Ransomware 'Petya' Targets Your Drives, Not Just Your Files

Many people looking for a quick buck will always find ways how to do it. Hackers and virus programmers do too, by using what is called ransomware. Now, a new ransomware called "Petya" does not only lock files, it can lock entire hard drives too.

Ransomware is getting more famous between hackers hoping to score easy cash, reports Slash Gear. It basically works by locking or encrypting your files, in which the only way for you to open or get them decrypted is by using a decryption code. Of course, hackers will only give the code once a certain amount of money has been paid, thus the term "ransomware."

It was earlier reported that a certain "TeslaCrypt 3" was the most harmful ransomware. This is because earlier versions bring the unlocking key into the computer that it infects, giving the computer owner a chance at decrypting files without paying a cent.

A new type of ransomware, however, was found to be more dangerous than "TeslaCrypt 3." Tagged as "Petya," the new ransomware doesn't only encrypt individual files like others, but it does more than that.

The new ransomware, "Petya," is able to lock entire hard drives, according to researchers at G Data. Obviously aiming at companies, the malware is able to infiltrate computer systems by means of a downloadable .EXE file that, when run, crashes the system and reboots it with the intent of blocking the user's access to everything on the computer.

Before rebooting the system, "Petya" manipulates the Master Boot Record (MBR) so that it can start to do its nasty job. Once done with the MBR, the display will show what appears to be a system check, but is actually the point where it starts to disable the user's access to all files. G Data assumes that currently, files are not encrypted yet, just blocked from the user.

After the alleged system check, "Petya" then shows its true colors and offers the victim a choice -- to purchase the unlocking key or just leave the files unusable. Should users wish to purchase (which is likely, after trying to do everything else), there are some instructions on how to do so: use the TOR browser, pay the ransom and enter the key once it is given.

Worse, the ransom price doubles in merely seven days after Petya makes its way into the system. On the bright side, G Data researchers are currently investigating possible solutions to the problem, in the hopes that no one will ever have to pay a single cent.

© 2024 ParentHerald.com All rights reserved. Do not reproduce without permission.

Join the Discussion
Real Time Analytics