Close Menu

    Subscribe to Updates

    Get the latest tech news

    Facebook X (Twitter) Instagram
    TechArenaTechArena
    • Home
    • News
    • Reviews
    • Features
      • Top 5
    • Startups
    • Contact
    Facebook X (Twitter) Instagram
    TechArenaTechArena
    Home»News»A few things you need to know about the PetrWrap Ransomware
    News

    A few things you need to know about the PetrWrap Ransomware

    Kaluka wanjalaBy Kaluka wanjalaJune 28, 2017Updated:June 28, 20174 Mins Read
    Facebook Twitter Telegram LinkedIn WhatsApp Email Pinterest
    ransomware
    ransomware
    Share
    Facebook Twitter LinkedIn WhatsApp Telegram

    By now, you probably have heard about the new ransomware tool called PetrWrap. News about this ransomware tool surfaced yesterday and it was reported that it had affected key government assets in Ukraine. We have seen an increase in ransomware attacks the last 12 months and this is just the latest one.

    Essentially, a ransomware is a malicious software that encrypts some of your files and asks you to pay a certain amount of money to have them decrypted. The malware holds your files at ransom and only those who developed it can give you the key and in most cases you cannot do that yourself. In some cases, if you try decrypting the files without contacting the cybercriminals who developed it, you risk losing the said files completely.

    So, What is PetrWrap and What Does it do?

    PetrWrap is a ransomware tool that is built from the structure of Petya, a ransomware tool that was released not so long ago. PetrWrap is built on Petya and its different from the latter as it tries to subvert protections that came about after the spread of Petya. This ransomware has already affected some key government institutions in Ukraine including the Ukranian power company, the central bank and Kiev’s main airport according to the BBC.

    Since PetrWrap is a repurposed ransomware version of Petya, it comes with a few pieces of the initial ransomware and is designed to do the same function and avoid protections implemented after the rise of Petya.

    When PetrWrap makes its way into your system, it goes to the hard drive and encrypt its files so that you cannot access them unless you get the key that the cybercriminals responsible for this ransomware attack can give you. With that said, you will have to pay the cybercriminals who will then give you the key. Keep in mind that this is not guaranteed and you may pay the ransom and still not get the key.

    It is being reported that PetrWrap uses the EternalBlue exploit that we saw a couple of weeks ago with the WannaCry ransomware.

    How it spreads

    The BBC reports that the ransomware most probably spreads via an infected spreadsheet through email. Most ransomware attacks spread via email as this seems to be the easiest way to reach as many people as possible. This is especially so if the attackers want their ransomware want it to get to a company’s network. With this in mind, cybersecurity experts have advised people not to click on email attachments from people they do not know and to generally be careful when downloading any attachments sent to them via email.

    PetrWrap can patch vulnerabilities in Petya that made it easy to security firms to restore the encrypted data. This is according to SecureList which also reports that even though your antivirus may detect PetrWrap, by that time the damage will already have been done.

    What now?

    Since PetrWrap is already spreading, the best option for you right now is to make sure you are not affected. If you are on a company network and are not the system administrator, you may want to seek help from the administrator on how to protect yourself.

    Just to be safe, some of the few things recommended are as follows:

    Update your system as soon as possible

    Make sure you have an antivirus installed and activate Windows Defender.

    Do not download or click on email attachments from people you do not know

    If you are affected, you should probabaly not pay up since the hackers behind this ransomware do not have the email account they need to send out the encryption keys. The email account was provided by Posteo and the company has announced that it has shut down that particular address and this means that the hackers will not be able to send you the encryption key even if you pay.

    Also Read: Ransomware: Should You Pay?

    source

    ransomware
    Kaluka wanjala
    • Website
    • Facebook
    • X (Twitter)
    • LinkedIn

    Editor at TechArena. I cover all things technology and review new gadgets as I get them. You can reach me on email: [email protected]

    Related Posts

    Madica Backs Two New AI Startups to Expand Its Pan-African Portfolio

    October 20, 2025

    Cairo-based AI Startup Nanovate Raises $1M to Expand Across MENA

    October 18, 2025

    Vertiv Teams Up with PNY Technologies to Power Next-Gen NVIDIA AI Deployments in EMEA

    October 17, 2025

    Comments are closed.

    Latest Posts

    Madica Backs Two New AI Startups to Expand Its Pan-African Portfolio

    October 20, 2025

    Cairo-based AI Startup Nanovate Raises $1M to Expand Across MENA

    October 18, 2025

    Vertiv Teams Up with PNY Technologies to Power Next-Gen NVIDIA AI Deployments in EMEA

    October 17, 2025

    LOOP Officially Launches LOOP FLEX, Its Buy Now, Pay Later Solution

    October 16, 2025
    Advertisement
    Editor's Pick

    How CSquared is Powering Africa’s Digital Backbone – An Interview with Napoleon Mengot

    October 16, 2025

    Global Solar Panels Aren’t Enough: Why Supply Chains Hold the Key to Sustainability

    October 13, 2025

    Change leaders must put security at the heart of transformation

    October 13, 2025

    Westcon-Comstor’s Vincent Entonu: “Africa Is Not a Late Adopter of Technology”

    October 10, 2025
    © 2025 TechArena.. All rights reserved.
    • Home
    • Startups
    • Reviews

    Type above and press Enter to search. Press Esc to cancel.

    Ad Blocker Enabled!
    Ad Blocker Enabled!
    Our website is made possible by displaying online advertisements to our visitors. Please support us by disabling your Ad Blocker.