{"id":80063,"date":"2018-02-05T09:00:26","date_gmt":"2018-02-05T17:00:26","guid":{"rendered":"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/?p=80063"},"modified":"2023-08-03T14:43:26","modified_gmt":"2023-08-03T21:43:26","slug":"overview-of-petya-a-rapid-cyberattack","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/02\/05\/overview-of-petya-a-rapid-cyberattack\/","title":{"rendered":"Overview of Petya, a rapid cyberattack"},"content":{"rendered":"

In the first blog post<\/a> of this 3-part series, we introduced what rapid cyberattacks are and illustrated how they are different in terms of execution and outcome. Next, we will go into some more details on the Petya (aka NotPetya) attack.<\/p>\n

How Petya worked<\/h2>\n

The Petya attack chain is well understood, although a few small mysteries remain. Here are the four steps in the Petya kill chain:<\/p>\n

\"\"<\/p>\n

Figure 1:\u00a0How the Petya attack worked<\/em><\/p>\n

    \n
  1. Prepare<\/strong> – The Petya attack began with a compromise of the MEDoc application. As organizations updated the application, the Petya code was initiated.<\/li>\n
  2. Enter<\/strong> – When MEDoc customers installed the software update, the Petya code ran on an enterprise host and began to propagate in the enterprise.<\/li>\n
  3. Traverse<\/strong> – The malware used two means to traverse:\n