In the recent past, a ransomware known as WannaCry was detected by ESET as Win32/Filecoder.WannaCryptor.D . WannaCry also was known as WannaCrypt or Wanna Decryptor has had effects on PCs all over the world. It estimated that the ransomware had affected over 50 countries since May of this year. However an what is termed as an advanced version of Wannacry was detected a few days ago by ESET as Win32/Diskcoder.C Trojan. The ransomware is called Petya or The Golden Eye
The Petya malware attacks a computer’s MBR (master boot record), a key part of the startup system. If the malware successfully infects the MBR, (master boot record), it will encrypt the whole drive itself. The computer user then receives a message that the files have been encrypted, with a demand that a ransom be paid to release them.
The ransomware targets from industries to financial institutions, individual users, healthcare and governmental agencies. These not only resulted in the valuable loss of sensitive data but also abrupt crippling of businesses. Hence, users need to take utmost precaution to find all possible vulnerabilities in their network and use patch updates to safeguard any probable exploit.
ESET has however made this a story not to worry about anymore. With the Ransomware Shield, Network Attack Protection, and Cloud Malware Protection Systems, ESET ensures that there is use multilayered malware prevention and detection to keep criminals from holding your data hostage. It also prevents spread of ransomware by protecting against vulnerabilities for which a patch has not yet been released or deployed and analyzes submitted malware and provides results to endpoints without requiring an update.
How to protect yourself with ESET from Petya
- Use reliable antimalware software: This is a basic but critical component. Just because it’s a server, and it has a firewall, does not mean it does not need antimalware. It does! Always install a reputable antimalware program and keep it updated.
- Make sure that you have all current Windows updates and patches installed
- Run ESET’s EternalBlue Vulnerability Checker to see whether your Windows machines are patched against EternalBlue exploit, and patch if necessary.
- For ESET Home Users: Perform a Product Update.
- For ESET Business Users: Send an Update Task to all Client Workstations or update Endpoint Security or Endpoint Antivirus on your client workstations.
ESET, Proven, Trusted and Tested.