By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
TechgoonduTechgoonduTechgoondu
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Search
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Reading: Impact of cyber attacks escalates with latest Petya ransomware
Share
Font ResizerAa
TechgoonduTechgoondu
Font ResizerAa
  • Audio-visual
  • Enterprise
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
  • PC
  • Telecom
Search
  • Audio-visual
  • Enterprise
    • Software
    • Cybersecurity
  • Gaming
  • Imaging
  • Internet
  • Media
  • Mobile
    • Cellphones
    • Tablets
  • PC
  • Telecom
Follow US
© 2023 Goondu Media Pte Ltd. All Rights Reserved.
Techgoondu > Blog > Enterprise > Impact of cyber attacks escalates with latest Petya ransomware
EnterpriseInternetSoftware

Impact of cyber attacks escalates with latest Petya ransomware

Alfred Siew
Last updated: June 28, 2017 at 9:07 PM
Alfred Siew
Published: June 28, 2017
5 Min Read
A ransom note appearing on a PC locked up by the Petya ransomware. SCREENSHOT: Symantec handout

Staring at an ATM machine that is unable to dispense money or visiting a hospital for an operation only for it to be cancelled may have been scenarios in a Hollywood movie depicting the most dramatic of cyber attacks in the past.

Today, however, that was what some Ukrainians found when they tried to withdraw money from their banks. ATM machines were locked out by the latest global cyber attack and they had to borrow money from relatives and friends.

In the United States, hospitals were hit as well by the fast-spreading malware, leaving patients scheduled for operations waiting until the computer systems could be restored.

The latest online threat today is based on a piece of ransomware called Petya, which tells victims to pay up US$300 in digital currency to unlock their machines.

That’s a suspiciously small amount, so some industry experts are saying it may be a cover for targeting a specific victim and stealing information on the quiet while everyone is rushing to fix this urgent issue.

Whatever the real motivation, the effect it has had on everyday life is indisputable. Coming just weeks after similar WannaCry ransomware attacks, this cyber infection spreading uncontrollably across the globe is the latest warning that the consequences of such attacks have escalated dramatically.

From a Russian bank that was left paralysed to an Australian factory for the Cadbury chocolate brand being forced to halt production, the victims suffered from temporary disruption to serious worries about lost data and even nuclear fallout.

At the Chernobyl nuclear plant in Ukraine, workers were forced to manually monitor radiation when their computers failed, The New York Times reported.

Just days ago, in a separate attack on the British parliament, hackers compromised up to 90 e-mail accounts before being contained. The country’s defence secretary has since threatened military strikes against such attackers.

And let’s not forget that the latest malware attack used the same hacking tool that the US National Security Agency developed. When this so-called Ethernal Blue tool was leaked, it became something that could be traded online.

Entire ransomware systems are set up today to not only hawk malware but to identify victims’ locations and send the ransom note in their language. Those from wealthier countries are naturally of higher priority among a pool of compromised machines, according to security companies familiar with the threat.

In other words, someone with access and means can sign up for a “ransomware as a service”, much like buying software or music on demand, to deploy it around the world.

That points to one worrying conclusion: In the arms race today, the defenders appear behind the curve against increasingly well-organised and sophisticated hackers.

It shows when even a known threat can wreak such havoc. Based on a Windows loophole that was patched by Microsoft back in March, Petya and WannaCry can be stopped if users are more vigilant or organised.

Unfortunately, in an interconnected world of machines that are not always well maintained, the task is not as easy as it sounds.

And what of the “zero-day” exploits that even Microsoft and others have no clue about but which have been developed by governments as secret cyber weapons? There’s good reason to fear the unknown.

Indeed, there aren’t any surefire defences that users can rely on, except to make themselves less of an easy target. Or to prepare for an attack so as to recover more quickly from it.

Singapore telcos to roll out Mobile Connect, promising simple, secure logins
Robots and AI to the fore
Cloudera leads industry programme to groom Big Data professionals in Singapore
Computex 2025: A glimpse of the machines inside Nvidia’s “AI factories”
7 use cases for 6G: Applications for next-gen communication technologies
TAGGED:antiviruscyber securitymalwarePetyaransomware

Sign up for the TG newsletter

Never miss anything again. Get the latest news and analysis in your inbox.

By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Whatsapp Whatsapp LinkedIn Copy Link Print
Avatar photo
ByAlfred Siew
Follow:
Alfred is a writer, speaker and media instructor who has covered the telecom, media and technology scene for more than 20 years. Previously the technology correspondent for The Straits Times, he now edits the Techgoondu.com blog and runs his own technology and media consultancy.
Previous Article Hands on: GlocalMe U2 mobile Wi-Fi makes roaming easy
Next Article Hands on: Nikon D7500
Leave a Comment

Leave a ReplyCancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Stay Connected

FacebookLike
XFollow

Latest News

Nothing CMF Phone 2 Pro review: Delivers the expected for S$399
Cellphones Mobile
June 19, 2025
Robots at Singapore’s Marina Bay Sands cut labour dependency by 30 per cent
Enterprise
June 18, 2025
Lenovo Yoga Slim 7i Gen 10 review: Powered-packed slim laptop on a budget
PC
June 17, 2025
Sedap review: Eh, faster kill the chicken lah, I cannot cook!
Gaming
June 17, 2025

Techgoondu.com is published by Goondu Media Pte Ltd, a company registered and based in Singapore.

.

Started in June 2008 by technology journalists and ex-journalists in Singapore who share a common love for all things geeky and digital, the site now includes segments on personal computing, enterprise IT and Internet culture.

banner banner
Everyday DIY
PC needs fixing? Get your hands on with the latest tech tips
READ ON
banner banner
Leaders Q&A
What tomorrow looks like to those at the leading edge today
FIND OUT
banner banner
Advertise with us
Discover unique access and impact with TG custom content
SHOW ME

 

 

POWERED BY READYSPACE
The Techgoondu website is powered by and managed by Readyspace Web Hosting.

TechgoonduTechgoondu
© 2024 Goondu Media Pte Ltd. All Rights Reserved | Privacy | Terms of Use | Advertise | About Us | Contact
Follow Us!
Never miss anything again. Get the latest news and analysis in your inbox.

Zero spam, Unsubscribe at any time.
 

Loading Comments...
 

    Welcome Back!

    Sign in to your account

    Username or Email Address
    Password

    Lost your password?