Contact us today!
866-348-2602

Total Tech Care Blog

Total Tech Care has been serving Florida since 2001, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Alert: New Petya Ransomware Spreads via Fake Online Resumes

b2ap3_thumbnail_ransomware_petya_400.jpgNext time you see an unsolicited resume in your email, it’s worth scrutinizing before you just click on it. It could be a nasty new ransomware called Petya.

Petya is a particularly mean-spirited ransomware that hackers use to extort money from their victims. Infection begins with a Windows error, followed by the typical “blue screen of death” reboot, and displays a red skull and crossbones. As the computer restarts, a fraudulent “system check” allows the infection to encrypt the master file table (MFT), so the computer more or less “forgets” where, or even which, files it has.

In addition to doing this, instead of barring access from particular files, Petya locks the user out of their system entirely by overwriting their computer’s master boot record. Once this happens, the computer is rendered useless (you can’t even log in), only displaying a list of demands, an online address to appease those demands in Bitcoin, and finally, a decryption code to regain access to the files.

When the user accesses the payment page, they learn that they have a limited amount of time to purchase their key before the price is doubled--from around an initial cost of .99 Bitcoins, which is equivalent to about $430. While many websites claim that there are commands that will allow the user to skip the lock screen, the MFT will still be encrypted, and the files still useless. Additionally, there’s no guarantee that the decryption key provided upon payment will even solve the problem, potentially leaving the user short $430 and all of their digital files.

Business owners and human resource representatives need to be particularly alert, considering that the preferred method of dispersement for Petya is via email, specifically disguised as what would appear to be a message from someone seeking a job. The message contains a hyperlink that directs to a Dropbox containing a “resume” (an antivirus program-blinding Trojan containing Petya) and a stock photo. With these tactics, Petya had been plaguing German businesses, with no telling when it may spread.

Fortunately, a programmer has come up with a fix to remove Petya without paying any ransom after his father-in-law’s system was targeted. Thanks to some purported carelessness by the authors of this malware, the encryption is crackable. To do so, however, isn’t such a simple task - it requires a second, uninfected hard drive, for starters. So while Petya has been cracked, it is still better to not be a target in the first place.

So how does one avoid such an attack? Mainly vigilance, assisted by Total Tech Care’s security solutions that help detect and block questionable sources. Call 866-348-2602 for more information about products to keep your company safe from the cyber pirates flying a digital skull and bones.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 30 April 2025
If you'd like to register, please fill in the username, password and name fields.

Blog Archive

Sign Up for Our Newsletter

  • First Name *
  • Last Name *

      Free Consultation

      Sign up today for a
      FREE Network Consultation

      How secure is your IT infrastructure?
      Let us evaluate it for free!

      Sign up Now!

      Free Consultation
       

      Tag Cloud

      Security Tip of the Week Technology Best Practices Business Computing Cloud Privacy Hackers Productivity Hosted Solutions Software Efficiency Business Google Network Security Microsoft Internet Email Malware Backup Workplace Tips Innovation Data User Tips Computer Mobile Devices IT Services Hardware Disaster Recovery Android VoIP communications Smartphones Communication Business Continuity IT Support Miscellaneous Smartphone Mobile Device Small Business Network Browser Productivity Collaboration Cybersecurity Quick Tips Business Management Users Phishing Upgrade Managed IT Services Windows Data Backup Outsourced IT Ransomware Windows 10 Cloud Computing Office Data Recovery Server Save Money Passwords Windows 10 Virtualization Tech Term Gadgets Saving Money Holiday Social Media Chrome Managed IT Services Automation Microsoft Office Managed Service Computers Facebook Artificial Intelligence Cybercrime Operating System Internet of Things BYOD Wi-Fi Mobile Device Management Networking IT Support Health Hacking Covid-19 Office 365 Telephone Systems Alert Information Technology Remote Managed Service Provider Information Spam BDR Bandwidth Recovery Employer-Employee Relationship Social Engineering Mobility Router Law Enforcement Mobile Computing App History Application Password Money Data Breach Human Resources Encryption Big Data Applications Remote Monitoring How To Private Cloud Office Tips Managed IT Training Data Storage Patch Management VPN Apps Blockchain Paperless Office Remote Computing Mobile Office Government Voice over Internet Protocol Flexibility Avoiding Downtime Marketing WiFi IT solutions Entertainment Website Budget Wireless Bring Your Own Device Data Management Work/Life Balance Gmail Vulnerability Windows 7 Word Settings Servers Two-factor Authentication Google Drive Mouse HaaS Data Security Infrastructure Meetings Employee/Employer Relationship Risk Management RMM Hacker Save Time Data Protection USB The Internet of Things Lithium-ion battery Conferencing Cleaning Scam Firewall End of Support Education Physical Security Vendor Management Telephone System Staff Virtual Reality Software as a Service Safety Apple Machine Learning Sports HIPAA Social Remote Work Redundancy Connectivity Vendor Keyboard Managed Services User Error Display Samsung YouTube Computer Accessories Wearable Technology Processor Black Market Retail Hard Drives Instant Messaging Value Augmented Reality Robot Fraud Hard Drive Excel Document Management Spam Blocking Electronic Medical Records Biometrics Wireless Technology Printer Remote Worker Solid State Drive How to Virtual Desktop Bluetooth Downtime Cryptocurrency Computing Hiring/Firing DDoS Data storage Automobile Comparison SharePoint IT Consultant CES Computing Infrastructure Digital Signage Business Intelligence Going Green Customer Service Humor Worker Business Technology Content Management Audit Environment IT Management Access Control Battery Fax Server Procurement Shadow IT Virtual Assistant Workplace Strategy Botnet Net Neutrality IT Plan Legal Authentication SaaS Help Desk Internet Exlporer Printing Unsupported Software Charger Network Congestion PDF Update Managed Services Provider eWaste Compliance Database Computer Care Proactive IT Virus OneNote Google Docs Identity Theft Current Events Unified Threat Management Telephony Remote Workers Best Practice Manufacturing MSP Email Best Practices Experience Accountants IT Assessment Root Cause Analysis Cost Management Thought Leadership HBO Scalability Social Networking Credit Cards Managing Stress Knowledge Music Microchip Password Management Computer Tips Skype Business Owner Password Manager Managed IT Service Security Cameras Multi-Factor Security Biometric Security NarrowBand Cameras Virtual CIO OneDrive Data loss Running Cable Twitter Peripheral Outlook Search Leadership Troubleshooting Search Engine NIST Digital Security Cameras Start Menu Business Mangement Using Data iPhone Memory Trending 5G Loyalty Smart Tech Copiers Screen Mirroring Addiction Quick Tip Frequently Asked Questions Amazon Books Ergonomics Mobile Recycling Windows 10s Files Smartwatch OLED Chromecast Printer Server Wiring Practices Development Cast Cache PCI DSS Tip of the week Amazon Web Services Virtual Machine webinar Science Emergency Safe Mode 2FA Professional Services Criminal Fiber Optics Public Cloud Colocation Employee Employer Employee Relationship Uninterrupted Power Supply Cabling Assessment GDPR Hosted Computing Messaging Distributed Denial of Service Wireless Internet Policy Windows Server 2008 Customer Relationship Management Online Shopping Hypervisor Monitor File Sharing Dark mode Tools Trend Micro Analyitcs Programming Specifications Default App Television Camera Inventory SMS Wire Procedure Evernote Saving Time Reputation Streaming Media Tech Support dark theme Content Shopping Travel Google Search Techology Millennials IT Infrastructure Public Computer Laptop Printers Antivirus AI Smart Office FinTech Regulations Wireless Charging Customers Windows 8 Bing Transportation Rootkit Audiobook IT service Social Network Computer Fan Consultant Workforce Investment Touchpad Analytics Virtual Private Network Employees Cables Employee/Employer Relationships Workers Tablet Benefits Best Available Windows 365 Politics Domains FENG Advertising ISP Video Conferencing Telecommuting ROI WIndows 7 IBM Project Management Nanotechnology IaaS Sales Flash Maintenance Cortana Bitcoin Shortcuts Smart Technology Notifications Cryptomining Point of Sale Digital Signature Personal Bloatware Supply Chain Management Software Tips Supercomputer Warranty HVAC Monitoring Sync Google Apps Batteries Emails Relocation Tablets Windows 8.1 Analysis Digitize Entrepreneur Devices Video Games Windows Server 2008 R2 User PowerPoint Administrator Windows Media Player Enterprise Content Management Customer relationships Worker Commute Shortcut Netflix Two Factor Authentication

      Top Blog

      The reasoning for this is simple: you want to make sure that operations are proceeding as intended, even if you’re not there. If you completely check out from the workplace every time you leave, you could return from your vacation to a complete and total disaster that may have been prevented with y...
      QR-Code