What is Petya Ransomware Attack and How to Avoid It?

  • 7 years ago
'Petya' ransomware, a cyber attack which is being originated from Ukraine has shown an unprecedented level of sophistication, which authorities believe, mainly spread through a malicious update to a small Ukrainian tax software company.

'Petya' attacks the Master Boot Record (MBR). It first reboots the computers and then encrypts the hard drive’s file table (MFT), which renders the MBR inoperable. From this point forwards, it restricts access to the system by seizing information of file names, sizes, and location on the physical disk.

Who Are We?

G'SECURE LABS - A division of Gateway Group offers a comprehensive suite of solutions for BFSI, Enterprises, Online Portals, and SMEs

Our Offerings

• Database Security
› VULNERABILITY ASSESSMENT
› VIRTUAL PATCHING FOR DATABASES
› DATABASE ACTIVITY MONITORING

• Agentless Data Security
› PIXALERT DATA DISCOVERY
› PIXALERT DATA CLASSIFICATION
› ILLICIT IMAGE DETECTION AND MANAGEMENT
› PIXALERT DATA DISCOVERY
› PIXALERT DATA DISCOVERY

• Agentless System Management
› UNPRECEDENTED NETWORK CONTROL, OPTIMIZATION AND PERFORMANCE
› CHANGE CONFIGURATION
› LICENSE MANAGEMENT
› MIGRATION

• Firewall Management › Firewall analyzer › Firewall workflow

• Advanced Threat Prevention › Target-specific sandboxing increases detection › Freeze the threat › Initiate fix

Recommended