Petya hackers issue fresh ransom demand

Petya hackers issue fresh ransom demand

July 6, 2017   12:17 pm

The perpetrators of a recent cyber-attack that disrupted businesses across the world appear to have accessed the ransom payments they raised.

Just over £7,900-worth of virtual currency has been moved from the Bitcoin address listed in the blackmail demand that appeared on hacked PCs.

One expert said there was little doubt the funds had been tapped by those responsible for the crime.

And it seems they have now made a fresh ransom demand.

However, analysts suggest the move is intended to confuse investigations into the matter.

In other related developments, Ukraine’s interior minister has said the police managed to prevent a second wave of attacks by shutting down and confiscating computer servers used by a local software company, which is thought to have unwittingly helped the Petya-variant virus to spread.

And after having repeatedly denied any involvement in the transmission of the malware, the developer Intellect Service has acknowledged an upgrade to its MeDoc tax software was indeed “contaminated”, allowing the attack to be carried out.

“As of today, every computer which is on the same local network as our product is a threat,” the company’s chief executive Olesya Bilousova told reporters.

She added that one million computers in Ukraine had MeDoc installed on them.

The police have recommended that everyone stops using the program and turns off computers that have it.


Although the majority of the detected attacks occurred within Ukraine, according to analysis by security firm Eset the malware also affected businesses across the world.

Their computers became inaccessible after the code spread over their internal networks, scrambling a part of the PCs’ operating systems used to locate where files are stored.

High-profile casualties included Nurofen-maker Reckitt Benckiser, Oreo cookie manufacturer Mondelez International, the shipping group Maersk and the advertising agency WPP.

Most of those struck did not, however, pay the ransom demand. This was in part because the email address given by the attackers to contact them was shut down by its German operator.

And until Tuesday, the funds that were raised lay dormant.

But at 22:32 BST on Tuesday, three transfers were triggered.

BBC

Disclaimer: All the comments will be moderated by the AD editorial. Abstain from posting comments that are obscene, defamatory or slanderous. Please avoid outside hyperlinks inside the comment and avoid typing all capitalized comments. Help us delete comments that do not follow these guidelines by flagging them(mouse over a comment and click the flag icon on the right side). Do use these forums to voice your opinions and create healthy discourse.

Most Viewed Video Stories

CID ordered to expedite investigations into 'X-Press Pearl' maritime disaster (English)

CID ordered to expedite investigations into 'X-Press Pearl' maritime disaster (English)

Several political decisions taken at meeting between President & ruling party MPs (English)

New regulatory body to be introduced for energy sector (English)

Two companies from Russia, India to take over management of Mattala airport (English)

Ruling party MPs ready to back President Ranil at upcoming polls

Ada Derana Prime Time News Bulletin 6.55 pm - 2024.04.26

Youth Corps members summoned for May Day rally? Heated debate in parliament

' Nihonbashi ' Japanese restaurant at Port City declared open by President Ranil