Last active
June 17, 2022 11:18
-
-
Save roycewilliams/a723aaf8a6ac3ba4f817847610935cfb to your computer and use it in GitHub Desktop.
Revisions
-
roycewilliams revised this gist
Oct 27, 2017 . 1 changed file with 5 additions and 2 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -234,9 +234,12 @@ Coverage and news The Hacker News: https://thehackernews.com/2017/10/bad-rabbit-ransomware-attack.html FireEye: https://www.fireeye.com/blog/threat-research/2017/10/backswing-pulling-a-badrabbit-out-of-a-hat.html Cylance: https://www.cylance.com/en_us/blog/threat-spotlight-bad-rabbit-ransomware.html PC Magazine: https://www.pcmag.com/news/356977/badrabbit-ransomware-targets-systems-in-russia-ukraine -
roycewilliams revised this gist
Oct 27, 2017 . 1 changed file with 3 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -262,5 +262,8 @@ Coverage and news Intezer (code reuse analysis): http://www.intezer.com/notpetya-returns-bad-rabbit/ cert.ro (larger list of sites): https://cert.ro/citeste/bad-rabbit-o-noua-campanie-ransomware Hackplayers (Spanish - in fact, it looks like they translated an earlier version of my document!) http://www.hackplayers.com/2017/10/badrabbit-que-es-lo-que-hay-que-saber-de-momento.html -
roycewilliams revised this gist
Oct 27, 2017 . 1 changed file with 1 addition and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -6,7 +6,7 @@ Requires user interaction. Mostly targeting Russia and Ukraine so far, with a few others (Germany, Turkey, Bulgaria, Montenegro ...) Not globally self-propagating, but could be inflicted on selected targets on purpose. May be part of same group targeting Ukraine generally (BACKSWING) (per FireEye) Confirmed to use ETERNALROMANCE exploit, and same source code and build chain as NotPetya (per Talos) Mitigations are similar to Petya/NotPetya resistance. An inoculation is also available (see below). Supporting infrastructure shut down a few hours after starting (per Beaumont, Motherboard) Very cool diagram of infection flow at Endgame by @malwareunicorn: -
roycewilliams revised this gist
Oct 27, 2017 . 1 changed file with 1 addition and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -6,6 +6,7 @@ Requires user interaction. Mostly targeting Russia and Ukraine so far, with a few others (Germany, Turkey, Bulgaria, Montenegro ...) Not globally self-propagating, but could be inflicted on selected targets on purpose. May be part of same group targeting Ukraine generally (BACKSWING) (per FireEye) Confirmed to use ETERNALROMANCE exploit (per Talos) Mitigations are similar to Petya/NotPetya resistance. An inoculation is also available (see below). Supporting infrastructure shut down a few hours after starting (per Beaumont, Motherboard) Very cool diagram of infection flow at Endgame by @malwareunicorn: -
roycewilliams revised this gist
Oct 27, 2017 . 1 changed file with 1 addition and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -5,6 +5,7 @@ BadRabbit is locally-self-propagating ransomware (ransom: 0.05 BTC), spreading v Requires user interaction. Mostly targeting Russia and Ukraine so far, with a few others (Germany, Turkey, Bulgaria, Montenegro ...) Not globally self-propagating, but could be inflicted on selected targets on purpose. May be part of same group targeting Ukraine generally (BACKSWING) (per FireEye) Mitigations are similar to Petya/NotPetya resistance. An inoculation is also available (see below). Supporting infrastructure shut down a few hours after starting (per Beaumont, Motherboard) Very cool diagram of infection flow at Endgame by @malwareunicorn: -
roycewilliams revised this gist
Oct 27, 2017 . 1 changed file with 3 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -231,6 +231,9 @@ Coverage and news The Hacker News: https://thehackernews.com/2017/10/bad-rabbit-ransomware-attack.html FireEye https://www.fireeye.com/blog/threat-research/2017/10/backswing-pulling-a-badrabbit-out-of-a-hat.html PC Magazine: https://www.pcmag.com/news/356977/badrabbit-ransomware-targets-systems-in-russia-ukraine -
roycewilliams revised this gist
Oct 26, 2017 . 1 changed file with 4 additions and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -101,7 +101,10 @@ Components and methods: 13% code reuse of notpeyta https://analyze.intezer.com/#/analyses/d41e8a98-a106-4b4f-9b7c-fd9e2c80ca7d Good analysis from @bartblaze of similarities between NotPetya and BadRabbit: https://bartblaze.blogspot.com/2017/10/comparing-eternalpetya-and-badrabbit.html May be a variant of Diskcoder, per ESET LIVE SAMPLE (see tweet for password, use at your own risk): -
roycewilliams revised this gist
Oct 26, 2017 . 1 changed file with 2 additions and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -250,7 +250,8 @@ Coverage and news Qualys: https://threatprotect.qualys.com/2017/10/24/bad-rabbit-ransomware/ https://blog.qualys.com/news/2017/10/24/bad-rabbit-ransomware Intezer (code reuse analysis): http://www.intezer.com/notpetya-returns-bad-rabbit/ Hackplayers (Spanish - in fact, it looks like they translated an earlier version of my document!) -
roycewilliams revised this gist
Oct 26, 2017 . 1 changed file with 2 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -250,6 +250,8 @@ Coverage and news Qualys: https://threatprotect.qualys.com/2017/10/24/bad-rabbit-ransomware/ https://blog.qualys.com/news/2017/10/24/bad-rabbit-ransomware Intezer: http://www.intezer.com/notpetya-returns-bad-rabbit/ Hackplayers (Spanish - in fact, it looks like they translated an earlier version of my document!) http://www.hackplayers.com/2017/10/badrabbit-que-es-lo-que-hay-que-saber-de-momento.html -
roycewilliams revised this gist
Oct 26, 2017 . 1 changed file with 2 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -24,6 +24,8 @@ Targets/victims Mostly affecting .ru/.ua so far. Media outlets, transportation, gov may have been early targets. Watering holes in Germany, Turkey, Bulgaria, Montenegro. Avast says also Poland and South Korea? Good summray thread of country coverage from @Steve3D and contributors (no US *infections* known) https://twitter.com/SteveD3/status/923186304963284992 Avast says some US have been detected (as @Steve3D notes, detected != infected) McAfee says no US detected yet https://twitter.com/avast_antivirus/status/922941896439291904 -
roycewilliams revised this gist
Oct 26, 2017 . 1 changed file with 2 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -32,6 +32,8 @@ Targets/victims https://twitter.com/Bing_Chris/status/923204408539844609 Map (indirectly sourced from Avast PR?) https://twitter.com/Bing_Chris/status/922932810725326848 Better source, later in the timeline: https://blog.avast.com/its-rabbit-season-badrabbit-ransomware-infects-airports-and-subways List of targeted file extensions: Image Tweet: https://twitter.com/craiu/status/922877184494260227 -
roycewilliams revised this gist
Oct 25, 2017 . 1 changed file with 4 additions and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -189,7 +189,10 @@ Coverage and news Kaspersky: https://www.kaspersky.com/blog/bad-rabbit-ransomware/19887/ https://securelist.com/bad-rabbit-ransomware/82851 Avast: https://blog.avast.com/its-rabbit-season-badrabbit-ransomware-infects-airports-and-subways McAfee: https://securingtomorrow.mcafee.com/mcafee-labs/badrabbit-ransomware-burrows-russia-ukraine/ -
roycewilliams revised this gist
Oct 25, 2017 . 1 changed file with 2 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -28,6 +28,8 @@ Targets/victims McAfee says no US detected yet https://twitter.com/avast_antivirus/status/922941896439291904 https://twitter.com/SteveD3/status/922964771967848449 Check Point says some US detections https://twitter.com/Bing_Chris/status/923204408539844609 Map (indirectly sourced from Avast PR?) https://twitter.com/Bing_Chris/status/922932810725326848 -
roycewilliams revised this gist
Oct 25, 2017 . 1 changed file with 2 additions and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -24,7 +24,8 @@ Targets/victims Mostly affecting .ru/.ua so far. Media outlets, transportation, gov may have been early targets. Watering holes in Germany, Turkey, Bulgaria, Montenegro. Avast says also Poland and South Korea? Avast says some US have been detected (as @Steve3D notes, detected != infected) McAfee says no US detected yet https://twitter.com/avast_antivirus/status/922941896439291904 https://twitter.com/SteveD3/status/922964771967848449 Map (indirectly sourced from Avast PR?) -
roycewilliams revised this gist
Oct 25, 2017 . 1 changed file with 3 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -231,6 +231,9 @@ Coverage and news Malwarebytes (@hasherezade): https://blog.malwarebytes.com/threat-analysis/2017/10/badrabbit-closer-look-new-version-petyanotpetya/ RiskIQ: https://www.riskiq.com/blog/labs/badrabbit/ Endgame analysis (@malwareunicorn): https://www.endgame.com/blog/technical-blog/badrabbit-technical-analysis -
roycewilliams revised this gist
Oct 25, 2017 . No changes.There are no files selected for viewing
-
roycewilliams revised this gist
Oct 25, 2017 . 1 changed file with 3 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -70,6 +70,9 @@ Components and methods: Apparently clears Windows logs and the filesystem journal, per ESET and Carbon Black Uses wevtutil cmdline Appears to be McAfee-aware: https://twitter.com/ValthekOn/status/923143946796183552 May incorporate copy-and-pasted Microsoft cert/signing? https://twitter.com/gN3mes1s/status/922907460842721281 -
roycewilliams revised this gist
Oct 25, 2017 . 1 changed file with 2 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -110,6 +110,8 @@ Components and methods: Detection: Yara rule (from a McAfee lead engineer) https://pastebin.com/Y7pJv3tK Another Yara, including Mimikatz: https://github.com/Neo23x0/signature-base/blob/master/yara/crime_badrabbit.yar IOCs (via ESET) -
roycewilliams revised this gist
Oct 25, 2017 . 1 changed file with 2 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -42,6 +42,8 @@ Components and methods: May be using EternalBlue (or at least triggers controls that are watching for its use?), Unit 42 sees no sign of this Incorporates stripped-down Mimikatz to discover credentials for propagation. https://twitter.com/gentilkiwi/status/922945304172875778 Named "rabbitlib.dll" https://twitter.com/cherepanov74/status/923207933332283392 Overwrites MBR to deliver ransom message. Ransom message directs users to Tor-based (.onion) site Gives a "please turn off antivirus" user message in some circumstances. -
roycewilliams revised this gist
Oct 25, 2017 . 1 changed file with 3 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -149,6 +149,9 @@ Money trail https://blockchain.info/address/1GxXGMoz7HAVwRDZd7ezkKipY4DHLUqzmM https://blockchain.info/address/17GhezAiRhgB8DGArZXBkrZBFTGCC9SQ2Z Only a few transactions (@ChristiaanBeek): https://twitter.com/ChristiaanBeek/status/923264222699585536 Coverage and news ESET (very good tech coverage): -
roycewilliams revised this gist
Oct 25, 2017 . 1 changed file with 2 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -7,6 +7,8 @@ Mostly targeting Russia and Ukraine so far, with a few others (Germany, Turkey, Not globally self-propagating, but could be inflicted on selected targets on purpose. Mitigations are similar to Petya/NotPetya resistance. An inoculation is also available (see below). Supporting infrastructure shut down a few hours after starting (per Beaumont, Motherboard) Very cool diagram of infection flow at Endgame by @malwareunicorn: https://www.endgame.com/blog/technical-blog/badrabbit-technical-analysis Initial infection: -
roycewilliams revised this gist
Oct 25, 2017 . 1 changed file with 5 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -133,6 +133,11 @@ Defense Vaccination: https://twitter.com/0xAmit/status/922911491694694401 ** Create the following files c:\windows\infpub.dat && c:\windows\cscc.dat ** remove ALL PERMISSIONS (inheritance) and you are now vaccinated. :) Carbon Black: * Patch for MS17-010 * Use GPO to disable access to admin shares. https://social.technet.microsoft.com/Forums/windows/en-US/251f0f40-ffbf-4441-ba35-3dd1acd7a445/how-can-we-disable-the-automatic-administrative-share-by-group-policy Other ideas: * Disable WMI where feasible -
roycewilliams revised this gist
Oct 25, 2017 . 1 changed file with 6 additions and 2 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -64,7 +64,8 @@ Components and methods: Video of action: https://twitter.com/GossiTheDog/status/922858264534142976 Apparently clears Windows logs and the filesystem journal, per ESET and Carbon Black Uses wevtutil cmdline May incorporate copy-and-pasted Microsoft cert/signing? https://twitter.com/gN3mes1s/status/922907460842721281 @@ -210,9 +211,12 @@ Coverage and news MIT Technology Review: https://www.technologyreview.com/the-download/609206/a-new-strain-of-ransomware-is-hitting-eastern-europe/ Malwarebytes (@hasherezade): https://blog.malwarebytes.com/threat-analysis/2017/10/badrabbit-closer-look-new-version-petyanotpetya/ Endgame analysis (@malwareunicorn): https://www.endgame.com/blog/technical-blog/badrabbit-technical-analysis Qualys: https://threatprotect.qualys.com/2017/10/24/bad-rabbit-ransomware/ https://blog.qualys.com/news/2017/10/24/bad-rabbit-ransomware -
roycewilliams revised this gist
Oct 25, 2017 . 1 changed file with 4 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -10,6 +10,7 @@ Supporting infrastructure shut down a few hours after starting (per Beaumont, Mo Initial infection: Watering-hole attack, sourced from compromised media/news sites in selected regions. Poses as fake Flash update. https://twitter.com/jiriatvirlab/status/922835700873158661/photo/1 https://twitter.com/darienhuss/status/922847966767042561 @@ -181,6 +182,9 @@ Coverage and news Motherboard articles: https://motherboard.vice.com/en_us/article/59yb4q/bad-rabbit-petya-ransomware-russia-ukraine https://motherboard.vice.com/en_us/article/d3dp5q/infrastructure-for-the-bad-rabbit-ransomware-appears-to-have-shut-down Symantec: https://www.symantec.com/connect/blogs/badrabbit-new-strain-ransomware-hits-russia-and-ukraine BleepingComputer article: https://www.bleepingcomputer.com/news/security/bad-rabbit-ransomware-outbreak-hits-eastern-europe/ -
roycewilliams revised this gist
Oct 25, 2017 . 1 changed file with 3 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -94,6 +94,9 @@ Components and methods: Still contains link to external debugging symbols file (.pdb) [can this be manipulated?] (@malwareunicorn): https://twitter.com/malwareunicorn/status/923009391770533888 Shut down a few hours after starting: https://twitter.com/GossiTheDog/status/923300443962335232 Pop-culture references contained: Game of Thrones dragons (Drogon, Rhaegal) Hackers movie (bottom of list of hard-coded passwords) -
roycewilliams revised this gist
Oct 25, 2017 . 1 changed file with 4 additions and 2 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -6,6 +6,7 @@ Requires user interaction. Mostly targeting Russia and Ukraine so far, with a few others (Germany, Turkey, Bulgaria, Montenegro ...) Not globally self-propagating, but could be inflicted on selected targets on purpose. Mitigations are similar to Petya/NotPetya resistance. An inoculation is also available (see below). Supporting infrastructure shut down a few hours after starting (per Beaumont, Motherboard) Initial infection: @@ -174,9 +175,10 @@ Coverage and news Carbon Black: https://www.carbonblack.com/2017/10/24/threat-advisory-analysis-bad-rabbit-ransomware/ Motherboard articles: https://motherboard.vice.com/en_us/article/59yb4q/bad-rabbit-petya-ransomware-russia-ukraine https://motherboard.vice.com/en_us/article/d3dp5q/infrastructure-for-the-bad-rabbit-ransomware-appears-to-have-shut-down BleepingComputer article: https://www.bleepingcomputer.com/news/security/bad-rabbit-ransomware-outbreak-hits-eastern-europe/ -
roycewilliams revised this gist
Oct 25, 2017 . 1 changed file with 1 addition and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -33,6 +33,7 @@ List of targeted file extensions: Components and methods: Using legit signed DiskCryptor binary to encrypt. Encrypts using AES-128-CBC (per Kaspersky article) Creates scheduled task to reboot the target system. May be using EternalBlue (or at least triggers controls that are watching for its use?), Unit 42 sees no sign of this Incorporates stripped-down Mimikatz to discover credentials for propagation. -
roycewilliams revised this gist
Oct 25, 2017 . No changes.There are no files selected for viewing
-
roycewilliams revised this gist
Oct 25, 2017 . 1 changed file with 3 additions and 0 deletions.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -170,6 +170,9 @@ Coverage and news Cisco/Talos: http://blog.talosintelligence.com/2017/10/bad-rabbit.html Carbon Black: https://www.carbonblack.com/2017/10/24/threat-advisory-analysis-bad-rabbit-ransomware/ Motherboard article: https://motherboard.vice.com/en_us/article/59yb4q/bad-rabbit-petya-ransomware-russia-ukraine -
roycewilliams revised this gist
Oct 25, 2017 . 1 changed file with 1 addition and 1 deletion.There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters. Learn more about bidirectional Unicode charactersOriginal file line number Diff line number Diff line change @@ -78,7 +78,7 @@ Components and methods: https://twitter.com/mrjohnkelly73/status/922899328636735488 https://twitter.com/craiu/status/922911496497238021 Unlike NotPetya, confirmed to be decrypt-ready: https://twitter.com/antonivanovm/status/922944062935707648 (Kaspersky) 13% code reuse of notpeyta
NewerOlder