{"id":1130,"date":"2017-10-17T15:22:10","date_gmt":"2017-10-17T12:22:10","guid":{"rendered":"https:\/\/community.virtono.com\/?p=1130"},"modified":"2017-10-16T15:38:37","modified_gmt":"2017-10-16T12:38:37","slug":"another-notpetya-style-attack-may-happen-warns-ukraine-police","status":"publish","type":"post","link":"https:\/\/www.virtono.com\/community\/internet-and-technology-news\/another-notpetya-style-attack-may-happen-warns-ukraine-police\/","title":{"rendered":"Another NotPetya style attack may happen warns Ukraine Police"},"content":{"rendered":"<p>The one famous line that comes to my mind when talking about NotPetya is &#8220;Some men just want to watch the world burn&#8221;. As NotPetya was designed not to fill pockets of these criminals but to just create mayhem. The Ransomware was responsible for shutting down thousands of businesses, organizations and banks in Ukraine as well as various parts of Europe in June this year.<\/p>\n<p>Technically speaking, Ransomware, also known as &#8220;NotPetya&#8221;, uses a variant of the &#8220;Eternal Blue&#8221; exploit, which comes from the fundus of the NSA and was stolen from the US news service via Hack.\u00a0In addition, the &#8220;EternalRomance&#8221; exploit and a very special attack against the updating mechanism of a Ukrainian (control) software called MeDoc.<\/p>\n<p>The name &#8220;NotPetya&#8221; is used, among other things, by the security experts of the Russian anti-virus vendor\u00a0Kaspersky, because it is doubtful that this is actually Petya or a real variant of it.<\/p>\n<p>As for now, Ukranian government authorities have once again warned the people to brace themselves for the next-wave of NotPetya style attack which will be affecting at the same scale or even more this time. It was declared in a press release by the Secret Service Of Ukraine (SBU).<\/p>\n<p>They have warned that the attack may once again be conducted by a malicious software update against the state government and private companies.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The one famous line that comes to my mind when talking about NotPetya is &#8220;Some men just want to watch the world burn&#8221;. As NotPetya was designed not to fill pockets of these criminals but to just create mayhem. The Ransomware was responsible for shutting down thousands of businesses, organizations<\/p>\n","protected":false},"author":3,"featured_media":1131,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[25],"tags":[],"class_list":["post-1130","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-and-technology-news"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/10\/2017-07-06-image-3.jpg?fit=1000%2C563&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7ISfL-ie","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":1040,"url":"https:\/\/www.virtono.com\/community\/internet-and-technology-news\/locky-ransomwares-authors-big-fans-of-game-of-thrones\/","url_meta":{"origin":1130,"position":0},"title":"Locky Ransomware&#8217;s Authors : Big Fans of Game Of Thrones","author":"Daniel Draga","date":"September 26, 2017","format":false,"excerpt":"One of the most viewed T.V shows of our time\u00a0Game Of Thrones has found its viewers in all forms of diversities the most recent ones are criminal-type more particularly the Authors of\u00a0Locky Ransomware. Researchers at PhishMe have found the names of various\u00a0Game Of Thrones characters and other references in the\u2026","rel":"","context":"In &quot;IT News&quot;","block_context":{"text":"IT News","link":"https:\/\/www.virtono.com\/community\/category\/internet-and-technology-news\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/09\/WhatsApp-Image-2017-09-25-at-07.12.16.jpeg?fit=768%2C254&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/09\/WhatsApp-Image-2017-09-25-at-07.12.16.jpeg?fit=768%2C254&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/09\/WhatsApp-Image-2017-09-25-at-07.12.16.jpeg?fit=768%2C254&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/09\/WhatsApp-Image-2017-09-25-at-07.12.16.jpeg?fit=768%2C254&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":1239,"url":"https:\/\/www.virtono.com\/community\/internet-and-technology-news\/tor-browser-exploit-reveals-ip-address-of-some-users\/","url_meta":{"origin":1130,"position":1},"title":"Tor browser exploit reveals IP address of some users","author":"Daniel Draga","date":"November 5, 2017","format":false,"excerpt":"Under certain conditions, the Tor Browser reveals the unveiled IP address of the users.\u00a0Affected are only\u00a0Mac\u00a0and\u00a0Linux\u00a0versions of the Firefox bundle, in daily use, the error should affect only a few people. The Tor project has released an\u00a0emergency update\u00a0for the Linux and Mac versions of the Tor Browser Bundle.\u00a0Under certain circumstances,\u2026","rel":"","context":"In &quot;IT News&quot;","block_context":{"text":"IT News","link":"https:\/\/www.virtono.com\/community\/category\/internet-and-technology-news\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/11\/Tor.jpg?fit=1200%2C814&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/11\/Tor.jpg?fit=1200%2C814&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/11\/Tor.jpg?fit=1200%2C814&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/11\/Tor.jpg?fit=1200%2C814&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/11\/Tor.jpg?fit=1200%2C814&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":1818,"url":"https:\/\/www.virtono.com\/community\/internet-and-technology-news\/blackbaud-hack-for-ransom-universities-data-compromised\/","url_meta":{"origin":1130,"position":2},"title":"Blackbaud Hack for Ransom: Universities data compromised","author":"Shreyash Sharma","date":"July 30, 2020","format":false,"excerpt":"Blackbaud, one of the largest providers of education, fundraising, and financial management programs in the world and headquartered in the United States, was hacked. The hack was made in May 2020 and the news was not revealed until July after Blackbaud paid a ransom to the hackers. \u00a0\u00a0 The hacker\u2026","rel":"","context":"In &quot;IT News&quot;","block_context":{"text":"IT News","link":"https:\/\/www.virtono.com\/community\/category\/internet-and-technology-news\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2020\/07\/image-29.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2020\/07\/image-29.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2020\/07\/image-29.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":1060,"url":"https:\/\/www.virtono.com\/community\/internet-and-technology-news\/freemilk-new-phishing-campaign-to-hijack-email-conversations\/","url_meta":{"origin":1130,"position":3},"title":"FreeMilk : New phishing campaign to hijack email conversations","author":"Shreyash Sharma","date":"October 8, 2017","format":false,"excerpt":"A new threat has been identified by\u00a0\u00a0Palo Alto Networks security researchers, it is a\u00a0phishing campaign used by hackers to intercept ongoing email conversations between individuals and hijack them to deploy malware.The focus on even now believes they are in contact with the particular person they had been at first messaging,\u2026","rel":"","context":"In &quot;IT News&quot;","block_context":{"text":"IT News","link":"https:\/\/www.virtono.com\/community\/category\/internet-and-technology-news\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/10\/FreeMilk_1.png?fit=571%2C879&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/10\/FreeMilk_1.png?fit=571%2C879&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2017\/10\/FreeMilk_1.png?fit=571%2C879&ssl=1&resize=525%2C300 1.5x"},"classes":[]},{"id":732,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/hardening-the-defense-of-database-server\/","url_meta":{"origin":1130,"position":4},"title":"Hardening the Defense of Database Server","author":"Daniel Draga","date":"November 1, 2016","format":false,"excerpt":"Importance of Database Security: Databases often store sensitive data Incorrect data or loss of data could negatively affect business operations Databases can be used as bases to attack other systems from. \u00a0 Principles of Finding Holes Don't believe the documentation Implement your own client Debug the system to understand how\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/network-security1.jpg?fit=1200%2C556&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/network-security1.jpg?fit=1200%2C556&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/network-security1.jpg?fit=1200%2C556&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/network-security1.jpg?fit=1200%2C556&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2016\/11\/network-security1.jpg?fit=1200%2C556&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":3595,"url":"https:\/\/www.virtono.com\/community\/knowledgebase\/how-to-protect-your-server-against-brute-force-attacks\/","url_meta":{"origin":1130,"position":5},"title":"How to Protect Your Server Against Brute Force Attacks","author":"George B.","date":"June 23, 2023","format":false,"excerpt":"Introduction Brute force attacks are one of the most common threats that server administrators face. This guide is designed to provide you with the knowledge and strategies you need to protect your server from brute force attacks. What is a Server Brute Force Attack A server brute force attack is\u2026","rel":"","context":"In &quot;Knowledgebase&quot;","block_context":{"text":"Knowledgebase","link":"https:\/\/www.virtono.com\/community\/category\/knowledgebase\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/06\/How-to-Protect-Your-Server-Against-Brute-Force-Attacks.png?fit=600%2C330&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/06\/How-to-Protect-Your-Server-Against-Brute-Force-Attacks.png?fit=600%2C330&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.virtono.com\/community\/wp-content\/uploads\/2023\/06\/How-to-Protect-Your-Server-Against-Brute-Force-Attacks.png?fit=600%2C330&ssl=1&resize=525%2C300 1.5x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/1130","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/comments?post=1130"}],"version-history":[{"count":1,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/1130\/revisions"}],"predecessor-version":[{"id":1132,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/posts\/1130\/revisions\/1132"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/media\/1131"}],"wp:attachment":[{"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/media?parent=1130"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/categories?post=1130"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.virtono.com\/community\/wp-json\/wp\/v2\/tags?post=1130"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}