
The shipping conglomerate Maersk, hit by the NotPetya ransomware in June 2017, estimated that it cost them as much as $300 million in lost revenue.
Gavin Ashton was an IT security guy working at Maersk at the time of the attack. He’s now written an in-depth article about what happened.
I want to help protect other folks from making these same mistakes, because there’s a lot of what seems to be defeatist wisdom out there; Yes, it is inevitable that you will be attacked. It is inevitable that one day, one will get through. And obviously, you should have a solid contingency plan in place in case of the worst. But that’s not to say you don’t attempt to put up a damn good fight to stop these attacks in the first case. Just because you know the bad actors are coming, doesn’t mean you leave your front door open and make them a cup of tea when they walk in. You could just lock the door.
Staying with the home analogy; Yes, there’s security cameras and wizard cloud-connected ‘Internet of Things’ (IoT) devices and all kinds of expensive measures and widgets, but a lot of organisations fail simply on the basics. Lock the damn door.
It’s a good read, and strongly recommended if you’re responsible for securing your enterprise from malware attack.
And make sure to check out this “Smashing Security” podcast we recorded back in June 2017, at the time of the outbreak:
Show full transcript ▼
This transcript was generated automatically, probably contains mistakes, and has not been manually verified.
Identifying, prioritizing, and managing vulnerabilities all the way through to remediation is not only possible, it can be simple right now.
Build a vulnerability management program that works for you with InsightVM by Rapid7. Get started with your free 30-day trial at www.rapid7.com.
Smashing Security, Episode 31: Phisher Don't Know the Name of This Ransomware with Carole Theriault and Graham Cluley.
Hello, hello, and welcome to another episode of Smashing Security, Episode 31 for the 29th of June, 2017.
My name is Graham Cluley, and I'm joined as always by my co-host and good buddy Carole Theriault. Hello, Carole. How are you?
Hello, David. Welcome to the show.
What we do is we each choose a topic from the news, last week's news of computer security and privacy, and we have a little bit of a chat about it.
And as tradition dictates, I get to go first.
Something we've all got to talk about, of course, is this week has seen a massive new ransomware outbreak hitting companies around the world, primarily in Ukraine, but also in other countries as well, called Petya, or is it called not Petya?
It seems that computer security companies can't quite agree whether this is a variant of the Petya ransomware that we've seen before or something which is mimicking it in some fashion.
Maybe actually, that doesn't matter that much. Maybe sometimes we choose both.
As long as I've been in the industry, which is years, we've always had arguments about, you know, all the names and the different, you know, the names for these things.
And it happens because all the companies are working simultaneously on trying to develop and look at it and research it and then talk about it.
And they all come up with different names. And, you know, it's frustrating because you have to know what you're talking about in order to talk about it.
And I thought Martijn Grooten, the editor of Virus Bulletin, summed this up rather well in a tweet.
He was basically saying, look, if he found an injured man who'd fallen out of a tree, if it was the InfoSec community, they'd spend half of their time saying, "Oh, you were really dumb to climb that tree." And the other half would be saying, "Oh, what kind of tree actually is it that he climbed," rather than dealing with the person who's seriously injured.
I think giving the advice on how to protect yourself was more important maybe than exactly what strain of ransomware it was.
We saw this 5 years ago.
It only just came out on Tuesday and yet everyone is, that's the thing is, I think focusing too much on that on day one is perhaps a little bit over the top and not the most important thing.
Let me tell you what I think is the most important thing about this ransomware. So in many ways it was a bit like WannaCry.
And you remember WannaCry, of course, a month or two ago, it was hitting organizations, particularly the British National Health Service, very hard and it exploited a Windows exploit which had been developed by the National Security Agency, the NSA, and they called it EternalBlue.
Now that same exploit was used in part by this new ransomware, which I'll call Petya for the purposes of simplicity.
So it was using that to spread, although it wasn't using it as vigorously and aggressively maybe as WannaCry was. And so we haven't seen quite as many infections.
And of course it was encrypting your files. If you booted up your computer, you would think your hard disk was being repaired because it was mimicking the old DOS command, chkdsk.
If you saw that message, by the way, turn off your PC immediately as it would stop the encryption. But it was also trying to gain admin access to infected computers.
It was scouring your memory for domain admin credentials.
It looks like, I mean, there certainly was a really big initial hit. Ukraine got hit particularly hard. They seem to be the initial ones hit.
Energy companies, Kiev airport, even the Deputy Prime Minister, Pavlo Rozenko, here I go again.
Pavlo Rozenko was tweeting pictures of his PC mid-encryption and he was saying, "Ta-da!" He was saying in his sort of Cyrillic accent.
So he was fairly laid back about it, which I thought was great because meanwhile Chernobyl nuclear power plant was being hit and the site's automatic radiation monitoring systems would be knocked out by the ransomware attack.
So there you go. Don't panic, folks. Nothing to worry about here. Nothing to see. It wasn't just Ukraine which was hit though.
There were other companies around the world, multinationals, the marketing goliath WPP, who's a parent company of a lot of— yeah, we know them, don't we?
A lot of marketing companies work for them. Shipping giant Maersk and Russia's top oil producer, Rosneft, all of which got hit.
And a lot of fingers have been pointed towards Russia as being doing that kind of thing. Some have suggested that there is a piece of software called MeDoc.
It's a Ukrainian accounting software program. It may even be mandatory in Ukraine, I'm not sure. And there are allegations that it pushed out a very dodgy update containing malware.
And what a fantastic way, if that was true, and I don't know.
We certainly know MeDoc did have problems with the malware, but I don't know yet if it's been confirmed whether they pushed out the malware or not.
But Malwarebytes came out and said, no, it initially happened on the 27th yesterday.
And I guess that could explain if it was MeDoc, it could explain why there would be so much fewer targets because then you would figure that it would be foreign investors and companies that are linked to Ukraine's government that uses this software.
There's only been a reported 2,000 victims so far. So if it's tied to that software, it would make sense that it'd be smaller in scale.
And that could have jumped it to other countries. Hence, we saw attacks in the UK, in Australia, in Spain, and so forth.
Does it spread via network once it's infected a particular machine?
So yeah, but this initial infection is the thing which is the mystery. And some people were speculating maybe it was via email attachment.
So people were posting, "Be careful about clicking on—" But there's nothing really that being found on any scale yet.
That's interesting, 'cause that would be an effective way of infecting a lot of computers, seeding malware very quickly if you were able to. To infiltrate something like that.
Or do you think it was actually— you don't know yet, but I'm asking you to guess. This is what pundits do, isn't it?
We don't know what the security was like at that company, or even if that company yet— I don't know if they were the ones to actually push out a dodgy update or not.
The good news is that there is a way of protecting your computers other than obviously an antivirus update and patching and so forth.
And that is you can create a file called PERFC with no extension. The guys at Cybereason, they blogged about this.
If you put that in your Windows folder, the ransomware, when it tries to start encrypting your files, it looks for that file, and if it's there, it won't encrypt your file.
So it's a good way of inoculating a single PC, but of course it won't stop the malware from spreading to other computers as well.
So the big question is, are the criminals making any money out of this? And the answer seems to be, well, David, I think you looked into this a bit.
That doesn't look like they're going to have very much success, are they?
From that attack, they, I believe, sent victims to one of four bitcoin addresses as far as payment.
So they weren't able to track incoming payments as well as they should have if they wanted to make money.
So that basically then victims, when they paid the WannaCry attackers, the attackers never knew then who had paid. So it was just a mess in that sense.
Now, with Petya, it's a little bit different in that it seems like there's a manual payment validation where you have to send a proof of payment email to the attacker saying that, okay, yeah, I paid.
Here is, I guess, a screenshot or something.
So obviously, I mean, that makes it hard because then potentially you'd be getting hundreds, thousands of emails and that takes time.
But there's also this thing that happened where an email provider discovered that the address that was receiving basically proof of validation of payment, that email provider discovered that they were hosting that email for the attackers.
So they pulled the plug. Right. And that means that anyone who sends them proof of payment can no longer receive the decryption key.
So at this point, then it's basically, victims are out of luck if they were hoping to pay the attackers and if they didn't have any other backup mechanisms in place.
Let's hope that they did.
I think it's quite interesting that they did that because I certainly hope that they worked with law enforcement before shutting down that email address because obviously it could be inconvenient to victims who may want to try and pay.
I mean, whether you think it's right or not, it's a bit of a nuisance to them, isn't it? Because now that option has disappeared from them entirely.
But potentially there might also have been opportunities for the authorities to monitor that email address and maybe gather more information about who might have been behind it.
So, you know, you were complaining earlier that we don't have the naming and people worrying about all that.
It's because it's brand new and people are running around like headless chickens just to try and find out what this thing's doing, who's infected, how do we stop it?
And I can imagine that sounds like a very good idea. Stop the emails, right? Right at the beginning, shut it down. Shut down the email address would be a really good first idea.
But as we were hearing, it could be very difficult.
And would you, you know, maybe companies need to think about getting a policy together, you know, a security policy if this happens.
Well, in fairness to them, I think many of these email providers do have terms and conditions where they say, if you use our service for any criminal activity, we will shut down your account.
Yeah, so it's almost like an automatic process.
So I don't know whether they worked with the authorities before shutting it down or not, but maybe it would actually have been handy to keep it up.
I always notice how some of these hacking gangs have Twitter groups, for instance, which seem to survive quite often for a long time without Twitter shutting them down.
And I've always been curious as to whether that's actually at the behest of law enforcement who may be trying to gather information about those groups and observing if anyone ever logs in without taking necessary anonymization efforts beforehand.
And after that, you need to back up.
And have you seen it now offers you kind of automated, an option of automated responses if you're busy?
So Graham, you emailed me yesterday about the podcast, and I could just click buttons saying, "Thanks for the update." Right? And you know— suitably generic.
But somehow this automated system kind of reverts that, you know, you won't be able to see so much, right?
You're just going to get these automated responses that, you know, you won't be able to read through. And I think that could work to the criminal's advantages.
They're becoming more of a reality. Lots of different companies are developing this technology, testing it.
But this one initiative in Australia has some national quirks that it needs to work out just because of the nature of Australia and what its transportation system has to deal with.
So I guess they're working right now on trying to program the vehicles to recognize unsealed roads and unmarked highways.
And I guess I didn't know that this was a thing in Australia, but they have these huge trucks, if you will, called road trains.
Where it's these barreling 3 or more trailers, and they're 53 meters long. And these things are huge. I've never seen them in person.
But the interesting thing is that there's also a problem of local fauna. As it turns out, these cars are having a very difficult time accurately detecting kangaroos.
So what happens— I know it's weird. So what happens is that these cars use the ground as a reference point to detect distance.
Okay, so when the kangaroo's on the ground, it's fine. It can say, okay, well, that kangaroo is whatever, 50 yards away.
But when it's in mid-flight, I guess it looks further away than it actually is. But when it lands, it's closer. So that, I guess the distance is constantly changing with a kangaroo.
So there's the risk that you can't detect it accurately, and that it'll hit the kangaroo and then put the driver in jeopardy.
If a kid is jumping rope, would it produce the same effect? Or on a hoverboard?
Yeah, and you figure that— I mean, I know that a couple of different companies are developing flying cars and they're saying that there is going to be maybe in the air by 2020.
We'll see if that happens. Pogo sticks? Pogo sticks. Yeah, space hoppers.
As we get more and more into the air with our vehicles, then what can— can these flying cars, as they're calling them, drones, be pilotless drones?
Could those be— I don't know, it's an interesting dilemma that seems it could apply to other initiatives besides Australia's. It's how are they going to deal with this problem?
Are they putting sort of fake kangaroos on pieces, on rubber bands, and dangling them in front of cars to sort of mimic?
'Cause you don't want to make it, you don't want to have an accident, right? You don't want to crash into a real kangaroo.
I'll give that away as a possible experiment they can use.
So even with drivers behind the wheel, kangaroos are still a traffic hazard. So it seems more of a kangaroo problem than a driverless car problem.
I mean, they have to figure out what can we do about kangaroos?
You want to have a kangaroo cull.
Maybe Australia could start to incorporate that kind of infrastructure so that there'll be less collisions.
I don't know if that's feasible because it seems like this is all over the country, so that would be a huge project to undertake.
But it seems like they have to do something about kangaroos and then they can worry about the driverless cars.
So if you are one of these poor Australian listeners who's afflicted by kangaroos hopping around and you're worried about your driverless cars, why not tweet us or send us a message and tell us what you think should be the solution to this problem?
Because it sounds like a serious topic for concern. So Carole, finally, we're over to you now. What have you got for us this week?
So for $229, you can get all the things you love with Echo, but now they've added a 7-inch video screen that's always on.
So welcome to your always listening, endlessly personalized world, and to hell with the teeny tiny scraps of privacy you still enjoy.
So people like Echo because it does things like create shopping lists, or it sets kitchen timers, or it can play music, turn on the lights.
And now with the screen, you can now watch movies, or how-to videos from YouTube, or get a recipe and follow it.
Because I guess before, if people did recipes on Echo, you'd have to read it out to you and go, wait a minute, what was that again? Can you repeat that?
So now you can actually read it, right? But I kind of think, couldn't we do this with phones and tablets before? All this stuff seems a bit— anyway.
And also, these are menial tasks. Like a car, we're talking about cars. Cars get you from A to B, right? So a car can save me from having to walk 100 miles to go see my gran.
Providing there's no kangaroos. Yes, exactly. So it's dangerous, but it gets me there.
But, you know, an always available device so I can speak rather than write down my shopping list? Just seriously, it just doesn't seem the trade-off's there for me.
However, loads of companies are loving all the Echo stuff.
So there's companies like Ring and Arlo and Nest and August and Logitech, and they're all creating Alexa skills, you know, take advantage of the new functionality of the Echo Show.
So let's talk about the new feature, the brand new big feature of it. And this is called Drop In.
So I'll start off by saying, and you'll get where I feel about this, it's fortunately disabled by default.
But when it's activated, when it's activated, it lets you select people who you can remotely activate your Echo Show's camera and drop in without even needing to pick up the call.
Okay, so this is called instantly connecting to one of your Echo devices for a chat with anyone with the app on their device. So if Graham—
So for the first few seconds after dropping in, it will show a frosted glass effect on my end, right?
So I guess if you're all nude or having sexy times or whatever, you have a few seconds.
Or you can actually say, please don't activate the video camera now, just voice please, so we can just listen to you rather than watch you.
She goes, it's creepy, I'm doing my yoga. Right? Because it can detect when you're in the room.
So it never gets turned off, but it kind of goes to sleep, whatever that means, when it doesn't detect, it doesn't hear anyone or doesn't see anyone.
But if you're around, it kind of is there in waiting mode, waiting for instruction. Waiting for you to buy more stuff from Amazon.
And he didn't move it and it still knew it was there.
It kind of darkens, but it's never black. Now here's the other big thing with this drop-in feature, right?
If you decide to activate drop-in, Amazon will then want to access all of your contacts so it can find which contacts have...
So it can snuffle up all that information without, for example, I may be on Graham's phone without anything to do with Amazon Echo, and yet it still has all my information because Graham's talking from my contacts.
He said that he set up his Echo— I always forget the name— Echo Show with a Google Voice number to avoid having to share contacts with his device. So this is David Silver.
He said, "I use Google Voice to get a free number and set it up on my iPhone. I never enabled contacts and the intercom works like a charm." So that's using the app, I believe.
So apparently this is only available to US users.
I mean, okay, so maybe that is an issue going down— Well, that might be an issue going down the road, right?
I dislike the idea of a camera constantly being on you on an internet-enabled device because maybe it could be hacked.
And clearly, if these things became really mainstream, it is something which bad guys might target.
But more than that, the thought of anybody being able to open up a camera stream to my house, even if they are a friend of mine, without me saying, "Yes, that's fine." Because it's just connecting.
There is the onus upon the poor person who's having someone drop in on them, having to quickly say, "No, what's happening?" Okay, so imagine this.
So, right, show me the front door or show me the basement if you think there may be an intruder or you think something's going on.
But isn't it weird that they're using a device that's basically completely eroding privacy and security digitally in order to do so?
I can't remember the name. Echo Show. Echo Show.
And someone suggested that perhaps they're trying to target a more, you know, an older population with this because they're finding— I certainly know from my experience working with my, you know, my parents and stuff that it's, you know, it can be difficult, the interoperability between the systems and the apps and making sure everything works.
So, and maybe by not, maybe the whole strategy here is by not talking about security, it doesn't even come to mind and people don't discuss it.
Cause there's a lot of articles about this, reviews that aren't really going into the security elements of this at all.
And that would be lovely, wouldn't it, for people who are maybe slightly technology averse to use something which is completely voice activated rather than a user interface where they have to know what to click in order to do it.
Say you have a much older relative and you're worried about them living on their own at this stage.
What a great thing to be able to— For example, my grandmother, before she passed, she fell and she was lying there for 24 hours in her apartment before, you know, until our next visit.
And it was awful, she couldn't get to the phone. So this may be able to save those kind of situations really well.
Say yes to accept. And Grandma could have said, yes, connect. Whereas this will just open up, furthermore, Carole, it's horrible what you're saying, you know, that sort of scenario.
But these particular devices, they aren't going to be located on the floor. They are angled upwards. They typically sit at sort of waist height or higher.
They're not gonna see someone who's fallen on the floor anyway, are they?
They're seeing that rather, you know, that ugly unattractive thing where you can selfie yourself, you get all your double chin and your neck and all the rest of it in.
That's the kind of angle which these devices are using.
I bring my iPad in for whatever reasons, right? But I'd be able to take it in and out. And I like that flexibility.
Maybe Amazon just wants to sell more devices, sell their Echo Dots so you can go around the home. Maybe.
So you have to wonder what do these kinds of devices— and we won't know this for years, but say that you're a kid and you're growing up in this house where these devices are always listening to you and now can always see you.
What— even besides protecting your information and trying to keep your life private— what does that mean for you as an individual becoming you when something is always watching?
The home is supposed to be the ultimate source of privacy where you can develop and form your own conception of yourself.
And now this— that just seems entirely possible if the only way that you can shut off this device is literally to unplug it.
So it just seems like it's damaging for our self-concept and then what does that mean for us going forward as far as advancing society and being different, having plurality in the world?
Oh, it's not working out anymore— do you have to go locate them and take them off while they call you repeatedly, giving you their endless love?
I wonder if it's one of the names that was least popular but easy to say in the Western world.
Now they call themselves Rapid7. Identifying, prioritizing, and managing vulnerabilities all the way through to remediation isn't only possible, it can be simple right now.
Build a vulnerability management program that works for you with InsightVM by Rapid7. Get started today with your free 30-day trial at www.rapid7.com.
And thanks again to Rapid7 for supporting the show. Okay, welcome back to the show. And it's time for us to choose— it's our favorite part of the show. It's the pick of the week.
Pick of the week.
And it looks at all about the origins of cybercrime, its early roots, all the way through to the modern crime ecosystem.
And along the way, he's going to cover ransomware, of course, and Stuxnet. And he's got an upcoming episode tackling the Dark Avenger.
And I think after that, there'll be a new episode every two weeks.
And I was just thinking, if you like the Smashing Security podcast, you might want to try out Malicious Life as well, because there'll be some good old stories of good old days of malware and what's going on out there.
And I like his style. So links in the show notes. And that is my pick of the week.
But before you break out the noisemakers, so it's old as Graham. Doesn't seem like the ATM is going to last for much longer.
Lots of people in the industry are saying, well, you know, with mobile payments and digital banking, we probably aren't going to see ATMs make it to their 60th anniversary.
So just the way society— whatever, whatever.
That's what they're saying, that more and more people are becoming hesitant to use cash and that we're just moving into the direction of a completely cashless society, thereby nullifying the need for an ATM.
So we'll have this cash. Do you love cash? Gas is cheaper with cash.
Now, I have a fascinating fact about ATMs, which I happen to know, because I was reading an article about ATMs the other day. Okay. And you said, it's the 50th anniversary.
The world's first cash machine was opened or displayed in Enfield in London, which is a slightly unusual location.
But the interesting thing was that they had a celebrity come along to use it.
And this, I'm afraid, won't mean much to anyone outside of the UK, or indeed anyone who's under the age of 45. But the celebrity was Reg Varney from the ITV sitcom On the Buses.
So maybe I'll put a link in the show notes.
And I thought that might tickle some memories for people. Can I add another fact? Yes, please do.
Apparently, well, when the first ATM was created, this might have been after what you're referring to, Graham, but when they were created, tellers, human tellers hated them.
So what I heard is that lots of tellers would go out at the beginning of the day to where the ATMs were located and would pour honey on the consoles to render them useless because I guess they were very finicky back then where if one component failed, the entire machine wouldn't work.
So this went on for a while, but of course technology picked up and improved and then they just spread everywhere. But interesting.
So, I snarfed about 30 shows during that time. And I'm completely addicted.
So, it's called The Bright Sessions and it's a sci-fi audio drama about people with supernatural abilities in therapy.
And you're like this fly on the wall listening to the therapy session. It's great. I just, I love it. It's created by Lauren Shippen. And it premiered, it's been going for since 2015.
So it's not brand new, which is also great because it means you have a huge backlog of shows to catch up on, which is one of my favorite things when you find a great one and there's a nice backlog.
So every show is about 15 to 40 minutes long, and it's fly-on-the-wall style, you're eavesdropping.
But from early on, you get the feeling that the therapist might have ulterior motives, right? And hints of what was going on are dribbled out really slowly.
And it makes for very compelling listening, which is why I watched.
But it's also for anyone who likes all that, "God, I would love to be listening to a therapy session," because they actually do have a consulting therapist who's helping them with it.
So it seems pretty real. And the script is good. The acting's solid. The cast is great. And the story's all twisty-turny. Hooked. So I wanted to share that with all of you guys.
So perfect for your flights during summer holiday, you know, season. Okay.
And thank you, David, for joining us. It's been a pleasure having you on the show. That just about wraps it up. Thanks everybody for tuning in.
If you like the show, tell your friends, let us know what you think. Maybe even give us a 5-star review on iTunes. Don't give us a 4-star review or a 3-star review. I'm happy with 4.

