The WannaCry ransomware was barely out of the headlines when another cyberattack took down computer systems around the world.
This time, a piece of malware dubbed “NotPetya” is to blame. And unlike WannaCry, it has no clear “kill switch” as it spreads across infected networks.
NotPetya has reportedly hit several global organisations so far, including the American pharmaceutical company Merck and, in Australia, Cadbury.
We confirm our company's computer network was compromised today as part of global hack. Other organizations have also been affected (1 of 2)
— Merck (@Merck) June 27, 2017
The attack was initially classed as ransomware: malicious software that holds a user to ransom by encrypting their files and blocking access without a “key”. It was a reasonable assumption given the threatening message displayed to victims – but the picture is more complicated.
NotPetya is distinct from WannaCry in a number of important ways – particularly, money doesn’t seem to be its end goal.
1. It’s about disruption not profit
Unlike other ransomware incidents, NotPetya seems to be aimed at disruption rather than criminal profiteering (or perhaps just bad design).
First, the amount requested by the ransomers is relatively small – only US$300. This seems to place a low value on the loss of access that the malware causes.
Secondly, infected machines direct the user to make payment to one Bitcoin account. Users are also referred to a single email address to obtain the keys necessary to decrypt their data. Unfortunately, many users have now discovered that the email account has been closed by Posteo, the email provider.
This means that, even having made payment for the ransom, end users are unable to recover their data. Locking yourself out from your victims with a fixed address in this manner just doesn’t make good business sense.
This points either to amateurish implementation, or to the fact that NotPetya may have another purpose.
Some reports suggest the ransom demands may be a media lure to maximise public attention, while other researchers question whether recovery of encrypted data was ever possible.
Ransomwares and hackers are becoming the scapegoats of nation state attackers. Petya is a wiper not a ransomware.https://t.co/lkrfWMw2Zl
— Matthieu Suiche (@msuiche) June 28, 2017
In some circles, this attack has been classified as a “wiper” (in which data or even entire disks are deleted or modified beyond repair), but this is still to be firmly determined.
Whatever the case, if the perpetrators wanted to make money they have gone about it all wrong.
2. Ukraine seems to be the centre of the damage
Unlike WannaCry, which made headlines after it shut down the computer systems of British hospitals among other organisations, the largest number of NotPetya incidents have been reported in Ukraine.
The malware uses an “exploit” – a tool that can take advantage of a specific vulnerability on a computer – to remotely execute code on vulnerable Windows operating systems. This vulnerability, called MS17-010, was patched by Microsoft in March. The instances of compromised systems suggests that many organisations and individuals have failed to install the patch.
One possible explanation for high levels of non-patched systems could be the prevalence of pirated software in Ukraine.
The latest on today's #ransomware outbreak includes #YARA rules. https://t.co/23wVF8OmUc @kaspersky #petya #notpetya pic.twitter.com/Ryc9GO0Cia
— Securelist (@Securelist) June 27, 2017
Another distribution mechanism used by the malware appears to be a software updater linked to the Ukrainian tax accounting software, M.E.Doc.
While there is no clear evidence pointing to the perpetrators of this attack, its motivations could be political. Unlike WannaCry, NotPetya is seriously disrupting businesses rather than making money, or else is masking its other intentions.
3. It may not even be ransomware
While NotPetya uses an edited version of the same EternalBlue software exploit as the WannaCry ransomware to remotely run code on the victim’s Windows computer, it differs in many key ways.
Whereas WannaCry only encrypted certain files (typically users’ most important data), NotPetya also prevents access to the entire operating system. It does this by writing over key parts of the hard disk as well as encrypting users’ files.
Traditional encryption ransomware typically has a key available to recover your files. With NotPetya, there is no key to facilitate recovery (despite the promises shown on screen). There is evidence that the allegedly unique ID shown to the victim is actually random data that could never result in a decryption key being provided.
Some frequently asked questions around the #Petya #NotPetya malware from our webinar. pic.twitter.com/FZbBFGvzaP
— Kaspersky Lab (@kaspersky) June 29, 2017
While it is still too early to provide a definitive analysis of this cyberattack, it is clear this is a new twist in online warfare.
The code has been carefully designed to take advantage of vulnerable systems while the user is duped into believing that it’s possible to recover their files. The ransomware distraction may have been a careful misdirection to hide the true intentions of the mayhem.
We can expect this trend to continue and that organisations (and individuals) need to be more proactive in keeping their operating systems up to date and their data backed up.
Paul Haskell-Dowland is affiliated with the International Federation for Information Processing (IFIP) Technical Committee 11 and is a member of the ACS and BCS.


Instagram Outage Disrupts Thousands of U.S. Users
TSMC Eyes 3nm Chip Production in Japan with $17 Billion Kumamoto Investment
Anthropic Eyes $350 Billion Valuation as AI Funding and Share Sale Accelerate
SoftBank Shares Slide After Arm Earnings Miss Fuels Tech Stock Sell-Off
Tencent Shares Slide After WeChat Restricts YuanBao AI Promotional Links
Palantir Stock Jumps After Strong Q4 Earnings Beat and Upbeat 2026 Revenue Forecast
Jensen Huang Urges Taiwan Suppliers to Boost AI Chip Production Amid Surging Demand
Google Cloud and Liberty Global Forge Strategic AI Partnership to Transform European Telecom Services
Oracle Plans $45–$50 Billion Funding Push in 2026 to Expand Cloud and AI Infrastructure
Nvidia Confirms Major OpenAI Investment Amid AI Funding Race
Amazon Stock Rebounds After Earnings as $200B Capex Plan Sparks AI Spending Debate
Sony Q3 Profit Jumps on Gaming and Image Sensors, Full-Year Outlook Raised
Baidu Approves $5 Billion Share Buyback and Plans First-Ever Dividend in 2026
SpaceX Prioritizes Moon Mission Before Mars as Starship Development Accelerates
SpaceX Updates Starlink Privacy Policy to Allow AI Training as xAI Merger Talks and IPO Loom
SpaceX Seeks FCC Approval for Massive Solar-Powered Satellite Network to Support AI Data Centers 



