukraine. The Independent said that Spain and India may\r\nalso have been affected, as well as the Danish shipping company Maersk and the British advertising company\r\nWPP.\r\nhttps://www.welivesecurity.com/2017/06/27/new-ransomware-attack-hits-ukraine\r\nPage 3 of 8\n\nOn the latter’s homepage, the following message reads: “The WPP web site is currently unavailable due to\r\nimportant routine maintenance normal service will resume shortly.\r\n“We apologise for any inconvenience this may cause. In the meantime if you would like to contact WPP, please\r\nemail the site Editor at the following address …”\r\nWPP has since confirmed on Twitter that it has been the victim of an attack: “IT systems in several WPP\r\ncompanies have been affected by a suspected cyberattack. We are taking appropriate measures \u0026 will update\r\nasap.”\r\nThere are also reports that payments are being made in response to the attack, at the BTC address linked here.\r\nFor more on Petya, check out this insightful piece from 2016, which notes of the crypto-ransomware:\r\n\"Petya took an approach different from that of other crypto-ransomware. Instead of encrypting files individually, it\r\naimed at the file system.\r\n\"The target is the victim’s master boot record (MBR), which is responsible for loading the operating system right\r\nafter system boot.\"\r\nIn order to prevent this kind of threat, we recommend that you read our support article and keep in mind the\r\nfollowing steps:\r\n1. Always have your systems fully patched\r\n2. Use a proper security solution\r\n3. Do not use the same account/credentials for workstations and server administration\r\n4. Disable default ADMIN$ or communication to admin shares - users can use ESET Smart Security for\r\nhome and ESET Endpoint Security 6+ for business where network attack protection is present (Option:\r\nIDS and advanced options-\u003eallow incoming connections to admin shares in SMB)\r\nhttps://www.welivesecurity.com/2017/06/27/new-ransomware-attack-hits-ukraine\r\nPage 4 of 8\n\n5. Disable SMB1 when possible – issues with  XP, 2003 that do not know SMB2+\r\nThis is currently a breaking story. Further updates to come, as listed above. For a snapshot of recent major\r\nransomware attacks and what else to do, see the infographic below:\r\nhttps://www.welivesecurity.com/2017/06/27/new-ransomware-attack-hits-ukraine\r\nPage 5 of 8\n\nhttps://www.welivesecurity.com/2017/06/27/new-ransomware-attack-hits-ukraine\r\nPage 6 of 8\n\nhttps://www.welivesecurity.com/2017/06/27/new-ransomware-attack-hits-ukraine\r\nPage 7 of 8\n\nSource: https://www.welivesecurity.com/2017/06/27/new-ransomware-attack-hits-ukraine\r\nhttps://www.welivesecurity.com/2017/06/27/new-ransomware-attack-hits-ukraine\r\nPage 8 of 8",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"Malpedia",
		"MISPGALAXY"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://www.welivesecurity.com/2017/06/27/new-ransomware-attack-hits-ukraine"
	],
	"report_names": [
		"new-ransomware-attack-hits-ukraine"
	],
	"threat_actors": [],
	"ts_created_at": 1775434374,
	"ts_updated_at": 1775826704,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/3f35b632effe76505ba58b0401ce675c482922b6.pdf",
		"text": "https://archive.orkl.eu/3f35b632effe76505ba58b0401ce675c482922b6.txt",
		"img": "https://archive.orkl.eu/3f35b632effe76505ba58b0401ce675c482922b6.jpg"
	}
}