malware

Petya or NotPetya, That is the Question

On the 27th June 2017 a wide scale cyber attack Occurred. Encrypting devices throughout 80 companies to a point beyond repair, the White House estimated the attack resulted in $10 billion worth of damages worldwide. 80% of computers infected belonged to Ukrainian organisations, their partnering companies or organisations with offices networked there.The malware spread through M.E.Doc, accounting software used heavily across Ukraine. Cyber experts noted that although being more severe and widespread, the attacks shared code with previously identified piece of malware Petya, prompting them to name this new piece “NotPetya”

Wannacry - 5 Years Later

On the 12th of May 2017 a global malware attack was identified. Targeting Windows computers all over the world, it would encrypt a user’s data and demand a ransom payment in Bitcoin. Wannacry, as the malware became known, was one of the worst recorded cyber attacks on record. Within a day the ransomware was reported to have infected over 230 thousand computers in over 150 countries…

Predatory Sparrow Hacker Group claim Iranian Steel Cyber Attack

On the 27th of June 2022, three state owned industrial steel companies’ (Khuzenstan, Moborakeh and Hormozgan) mills were the targets of a cyber attack, the worst hit mill having production brought to a complete halt. Khuzenstan claimed that security measures, alongside a rapid and vigilant response, meant the damage dealt to the production line was minimal.

The Evolution of Malware

In the beginning, people created computers. A few years later, people decided to create malware. Firstly, we need to clarify what malware, virus, worms and trojans are. Malware is a catch-all phrase for all malicious software regardless of how it operates; viruses, worms and trojans fall under the malware term. Viruses spread through computers, firstly through physical input devices and now through the Internet. It usually exists in executable files, meaning it can be on your computer without causing any negative effects until it is run. A worm is a type of virus that can spread without help from a person, for example travelling through an open port in your computer to other computers on your network. Finally, a trojan is a program that allows the creator access to your computer by pretending to be a genuine application (think about the trojan horse).