{"id":416,"date":"2017-06-28T06:05:52","date_gmt":"2017-06-28T06:05:52","guid":{"rendered":"https:\/\/eset-blog.aist.fun\/new-wannacryptor-like-ransomware-attack-hits-globally-all-you-need-to-know\/"},"modified":"2019-05-29T12:03:47","modified_gmt":"2019-05-29T12:03:47","slug":"new-wannacryptor-like-ransomware-attack-hits-globally-all-you-need-to-know","status":"publish","type":"post","link":"https:\/\/blog.eset.ee\/et\/en\/2017\/06\/28\/new-wannacryptor-like-ransomware-attack-hits-globally-all-you-need-to-know\/","title":{"rendered":"New WannaCryptor-like ransomware attack hits globally: all you need to know"},"content":{"rendered":"<p class=\"wls-paragraph\"><em>Update (June 27 \u2013 23.34 CEST): Shutting down the computer and not booting again could prevent the disk encryption, though several files can be already encrypted after the MBR is replaced and further infection through the network is attempted.&nbsp;<\/em><\/p>\n<p class=\"wls-paragraph\"><em>Update (June 27 \u2013 22.28 CEST): Paying is no longer possible as the email to send the Bitcoin wallet ID and \u201cpersonal installation key\u201d has been shut down by the <a href=\"https:\/\/posteo.de\/en\/blog\/info-on-the-petrwrappetya-ransomware-email-account-in-question-already-blocked-since-midday\" target=\"_blank\" rel=\"noopener noreferrer\">provider<\/a>. Thus, people shouldn\u2019t&nbsp; pay for the ransom as they will not be able to receive the decryption key.<br \/>\n<\/em><\/p>\n<p class=\"wls-paragraph\"><em>Update (June 27 \u2013 21.20 CEST): ESET researchers have located the point from which this global epidemic has all started. Attackers have successfully compromised the accounting software M.E.Doc, popular across various industries in Ukraine, including financial institutions. Several of them executed a trojanized update of M.E.Doc, which allowed attackers to launch the massive ransomware campaign today which spread across the whole country and to the whole world. M.E.Doc has today released a warning on their website: <a href=\"http:\/\/www.me-doc.com.ua\/vnimaniyu-polzovateley\" target=\"_blank\" rel=\"noopener noreferrer\">http:\/\/www.me-doc.com.ua\/vnimaniyu-polzovateley<\/a><\/em><\/p>\n<p class=\"wls-paragraph\">Numerous reports are coming out on social media about a new ransomware attack in Ukraine, which could be related to the <a href=\"http:\/\/www.virusradar.com\/en\/Win32_Diskcoder.Petya.A\/description\">Petya family<\/a>, which is currently detected by ESET as <em>Win32\/Diskcoder.C Trojan<\/em>. If it successfully infects the MBR, it will encrypt the whole drive itself. Otherwise, it encrypts all files, like <a href=\"http:\/\/www.virusradar.com\/en\/Win32_Filecoder.Mischa\/description\" target=\"_blank\" rel=\"noopener noreferrer\">Mischa<\/a>.<\/p>\n<p class=\"wls-paragraph\">For spreading, it appears to be using a combination of the SMB exploit (EternalBlue) used by <a href=\"https:\/\/www.welivesecurity.com\/2017\/05\/16\/check-eternalblue-pc-patched-wannacryptor-worm-vulnerability\/\">WannaCryptor <\/a>for getting inside the network, then spreading through PsExec for spreading within the network.<\/p>\n<p class=\"wls-paragraph\">This dangerous combination may be the reason why this outbreak has spread globally and rapidly, even after the previous outbreaks have generated media headlines and hopefully most vulnerabilities have been patched. It only takes one unpatched computer to get inside the network, and the malware can get administrator rights and spread to other computers.<a  href=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/06\/PETYA_SMA_1200X630.jpg\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" data-magnific_type=\"gallery\" title=\"\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-large wp-image-96143\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/06\/PETYA_SMA_1200X630-1024x538.jpg\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" srcset=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/06\/PETYA_SMA_1200X630-1024x538.jpg 1024w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/06\/PETYA_SMA_1200X630-300x158.jpg 300w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/06\/PETYA_SMA_1200X630-768x403.jpg 768w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/06\/PETYA_SMA_1200X630.jpg 1200w\" alt=\"Petya, WannaCry\" width=\"1024\" height=\"538\"><\/a>The journalist Christian Borys, for example, <a href=\"https:\/\/twitter.com\/ItsBorys\/status\/879683607312424960\" target=\"_blank\" rel=\"noopener noreferrer\">tweeted<\/a> that the cyberattack has \u201callegedly hit\u201d banks, power grid and postal companies, among others. Moreover, it appears that the government has also come under attack. Borys has also tweeted an image put up on Facebook by Ukraine\u2019s deputy prime minister, Pavlo Rozenko, which shows a computer apparently being encrypted.<\/p>\n<p class=\"wls-paragraph\">The National Bank of Ukraine has also <a href=\"https:\/\/bank.gov.ua\/control\/uk\/publish\/article?art_id=51024788&amp;cat_id=80928\" target=\"_blank\" rel=\"noopener noreferrer\">put out a message<\/a> on its website warning other banks of the ransomware attack.<\/p>\n<p class=\"wls-paragraph\">It stated: \u201cCurrently, the financial sector strengthened security measures and counter hacker attacks all financial market participants.\u201d<\/p>\n<p class=\"wls-paragraph\">Forbes <a href=\"https:\/\/www.forbes.com\/sites\/thomasbrewster\/2017\/06\/27\/ransomware-spreads-rapidly-hitting-power-companies-banks-airlines-metro\/#783003187abd\">said<\/a> that while there appear to be similarities with WannaCryptor \u2013&nbsp;with others describing it as WannaCry-esque \u2013 it is likely to be a variant of Petya.<\/p>\n<p class=\"wls-paragraph\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-96059\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/06\/Screen-Shot-2017-06-27-at-15.41.20.png\" sizes=\"auto, (max-width: 814px) 100vw, 814px\" srcset=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/06\/Screen-Shot-2017-06-27-at-15.41.20.png 1277w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/06\/Screen-Shot-2017-06-27-at-15.41.20-300x152.png 300w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/06\/Screen-Shot-2017-06-27-at-15.41.20-768x390.png 768w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/06\/Screen-Shot-2017-06-27-at-15.41.20-1024x520.png 1024w\" alt=\"\" width=\"814\" height=\"413\"><\/p>\n<p class=\"wls-paragraph\">An image, similar to the one witnessed by WannaCryptor victims, reportedly showing the ransomware message is making the rounds online, with one from <a href=\"https:\/\/twitter.com\/GroupIB_GIB\/status\/879687387235971073\" target=\"_blank\" rel=\"noopener noreferrer\">Group-IB<\/a> showing the following message (paraphrased):<\/p>\n<p class=\"wls-paragraph\">\u201cIf you see this text, then your files are no longer accessible, because they have been encrypted \u2026 We guarantee that you can recover all your files safely and easily. All you need to do is submit the payment [$300 bitcoins] and purchase the decryption key.\u201d<\/p>\n<p class=\"wls-paragraph\">However, a spokesman said that \u201cthere is no effect on power supplies\u201d, although it may be too early to ascertain this.<\/p>\n<p class=\"wls-paragraph\">It appears that the ransomware attack is not specific to Ukraine. The <a href=\"http:\/\/www.independent.co.uk\/life-style\/gadgets-and-tech\/news\/hack-cyber-attack-ukraine-russia-wannacry-petya-security-internet-broken-computer-not-working-a7810626.html\" target=\"_blank\" rel=\"noopener noreferrer\">Independent<\/a> said that Spain and India may also have been affected, as well as the Danish shipping company Maersk and the British advertising company WPP.<\/p>\n<p class=\"wls-paragraph\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-96058\" src=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/06\/Screen-Shot-2017-06-27-at-15.33.15.png\" sizes=\"auto, (max-width: 1068px) 100vw, 1068px\" srcset=\"https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/06\/Screen-Shot-2017-06-27-at-15.33.15.png 2260w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/06\/Screen-Shot-2017-06-27-at-15.33.15-300x159.png 300w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/06\/Screen-Shot-2017-06-27-at-15.33.15-768x408.png 768w, https:\/\/www.welivesecurity.com\/wp-content\/uploads\/2017\/06\/Screen-Shot-2017-06-27-at-15.33.15-1024x544.png 1024w\" alt=\"\" width=\"1068\" height=\"567\"><\/p>\n<p class=\"wls-paragraph\">On the latter\u2019s homepage, the following message reads: \u201cThe WPP web site is currently unavailable due to important routine maintenance normal service will resume shortly.<\/p>\n<p class=\"wls-paragraph\">\u201cWe apologise for any inconvenience this may cause. In the meantime if you would like to contact WPP, please email the site Editor at the following address \u2026\u201d<\/p>\n<p class=\"wls-paragraph\">WPP has since confirmed on <a href=\"https:\/\/twitter.com\/WPP\/status\/879706256612761600\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a> that it has been the victim of an attack: \u201cIT systems in several WPP companies have been affected by a suspected cyberattack. We are taking appropriate measures &amp; will update asap.\u201d<\/p>\n<p class=\"wls-paragraph\">There are also reports that payments are being made in response to the attack, at the BTC address linked <a href=\"https:\/\/blockchain.info\/address\/1Mz7153HMuxXTuR2R1t78mGSdzaAtNbBWX\">here<\/a>.<\/p>\n<p class=\"wls-paragraph\">For more on Petya, check out <a href=\"https:\/\/www.welivesecurity.com\/2016\/09\/13\/how-encryption-molded-crypto-ransomware\/\" target=\"_blank\" rel=\"noopener noreferrer\">this insightful piece<\/a> from 2016, which notes of the crypto-ransomware:<\/p>\n<p class=\"wls-paragraph\">\u201c<a href=\"https:\/\/www.welivesecurity.com\/2016\/04\/28\/ransomware-is-everywhere-but-even-black-hats-make-mistakes\/\" target=\"_blank\" rel=\"noopener noreferrer\">Petya<\/a> took an approach different from that of other crypto-ransomware. Instead of encrypting files individually, it aimed at the file system.<\/p>\n<p class=\"wls-paragraph\">\u201cThe target is the victim\u2019s <a href=\"https:\/\/en.wikipedia.org\/wiki\/Master_boot_record\" target=\"_blank\" rel=\"noopener noreferrer\">master boot record<\/a> (MBR), which is responsible for loading the operating system right after system boot.\u201d<\/p>\n<p class=\"wls-paragraph\">In order to prevent this kind of threat, we recommend that you always have your systems fully patched, that you use a proper <a href=\"http:\/\/eset.ee\/en\/for-home\/products\/eset-smart-security-premium\" target=\"_blank\" rel=\"noopener noreferrer\">security solution<\/a> and that you set up network segmentation, which might help prevent spreading within the network.<\/p>\n<p class=\"wls-paragraph\"><em>This is currently a breaking story. Further updates to come.<\/em><\/p>\n<p>Source: <a href=\"\/?p=1144&amp;lang=en\"><span class=\"community-name\"><strong>WeLiveSecurity<\/strong><\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Update (June 27 \u2013 23.34 CEST): Shutting down the computer and not booting again could prevent the disk encryption, though several files can be already encrypted after the MBR is replaced and further infection through the network is attempted.&nbsp; Update (June 27 \u2013 22.28 CEST): Paying is no longer possible as the email to send<\/p>\n","protected":false},"author":5,"featured_media":1818,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[147,162,167,170,173],"tags":[],"class_list":["post-416","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybercrime","category-news","category-privacy","category-small-business","category-windows"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.2 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>New WannaCryptor-like ransomware attack hits globally: all you need to know - ESET Eesti Blogi<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.eset.ee\/et\/en\/2017\/06\/28\/new-wannacryptor-like-ransomware-attack-hits-globally-all-you-need-to-know\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New WannaCryptor-like ransomware attack hits globally: all you need to know\" \/>\n<meta property=\"og:description\" content=\"Update (June 27 \u2013 23.34 CEST): Shutting down the computer and not booting again could prevent the disk encryption, though several files can be already encrypted after the MBR is replaced and further infection through the network is attempted.&nbsp; Update (June 27 \u2013 22.28 CEST): Paying is no longer possible as the email to send\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.eset.ee\/et\/en\/2017\/06\/28\/new-wannacryptor-like-ransomware-attack-hits-globally-all-you-need-to-know\/\" \/>\n<meta property=\"og:site_name\" content=\"ESET Eesti Blogi\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/antiviirus\" \/>\n<meta property=\"article:published_time\" content=\"2017-06-28T06:05:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-29T12:03:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_644523403-623x410-623x410.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"623\" \/>\n\t<meta property=\"og:image:height\" content=\"410\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ESET Blog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ESET Blog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/06\\\/28\\\/new-wannacryptor-like-ransomware-attack-hits-globally-all-you-need-to-know\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/06\\\/28\\\/new-wannacryptor-like-ransomware-attack-hits-globally-all-you-need-to-know\\\/\"},\"author\":{\"name\":\"ESET Blog\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"headline\":\"New WannaCryptor-like ransomware attack hits globally: all you need to know\",\"datePublished\":\"2017-06-28T06:05:52+00:00\",\"dateModified\":\"2019-05-29T12:03:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/06\\\/28\\\/new-wannacryptor-like-ransomware-attack-hits-globally-all-you-need-to-know\\\/\"},\"wordCount\":793,\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/06\\\/28\\\/new-wannacryptor-like-ransomware-attack-hits-globally-all-you-need-to-know\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_644523403-623x410-623x410.jpg\",\"articleSection\":[\"cybercrime\",\"news\",\"privacy\",\"small business\",\"windows\"],\"inLanguage\":\"en-US\",\"copyrightYear\":\"2017\",\"copyrightHolder\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/#organization\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/06\\\/28\\\/new-wannacryptor-like-ransomware-attack-hits-globally-all-you-need-to-know\\\/\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/06\\\/28\\\/new-wannacryptor-like-ransomware-attack-hits-globally-all-you-need-to-know\\\/\",\"name\":\"New WannaCryptor-like ransomware attack hits globally: all you need to know - ESET Eesti Blogi\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/06\\\/28\\\/new-wannacryptor-like-ransomware-attack-hits-globally-all-you-need-to-know\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/06\\\/28\\\/new-wannacryptor-like-ransomware-attack-hits-globally-all-you-need-to-know\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_644523403-623x410-623x410.jpg\",\"datePublished\":\"2017-06-28T06:05:52+00:00\",\"dateModified\":\"2019-05-29T12:03:47+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/06\\\/28\\\/new-wannacryptor-like-ransomware-attack-hits-globally-all-you-need-to-know\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/06\\\/28\\\/new-wannacryptor-like-ransomware-attack-hits-globally-all-you-need-to-know\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/06\\\/28\\\/new-wannacryptor-like-ransomware-attack-hits-globally-all-you-need-to-know\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_644523403-623x410-623x410.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.eset.ee\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/shutterstock_644523403-623x410-623x410.jpg\",\"width\":623,\"height\":410},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/06\\\/28\\\/new-wannacryptor-like-ransomware-attack-hits-globally-all-you-need-to-know\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New WannaCryptor-like ransomware attack hits globally: all you need to know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/\",\"name\":\"ESET Eesti Blogi\",\"description\":\"Uudised IT maailmast\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/#\\\/schema\\\/person\\\/876cf293277fc0b2ae2f4395fffe4c88\",\"name\":\"ESET Blog\",\"sameAs\":[\"http:\\\/\\\/eset.ee\"],\"url\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/author\\\/allankinsigo\\\/\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.eset.ee\\\/et\\\/en\\\/2017\\\/06\\\/28\\\/new-wannacryptor-like-ransomware-attack-hits-globally-all-you-need-to-know\\\/#local-main-organization-logo\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"ESET EESTI\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"New WannaCryptor-like ransomware attack hits globally: all you need to know - ESET Eesti Blogi","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.eset.ee\/et\/en\/2017\/06\/28\/new-wannacryptor-like-ransomware-attack-hits-globally-all-you-need-to-know\/","og_locale":"en_US","og_type":"article","og_title":"New WannaCryptor-like ransomware attack hits globally: all you need to know","og_description":"Update (June 27 \u2013 23.34 CEST): Shutting down the computer and not booting again could prevent the disk encryption, though several files can be already encrypted after the MBR is replaced and further infection through the network is attempted.&nbsp; Update (June 27 \u2013 22.28 CEST): Paying is no longer possible as the email to send","og_url":"https:\/\/blog.eset.ee\/et\/en\/2017\/06\/28\/new-wannacryptor-like-ransomware-attack-hits-globally-all-you-need-to-know\/","og_site_name":"ESET Eesti Blogi","article_publisher":"http:\/\/www.facebook.com\/antiviirus","article_published_time":"2017-06-28T06:05:52+00:00","article_modified_time":"2019-05-29T12:03:47+00:00","og_image":[{"width":623,"height":410,"url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_644523403-623x410-623x410.jpg","type":"image\/jpeg"}],"author":"ESET Blog","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ESET Blog","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/06\/28\/new-wannacryptor-like-ransomware-attack-hits-globally-all-you-need-to-know\/#article","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/06\/28\/new-wannacryptor-like-ransomware-attack-hits-globally-all-you-need-to-know\/"},"author":{"name":"ESET Blog","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"headline":"New WannaCryptor-like ransomware attack hits globally: all you need to know","datePublished":"2017-06-28T06:05:52+00:00","dateModified":"2019-05-29T12:03:47+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/06\/28\/new-wannacryptor-like-ransomware-attack-hits-globally-all-you-need-to-know\/"},"wordCount":793,"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/06\/28\/new-wannacryptor-like-ransomware-attack-hits-globally-all-you-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_644523403-623x410-623x410.jpg","articleSection":["cybercrime","news","privacy","small business","windows"],"inLanguage":"en-US","copyrightYear":"2017","copyrightHolder":{"@id":"https:\/\/blog.eset.ee\/et\/#organization"}},{"@type":"WebPage","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/06\/28\/new-wannacryptor-like-ransomware-attack-hits-globally-all-you-need-to-know\/","url":"https:\/\/blog.eset.ee\/et\/en\/2017\/06\/28\/new-wannacryptor-like-ransomware-attack-hits-globally-all-you-need-to-know\/","name":"New WannaCryptor-like ransomware attack hits globally: all you need to know - ESET Eesti Blogi","isPartOf":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/06\/28\/new-wannacryptor-like-ransomware-attack-hits-globally-all-you-need-to-know\/#primaryimage"},"image":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/06\/28\/new-wannacryptor-like-ransomware-attack-hits-globally-all-you-need-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_644523403-623x410-623x410.jpg","datePublished":"2017-06-28T06:05:52+00:00","dateModified":"2019-05-29T12:03:47+00:00","author":{"@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88"},"breadcrumb":{"@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/06\/28\/new-wannacryptor-like-ransomware-attack-hits-globally-all-you-need-to-know\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.eset.ee\/et\/en\/2017\/06\/28\/new-wannacryptor-like-ransomware-attack-hits-globally-all-you-need-to-know\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/06\/28\/new-wannacryptor-like-ransomware-attack-hits-globally-all-you-need-to-know\/#primaryimage","url":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_644523403-623x410-623x410.jpg","contentUrl":"https:\/\/blog.eset.ee\/wp-content\/uploads\/2019\/04\/shutterstock_644523403-623x410-623x410.jpg","width":623,"height":410},{"@type":"BreadcrumbList","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/06\/28\/new-wannacryptor-like-ransomware-attack-hits-globally-all-you-need-to-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.eset.ee\/et\/en\/"},{"@type":"ListItem","position":2,"name":"New WannaCryptor-like ransomware attack hits globally: all you need to know"}]},{"@type":"WebSite","@id":"https:\/\/blog.eset.ee\/et\/en\/#website","url":"https:\/\/blog.eset.ee\/et\/en\/","name":"ESET Eesti Blogi","description":"Uudised IT maailmast","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.eset.ee\/et\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.eset.ee\/et\/en\/#\/schema\/person\/876cf293277fc0b2ae2f4395fffe4c88","name":"ESET Blog","sameAs":["http:\/\/eset.ee"],"url":"https:\/\/blog.eset.ee\/et\/en\/author\/allankinsigo\/"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.eset.ee\/et\/en\/2017\/06\/28\/new-wannacryptor-like-ransomware-attack-hits-globally-all-you-need-to-know\/#local-main-organization-logo","url":"","contentUrl":"","caption":"ESET EESTI"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/416","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/comments?post=416"}],"version-history":[{"count":0,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/posts\/416\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media\/1818"}],"wp:attachment":[{"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/media?parent=416"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/categories?post=416"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.eset.ee\/et\/en\/wp-json\/wp\/v2\/tags?post=416"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}