Petya Ransomware arrives via Dropbox as a Resume.

Petya Ransomware arrives via Dropbox as a Resume.
Victims receive an email tailored to look and read like a business-related resume from an applicant seeking a position in a company. It would present users with a hyperlink to a Dropbox storage location, which supposedly would let the user download said applicant’s CV.
Once executed, Petya overwrites the MBR of the hard drive, causing Windows to crash and display a blue screen. Should the user try to reboot his PC, the modified MBR will prevent him from loading Windows normally and instead greet him with an ASCII skull and an ultimatum: pay up with a certain amount of bitcoins or lose access to your files and computer.
The edited MBR also disallows restarting in Safe Mode.
Comment(s)
Categories
- Other (43)
- Ransomware (154)
- Events and News (27)
- Features (45)
- Security (487)
- Tips (79)
- Google (30)
- Achievements (11)
- Products (36)
- Activation (7)
- Dealers (1)
- Bank Phishing (53)
- Malware Alerts (235)
- Cyber Attack (303)
- Data Backup (13)
- Data Breach (132)
- Phishing (165)
- Securty Tips (2)
- Browser Hijack (19)
- Adware (15)
- Email And Password (71)
- Android Security (78)
- Knoweldgebase (38)
- Botnet (17)
- Updates (4)
- Alert (71)
- Hacking (71)
- Social Media (8)
- vulnerability (76)
- Hacker (38)
- Spyware (12)
- Windows (8)
- Microsoft (26)
- Uber (1)
- YouTube (1)
- Trojan (5)
- Website hacks (10)
- Paytm (1)
- Credit card scam (2)
- Telegram (3)
- RAT (8)
- Bug (3)
- Twitter (2)
- Facebook (8)
- Banking Trojan (10)
- Mozilla (2)
- COVID-19 (5)
- Instagram (4)
- NPAV Announcement (9)
- IoT Security (2)
- Deals and Offers (2)
- Cloud Security (12)
- Offers (5)
- Gaming (1)
- FireFox (2)
- LinkedIn (3)
- WhatsApp (6)
- Amazon (2)
- DMart (1)
- Payment Risk (5)
- Occasion (3)
- firewall (3)
- Cloud malware (2)
- Cloud storage (2)
- Financial fraud (52)
- Impersonation phishing (1)
- DDoS (7)
- Smishing (2)
- Whale (0)
- Whale phishing (4)
- WINRAR (2)
- ZIP (2)
- Fraud Protector (41)
Recent Posts
Archive
Tags
cybersecurity
cybercrime
cyber attack
phishing
phishing attacks
data breach
cybersecurity threats
cyber threats
phishing attack
data theft
malware
cyber fraud
android malware
credential theft
ransomware
financial fraud
ransomeware
social engineering
#cybersecurity
financial security
data protection
cyber security
phishingattack
cyberthreats
network security
ransomware attacks
malware distribution
data security
online fraud
cyber threat
data stealing
security vulnerabilities
ddos attack
cert-in
phishing scam
cyber crime
identity theft
phishing email
ransomware attack
microsoft
cybercriminals
digital safety
cyberattack
india
malware attack
twitter
ddos
trojan
critical vulnerability
cyber attacks