{"id":80189,"date":"2018-02-21T09:00:18","date_gmt":"2018-02-21T17:00:18","guid":{"rendered":"https:\/\/cloudblogs.microsoft.com\/microsoftsecure\/?p=80189"},"modified":"2023-08-03T15:00:54","modified_gmt":"2023-08-03T22:00:54","slug":"how-to-mitigate-rapid-cyberattacks-such-as-petya-and-wannacrypt","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2018\/02\/21\/how-to-mitigate-rapid-cyberattacks-such-as-petya-and-wannacrypt\/","title":{"rendered":"How to mitigate rapid cyberattacks such as Petya and WannaCrypt"},"content":{"rendered":"

In the first blog post<\/a> of this 3-part series, we introduced what rapid cyberattacks are and illustrated how rapid cyberattacks are different in terms of execution and outcome. In the second blog post<\/a>, we provided some details on Petya and how it worked. In this final blog post, we will share:<\/p>\n