• Home
  • Latest
  • Fortune 500
  • Finance
  • Tech
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
TechCybersecurity

Police Suggest Petya Ransomware Attack Was a Distraction

By
Reuters
Reuters
Down Arrow Button Icon
By
Reuters
Reuters
Down Arrow Button Icon
June 29, 2017, 3:24 PM ET

The primary target of a crippling computer virus that spread from Ukraine across the world this week is highly likely to have been that country’s computer infrastructure, a top Ukrainian police official told Reuters on Thursday.

Cyber security firms are trying to piece together who was behind the computer worm, dubbed NotPetya by some experts, which has paralyzed thousands of machines worldwide, shutting down ports, factories and offices as it spread through internal organizational networks to an estimated 60 countries.

Ukrainian politicians were quick on Tuesday to blame Russia, but a Kremlin spokesman dismissed “unfounded blanket accusations.” Kiev has accused Moscow of two previous cyber strikes on the Ukrainian power grid and other attacks since Russia annexed Crimea in 2014.

A growing consensus among security researchers, armed with technical evidence, suggests the main purpose of the attack was to install new malware on computers at government and commercial organizations in Ukraine. Rather than extortion, the goal may be to plant the seeds of future sabotage, experts said.

International firms appear to have been hit through their operations in the country.

Get Data Sheet, Fortune’s technology newsletter.

Slovakian security software firm ESET released statistics on Thursday showing 75% of the infections detected among its global customer base were in Ukraine, and that all of the top 10 countries hit were located in central, eastern or southern Europe.

Arne Schoenbohm, president of BSI, Germany’s federal cyber security agency, told Reuters in an interview on Thursday that most of the damage from the attack had hit Ukraine, and Russia to a lesser extent, with only a few dozen German firms affected.

“In all of the known cases, the companies were first infected through a Ukrainian subsidiary,” the German official said.

Smokescreen

Ukraine’s cyber police said in a statement on Thursday morning that it had received 1,500 requests for help from individuals and companies in connection with the virus.

The malicious code in the new virus encrypted data on computers and demanded victims pay a $300 ransom, similar to the extortion tactic used in a global WannaCry ransomware attack in May.

A top Ukrainian police official told Reuters that the extortion demands were likely a smokescreen, echoing working hypotheses from top cyber security firms, who consider NotPetya a “wiper,” or tool for destroying data and wiping hard disks clean, that is disguised as ransomware.

“Since the virus was modified to encrypt all data and make decryption impossible, the likelihood of it being done to install new malware is high,” the official, who declined to be identified, wrote in a phone text message to Reuters.

Information Systems Security Partners (ISSP), a Kiev-based cyber research firm that has investigated previous cyber attacks against Ukraine, is pursuing the same line of inquiry.

ISSP said that given that few people actually paid the $300 demanded for removing the virus, money was unlikely to be the primary object of the attack.

“It’s highly likely that during this attack new attacks were set up,” said ISSP chairman Oleg Derevianko.

“At almost all organizations whose network domains were infected, not all computers went offline,” he said by phone. “Why didn’t they all go offline? We are trying to understand what they might have left on those machines that weren’t hit.”

Ukraine’s National Security and Defence Council Secretary Oleksandr Turchynov said the virus was first and foremost spread through an update issued by an accounting services and business management software.

“Also involved was the hosting service of an internet provider, which the SBU (Ukraine’s state security service) has already questioned about cooperation with Russian intelligence agencies,” he said, according to a statement.

Destructive Intent

Technical experts familiar with the recent history of the cyber escalation between Russia and Ukraine, say these latest attacks are part of the wider political and military conflict, although no “smoking gun” has been found to identify the culprits.

John Hultquist, a cyber intelligence analyst with FireEye, said the failed ransomware attack disguises an as yet unseen destructive motive. “If it were an attack masquerading as crime, that would not be unprecedented at all,” Hultquist said.

Some cyber security researchers have said the fact that the Kremlin’s two flagship energy companies are victims of the attack could suggest Moscow was not behind it.

Russian oil major Rosneft was one of the first companies to reveal it had been compromised by the virus and sources told Reuters on Thursday computers at state gas giant Gazprom had also been infected.

For technical reasons, NotPetya appears to be more targeted than last month’s global ransomware attack, known as WannaCry. When first infected by WannaCry, computers scanned the internet globally for other vulnerable machines.

By contrast, NotPetya does not randomly scan the Internet to find new computers to infect. It only spreads itself inside organizational networks, taking advantage of a variety of legitimate network administration tools.

This makes it far harder for anti-virus software or network security technicians to detect. It also gives it the capacity to infect other Windows computers, even those with the latest security patches, several security firms warned on Thursday.

“Petya is proving to be more sophisticated than WannaCry in terms of scope, ability to be neutralized, and apparently, the motivation behind its launch,” corporate security consulting firm Kroll has advised its clients.

This Ukrainian Company Is Likely Behind the Ransomware Wave

So far, NotPetya appears only to have been distributed inside Ukraine via a handful of so-called “watering-hole attacks” – by piggy-backing on the software updating feature of a popular national tax accounting program known as MEDoc.

Kaspersky, a global cyber security firm based in Russia, also said they found a second distribution point on a local news site in the city of Bakhmut, Ukraine, which infected visitors who clicked on the site with the ransomware-like attack.

“Our analysis indicates the main purpose of the attack was not financial gain, but widespread destruction,” said Costin Raiu, Kaspersky’s global head of research. “NotPetya ..combined elements of a targeted watering hole attack we’ve traditionally seen used by nation states with traditional software exploitation to devastate a specific user base,” Lesley Carhart, a Chicago-based security researcher, wrote in a blog widely shared online by top security experts.

About the Author
By Reuters
See full bioRight Arrow Button Icon

Latest in Tech

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025

Most Popular

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Fortune Secondary Logo
Rankings
  • 100 Best Companies
  • Fortune 500
  • Global 500
  • Fortune 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Fortune Crypto
  • Features
  • Leadership
  • Health
  • Commentary
  • Success
  • Retail
  • Mpw
  • Tech
  • Lifestyle
  • CEO Initiative
  • Asia
  • Politics
  • Conferences
  • Europe
  • Newsletters
  • Personal Finance
  • Environment
  • Magazine
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Fortune Brand Studio
  • Fortune Analytics
  • Fortune Conferences
  • Business Development
  • Group Subscriptions
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Fortune
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map
Fortune Secondary Logo
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Fortune
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map
  • Facebook icon
  • Twitter icon
  • LinkedIn icon
  • Instagram icon
  • Pinterest icon

Latest in Tech

AIAnthropic
Anthropic’s investors could be the key to ending its Pentagon standoff—but some investors have opposite views
By Jessica MathewsMarch 5, 2026
9 hours ago
AIGoogle
Google’s AI chatbot convinced a man they were in love. It then allegedly told him to stage a ‘mass casualty attack’ in newly released lawsuit
By Jake AngeloMarch 5, 2026
9 hours ago
Startups & VentureBillionaires
Silicon Valley legend Vinod Khosla has ‘no plans to leave California’ amid billionaire tax uproar—but he has another idea to fix the wealth loophole
By Nick LichtenbergMarch 5, 2026
11 hours ago
Side-by-side photos of OpenAI CEO Sam Altman and Anthropic CEO Dario Amodei
AIEye on AI
The Anthropic–OpenAI feud and their Pentagon dispute expose a deeper problem with AI safety
By Sharon GoldmanMarch 5, 2026
13 hours ago
Sam Altman speaking.
AIOpenAI
OpenAI launches GPT-5.4, its most powerful model for enterprise work—and a direct shot at Anthropic
By Beatrice NolanMarch 5, 2026
13 hours ago
shlomo
CommentaryMarkets
Tech billionaire Shlomo Kramer: the cyber selloff proved that Wall Street can’t price tech anymore
By Shlomo KramerMarch 5, 2026
14 hours ago

Most Popular

placeholder alt text
Health
Palantir and other tech companies are stocking offices with nicotine products to increase worker productivity
By Catherina GioinoMarch 4, 2026
2 days ago
placeholder alt text
Success
Uber CEO says his ‘really demanding’ work culture includes expecting employees to answer his emails over the weekend: ‘Don’t come here if you want to coast’
By Emma BurleighMarch 4, 2026
2 days ago
placeholder alt text
Newsletters
The Iran war is giving rise to a centuries-old economic theory—and laying waste to the WTO-based world order
By Diane BradyMarch 5, 2026
22 hours ago
placeholder alt text
Economy
Trump's loss of $1.7 trillion in tariff revenue will send the national debt to $58 trillion by 2036, think tank projects
By Nick LichtenbergMarch 5, 2026
16 hours ago
placeholder alt text
AI
OpenAI investor Vinod Khosla predicts today’s 5-year-olds won’t ever need to get jobs thanks to AI
By Sasha RogelbergMarch 4, 2026
2 days ago
placeholder alt text
Success
Tech investor Bill Gurley says workers who went through the ‘college conveyor belt’ and chased safe jobs are at high risk of AI automation
By Emma BurleighMarch 3, 2026
3 days ago

© 2026 Fortune Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Fortune Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.