Notebookcheck
, , , , , ,
search relation.
, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
 

Microsoft ensures Windows 10 is the only way to stay protected against ransomware attacks like Petya

Petya’s kill-chain diagram with platform defenses able to mitigate or prevent certain techniques in Windows 10. (Source: Microsoft)
Petya’s kill-chain diagram with platform defenses able to mitigate or prevent certain techniques in Windows 10. (Source: Microsoft)
Microsoft's latest threat analysis notes an ever-increasing sophistication in the ransomware codes, but states that Windows 10 and Windows 10 S block such threats by default.
Bogdan Solca,
, , , , , ,
search relation.
, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
 

Back in March, Wikileaks exposed CIA’s digital surveillance plans by releasing important information regarding the Vault 7 project. It immediately became clear that the intelligence agency ‘hoarded’ vulnerabilities, which, in turn, have been hacked away from CIA and could be used to attack unprotected systems all across the world at any given time. Unleashed in April, the WannaCrypt ransomware supposedly used zero-day vulnerabilities stolen from CIA. Microsoft was able to release an update that addressed such vulnerabilities prior to the release of the infamous ransomware.

The latest ransomware worldwide attack occurred a week ago and once again stirred up controversies involving the security of Windows 10. Microsoft inspected all possible disrupting agents and now has released a full analysis of the Petya attack. Microsoft confirms that Windows 10 was already protected against Petya, due to “the security configuration and reduced attack surface [that] block this attack by default” in Windows 10 and 10 S.

The analysis also points out that the ransomware software is exhibiting an ever-increasing sophistication and presents how the new Petya code was significantly more complex than previous ransomware codes. Petya employed a second exploit to promote lateral movement in networks, leading to increased propagation risks through networks that had an infected machine. The ransomware also featured a specific line of code that trashed boot sectors on Windows 7 computers protected with Kaspersky’s anti-virus (especially in the Ukraine).

Source(s)

static version load dynamic
Loading Comments
Comment on this article
, , , , , ,
search relation.
, , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,
 
Bogdan Solca
Bogdan Solca - Senior Tech Writer - 1529 articles published on Notebookcheck since 2017
I first stepped into the wondrous IT&C world when I was around seven years old. I was instantly fascinated by computerized graphics, whether they were from games or 3D applications like 3D Max. I'm also an avid reader of science fiction, an astrophysics aficionado, and a crypto geek. I started writing PC-related articles for Softpedia and a few blogs back in 2006. I joined the Notebookcheck team in the summer of 2017 and am currently a senior tech writer mostly covering processor, GPU, and laptop news.
contact me via: Facebook
Please share our article, every link counts!
> Notebook / Laptop Reviews and News > News > News Archive > Newsarchive 2017 07 > Microsoft ensures Windows 10 is the only way to stay protected against ransomware attacks like Petya
Bogdan Solca, 2017-07- 4 (Update: 2017-07- 4)