Story image

NotPetya ransomworm knows no boundaries - A/NZ firms affected

29 Jun 17

Ransomware and ransomworms know no boundaries: That's the lesson coming from the NotPetya attack that, despite starting in Europe, has spread to Australia and New Zealand.

After initial reports suggest the ransomworm was a new strain of Petya, it has now been dubbed NotPetya to distinguish it from the original ransomware. Click here to read experts' opinions on the outbreak.

“As details emerge from this latest outbreak and we hear of more Australian businesses that have been affected, we see again that preventative security measures are continuing to fail at stopping ransomware before it can cripple business networks," comments Datto's A/NZ regional director James Bergl.

New Zealand's Aura Information Security says that geographic location does not make anyone exempt from the threat.

The Australian Cyber Security Centre (ACSC) mentioned yesterday that it has possibly affected Australian businesses.

"We are working to confirm reports of two affected companies in Australia and we are reaching out to offer assistance. We are working with our international counterparts to understand the scope and impact."

Yesterday Cadbury's Hobart factory Australia had to shut down local operations after it reportedly contracted the malware. Reports also suggested that some of Cadbury's New Zealand IT systems were infected but it has not stopped production.

Globally, law firm DLA Piper has been infected, however its New Zealand branch says that client data is safe because the IT system is separate. The only issue is that it is having problems receiving incoming external emails.

"Our clients are our utmost priority and we are working closely with them to ensure we maintain service. There is no evidence to suggest any client data has been affected," the company says in a statement.

Likewise with global shipping provider Maersk; which has a strong presence around major New Zealand ports. A global statement by the firm confirms that it has been affected by the NotPetya ransomworm.

"IT systems are down across multiple sites and select business units. We have contained the issue and are working on a technical recovery plan with key IT-partners and global cyber security agencies," it says.

Comments from security firms are still flooding in, with heavy emphasis that anyone hit by NotPetya must not pay the ransom.

This is because there seemed to be no Command & Control mechanism in the malware that could communicate with the attacker, and the email address for payment had been shut down.

"Six people globally have currently paid the ransom, suggesting this won’t be a financially-successful attack," comments Mimecast's director of security product management, Steven Malone.

Symantec releases neural network-integrated USB scanning station
Symantec Industrial Control System Protection Neural helps defend against USB-borne cyber attacks on operational technology.
SingleSource scores R&D grant to explore digital identity over blockchain
Callaghan Innovation has awarded a $318,000 R&D grant to Auckland-based firm SingleSource, a company that applies risk scoring to digital identity.
Ramping up security with next-gen firewalls
The classic firewall lacked the ability to distinguish between different kinds of web traffic.
Spark Lab launches free cybersecurity tool for SMBs
Spark Lab has launched a new tool that it hopes will help New Zealand’s small businesses understand their cybersecurity risks.
Gartner names LogRhythm leader in SIEM solutions
Security teams increasingly need end-to-end SIEM solutions with native options for host- and network-level monitoring.
Cylance makes APIs available in endpoint detection offering
Extensive APIs enable security teams to more efficiently view, enrich, and contextualise real-time intelligence collected at the endpoint to keep systems secure.
SolarWinds adds SDN monitoring support to network management portfolio
SolarWinds announced a broad refresh to its network management portfolio, as well as key enhancements to the Orion Platform. 
JASK prepares for global rollout of their AI-powered ASOC platform
The JASK ASOC platform automates alert investigations, supposedly freeing the SOC analyst to do what machines can’t.