The operating mode is the same as last May's attack on WannaCry ransomware . The virus usually catches up with an attachment in a seemingly clean mail. This can be a fake message from your bank, a UPS parcel delivery or a scanned document sent from a corporate copier. Then the malicious code will lock all files on your computer and those on the network, if the PC has access to shares on servers. In business, schools and administrations, the threat spreads very rapidly and causes considerable damage, rendering the entire computer system inoperative.
Then you will see a message indicating that you are the target of a rung and that you have to pay $ 300 to get your files back. One, it is not certain that paying the ransom allows to recover your files. Secondly, the hackers are not going to hinder you to extort more bitcoin, since you paid well once so why not a second. In addition, it would encourage other hackers, so it is ethically discouraged to pay, especially since feedback shows that recovering healthy files almost never happens even after paying the ransom in the rules .
The right protection against Petya and other equivalent threats
- Do not open e-mails from unknown senders
- Being aware of the risk of phishing
- Install the latest Windows updates
- Verify that the antivirus software is regularly updated
- Install the latest versions and software updates (Office, Acrobat Reader ...)
- Make regular backups of his documents, photos, work ...