- May 7, 2002
- 10,371
- 762
- 126

When first installed, the Petya Ransomware will replace the boot drive's existing Master Boot Record, or MBR, with a malicious loader. The MBR is information placed at the very beginning on a hard drive that tells the computer how it should boot the operating system. It will then cause Windows to reboot in order to execute the new malicious ransomware loader, which will display a screen pretending to be CHKDSK. During this fake CHKDSK stage, Petya will encrypt the Master File Table on the drive. Once the MFT is corrupted, or encrypted in this case, the computer does not know where files are located, or if they even exist, and thus they are not accessible.
http://www.bleepingcomputer.com/new...e-files-and-encrypts-your-hard-drive-instead/
You could in theory find stuff with recovery programs, but, the actual names and dates and all that would be gone.
People need to stop paying these idiots, that is the main reason these are spreading like wildfire.
BTW, in talking about this with a few friends, since they are all financed via bitcoins and the like, and those places accept credit cards, then, why aren't people reversing the charges AFTER they get the encryption key?
Heck, seems even some ransomware doesn't even send back a valid key, even if you do pay them: http://www.bleepingcomputer.com/new...verton-ransomware-may-not-get-your-data-back/
Decrypt program now available!
http://www.bleepingcomputer.com/new...ion-defeated-and-password-generator-released/
Last edited: