July 21, 2016 By Larry Loeb 2 min read

Petya ransomware has always been known for the peculiar manner in which it encrypts an affected disk. While other threats target files on a one-to-one basis, Petya attempts to encrypt the computer’s master boot blocks.

One for the Good Guys

The first version of Petya needed a reboot before the bad stuff would happen, so security researchers found a vaccine that would stop the machine from rebooting. Point to the good guys.

Petya’s authors took a bit of time to regroup and then responded by adding a module called Mischa as a backup. If Petya couldn’t get running, Mischa would encrypt the victim’s files on a one-to-one basis.

Petya Ransomware Reboots

There’s more bubbling beneath the surface here: Each of those Petya versions was using the Salsa20 algorithm to encrypt the master file table, which would then render the disk inaccessible.

But a few implementation bugs left in the ransomware weakened the intended algorithm. It all stemmed from the fact that the malware’s author implemented Salsa20 incorrectly by generating only 16 bits of a key parameter instead of 32.

This opened a window to potentially recover encrypted data, according to one security researcher who addressed Petya previously on the Malwarebytes blog.

Third Time’s the Charm

The creator realized the mistake and addressed the problem in a new release of Petya, the researcher noted in another Malwarebytes post. This new version seems to feature the proper Salsa20.

According to SecurityWeek, the new version also features a more complex preprocessing algorithm. Petya is reaching maturity. However, Petya’s ransomware-as-a-service page lists the new release as a beta version. What will this self-proclaimed beta end up as?

In the past, Petya used spam emails disguised as job applications as a spear phishing technique. These spam emails included a link that ended up pointing to cloud storage locations. It seems prudent to steer clear of such emails unless you are certain that they come from trusted sources. Trust but verify.

More from

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Communication platforms play a major role in data breach risks

4 min read - Every online activity or task brings at least some level of cybersecurity risk, but some have more risk than others. Kiteworks Sensitive Content Communications Report found that this is especially true when it comes to using communication tools.When it comes to cybersecurity, communicating means more than just talking to another person; it includes any activity where you are transferring data from one point online to another. Companies use a wide range of different types of tools to communicate, including email,…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today