Contact us today!
561-795-2000 
844-795-2001

FRS Pros Blog

New Ransomware Presents Users With 2 Equally-Terrible Options

New Ransomware Presents Users With 2 Equally-Terrible Options

The Petya ransomware, a particularly vicious monster of a threat, has reared its ugly head once again, only this time, it’s not alone. Petya now comes bundled together with Mischa, yet another ransomware that works well alongside Petya. The ransomware is delivered via an inconspicuous email disguised as a job application, with a resume attached. Once the user downloads the file, Petya encrypts the files located on the device.

The original version of Petya had a signature attack that struck the master boot record, restricting access to it until a ransom was paid through a dark web payment portal. Of course, there was no guarantee that paying up would resolve the problem, so it was entirely possible that the ransomware could add insult to injury and not decrypt the files at all. Thankfully, Petya had a weakness, and professionals were able to exploit it and find a fix for the ransomware.

Not this time, though. Petya comes with Mischa, which is a more traditional ransomware that can be just as dangerous as its counterpart. Mischa blocks access to files until the user pays a ransom. The ransomware will then link to a Tor payment site that allows the user to pay up and decrypt their files. Mischa encrypts executable files, while leaving the Windows and browser folders untouched, which provides access to files containing payment instructions for the user.

Now, here’s the problem with this development. Petya could be prevented by refusing administrator access upon downloading the installer. Now, selecting “yes” will download Petya, while selecting “no” will install Mischa. Either way, you get a slap in the face.

Mischa’s payment site works in largely the same way as Petya’s. Once you input the authorization code provided by the ransomware, you need to purchase enough Bitcoins to pay for the ransom. The current exchange rate is approximately $875 per Bitcoin, so you might be shelling out some heavy-duty cash for this. Once the user has purchased enough Bitcoins, the malware will then provide the Bitcoin address where it must be sent.

Though researchers managed to find a way around Petya, no such workaround has been found for Mischa. This is a recurring theme for ransomware, which is often so difficult to remove, that it forces large enterprises to either restore a backup of their data, or pay the ransom, rather than lose access to their files completely. As with all cases of malware, we urge you to do your research, and contact FRS Pros at 561-795-2000 before caving into hackers’ demands.

As with all threats that work, Petya and Mischa have plenty of copycats out there that attempt to replicate their success. Malwarebytes has identified another two-in-one ransomware called Satana that functions in a similar way, locking the master boot record and the complete file record. In comparison to Petya and Mischa, however, Satana will run both types of ransomware, rather than just install one or the other.

Malwarebytes reports that Satana is still in development and has flaws that can be exploited, but the thought of malware continuing to develop in this sense is a bit unnerving, especially for business owners that may not devote enough time and resources to security solutions. If your business is unsure of whether you can handle a ransomware infection, reach out to us at 561-795-2000.

Tip of the Week: 4 Ways to Avoid Buying a Lemon of...
Sharing Your Netflix Password Now Makes You a Fede...

Mobile? Grab this Article!

QR-Code

Tag Cloud

Tip of the Week Security Technology Best Practices Productivity Network Security Business Computing Privacy Internet User Tips Hackers Software Google Cloud Microsoft Hardware Innovation Efficiency Business Management Data Computer Hosted Solutions Windows 10 Communication Email Tech Term Smartphones Mobile Devices IT Services Cybersecurity Data Backup IT Support Malware Backup Small Business Business Android Smartphone Office 365 Data Recovery Browser Upgrade Disaster Recovery Workplace Tips Outsourced IT Windows VoIP Internet of Things Gadgets Users Communications Cloud Computing Apps Business Continuity Data Security Collaboration Phishing Managed IT Services Automation Cybercrime Information Saving Money Network Ransomware Facebook Managed Service Mobile Device Management Microsoft Office Operating System Miscellaneous Health Employer-Employee Relationship Blockchain Two-factor Authentication Vulnerability Money Artificial Intelligence OneNote Alert Server Passwords Law Enforcement Social Media Managed IT Best Practice Quick Tips Applications Wireless Spam Chrome Mobile Office Holiday Virtualization Networking Managed IT Services IT Support Bandwidth Data Breach Unsupported Software Augmented Reality Password BYOD Router Access Control App Google Drive Settings Hacking Printing Gmail Bring Your Own Device Windows 10 Save Money Computers Data Storage Retail Mobile Device Information Technology Word Conferencing Windows 7 Telephone Systems Project Management Patch Management Managed Service Provider Tech Support Human Resources BDR Telephony Cost Management IT Management History Payment Cards Marketing Travel Commerce WannaCry File Sharing Application Paperless Office Hosted Solution Excel Search Fraud Encryption Avoiding Downtime Mobility Safety Mobile Security Evernote SaaS Vendor Proactive IT Google Assistant User Error Going Green Social Hybrid Cloud Touchscreen Risk Management WiFi Remote Workers Cortana Budget Voice over Internet Protocol Government Data Loss Wireless Technology Robot Data Management Wi-Fi Update Business Technology Audit Politics Meetings The Internet of Things Google Docs Shortcut Productivity Software as a Service Data Protection Wireless Charging VPN iPhone Devices Sports Hard Drive Display ROI Reputation Internet Service Provider Licensing Updates Memory Upgrades Managed Services Provider Comparison Scam Chromecast Testing Computer Fan Computer Forensics Peripheral Data storage Threats Microsoft Excel IT budget Education YouTube Hard Disk Drive PC CRM Outlook Co-Managed Services Remote Computing Digital Signage Google Maps Spyware Alexa for Business Inventory Credit Cards App store Samsung Internet Exlporer Chromebook Windows Server 2008 R2 Microsoft Word Financial Payroll Facebook Privacy Specifications Virus Camera Legal Uninterrupted Power Supply Management Scams Employees IT Solutions AI Telephone Firewall Apple Employee Webinar Antivirus Transportation Tablets Maintenance Security Cameras Consultant Laptop eCommerce Sales Proactive Projects Sync PowerPoint Admin Remote Monitoring Virtual Private Network Storage Social Engineering Battery OneDrive Smartwatch Private Cloud HIPAA DDoS Hyperlink Processor Edge Instant Messaging Hacker Files Break/Fix IT solutions Hosted Desktop FAQ Development NFL eWaste Emergency Disaster Machine Learning Touchpad Fiber Optics Websites Recovery Identity Printers Wireless Internet Saving Time Identities Point of Sale Employee-Employer Relationship iOS WIndows Server 2008 Server Maintenance Remote Work Entertainment Value Wasting Time Benchmarks Ciminal Keyboard Medical IT Windows 10s HBO Smart Devices Charger Computer Care Nanotechnology Micrsosoft Device Security Amazon Downtime Screen Mirroring Humor Holidays Data Theft Identity Theft Data Privacy Administrator Net Neutrality Adobe Workers Lithium-ion battery Gamification Keyboard Shortcuts Unified Threat Management Managed IT Service Legislation Language Office Streaming Media Investment Accessory Myths 5G Solid State Drive Sabotage Troubleshooting Personal Information Root Cause Analysis Business Intelligence Windows Ink Virtual Assistant E-Commerce Emails Cast Copiers Gifts Computing Vendor Management Access How To Books PDF Video Games Experience Congratulations Hiring/Firing Mobile Computing Virtual Reality Work/Life Balance Covid-19 Current Events Electronic Medical Records Text Messaging Crowdsourcing Employer Employee Relationship es Phone System Cache Benefits Save Time Communitications Office tips Computer Accessories Training Monitors Flexibility Music Advertising Smart Technology Television CrashOverride Compliance Company Culture Scalability Analytics End of Support Regulation HaaS Relocation Black Market Cleaning Big Data Automobile Thank You Twitter Managing Stress USB Worker