• Home
  • Latest
  • Fortune 500
  • Finance
  • Tech
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
TechCybersecurity

Watch That Globe-Circling, Business-Crushing Malware Wreck Computers

Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
Robert Hackett
By
Robert Hackett
Robert Hackett
Down Arrow Button Icon
June 30, 2017, 5:36 PM ET

Curious to know what Tuesday’s global cyber attack looked like inside the businesses that found themselves victim? Wonder no longer.

Daniel White, a cartographer who, in his spare time, runs a popular YouTube channel about computer viruses, published a video demonstration of the malicious software in action on Thursday. The demo had about 30,000 views at press time.

In the video, White, who goes by the online alias “danooct1,” spins up four virtual machines—computer simulations within another computer—each running versions of Microsoft Windows and connected on a local area network. The simulations contain copies of identical “dummy files,” which White uses to show the progress of the attack.

Get Data Sheet, Fortune’s technology newsletter.

Within minutes of setting the malware into motion on one of the machines, the infection spreads across the network and runs its destructive course. One by one, White’s dummy files are encrypted, rendering them into inaccessible, alphanumeric gobbledygook.

The malware—referred to as Petya, NotPetya, ExPet, Nyetya, along with other names—then forces the systems to reboot. When the computers come back online, their screens display false notes about “repairing” file systems until, ultimately, ransom notes demanding $300 in Bitcoin appear.

You can watch the full video below.

The cyber attack, which initially spread out of Ukraine, took down corporate networks at the Danish shipping company Maersk, American drugmaker Merck, Russian oil giant Rosneft, British ad agency WPP, and British law firm DLA Piper, among other places. To spread the attack far and wide, the perpetrators apparently used hijacked auto-update software from a Ukrainian firm, leaked U.S. National Security Agency hacking tools, flaws in Microsoft Windows, and common IT administrative software, researchers has said.

There has been some contention among security researchers about whether to classify this malware as a buggy piece of ransomware that, purposely or not, fails to provide a way for people to restore their systems, or as a “wiper,” intended from the outset to raze these networks. Both sides agree, however, that once infected, victims have little hope of recovering their data—even if they pay the demanded sum.

About the Author
Robert Hackett
By Robert Hackett
Instagram iconLinkedIn iconTwitter icon
See full bioRight Arrow Button Icon

Latest in Tech

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025

Most Popular

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Fortune Secondary Logo
Rankings
  • 100 Best Companies
  • Fortune 500
  • Global 500
  • Fortune 500 Europe
  • Most Powerful Women
  • Future 50
  • World’s Most Admired Companies
  • See All Rankings
Sections
  • Finance
  • Fortune Crypto
  • Features
  • Leadership
  • Health
  • Commentary
  • Success
  • Retail
  • Mpw
  • Tech
  • Lifestyle
  • CEO Initiative
  • Asia
  • Politics
  • Conferences
  • Europe
  • Newsletters
  • Personal Finance
  • Environment
  • Magazine
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Fortune Brand Studio
  • Fortune Analytics
  • Fortune Conferences
  • Business Development
  • Group Subscriptions
About Us
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Fortune
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map
  • About Us
  • Editorial Calendar
  • Press Center
  • Work At Fortune
  • Diversity And Inclusion
  • Terms And Conditions
  • Site Map
  • Facebook icon
  • Twitter icon
  • LinkedIn icon
  • Instagram icon
  • Pinterest icon

Latest in Tech

LawElon Musk
Musk misled Twitter investors before 2022 buyout, jury says
By Isaiah Poritz, Jef Feeley and BloombergMarch 20, 2026
2 hours ago
bespectacled man scratches the back of his head during congressional hearing
CryptoCryptocurrency
Kalshi locks in $22 billion valuation, gaining slight edge over its rival Polymarket
By Carlos GarciaMarch 20, 2026
5 hours ago
Big TechEntrepreneurs
Mark Cuban reads 1,000 emails a day—now he’s using a Mac Mini to fight the AI-generated flood threatening his clean inbox obsession
By Marco Quiroz-GutierrezMarch 20, 2026
6 hours ago
Stressed out job seeker on laptop
Successjob hunting
Job seekers aren’t imagining things: the number of candidates ghosted by employers just reached a three-year high thanks to AI
By Emma BurleighMarch 20, 2026
9 hours ago
SuccessCareers
AI boom is fueling demand for skilled trades—and demand for technicians, HVAC workers, and electricians is soaring, with six-figure salaries to match
By Preston ForeMarch 20, 2026
10 hours ago
LawX
Three Tennessee teenagers are suing Elon Musk’s xAI for creating sexually explicit images of them
By The Associated Press and Travis LollerMarch 20, 2026
11 hours ago

© 2026 Fortune Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Fortune Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.