Kill-Switch for Petya ransomware on Windows

June 28th, 2017 No comments

PT Security, a UK-based cyber security company and Amit Serper from Cybereason, have discovered a Kill-Switch for Petya ransomware. According to a tweet, company has advised users to create a file i.e. “C:\Windows\perfc” (without extension) to prevent ransomware infection.You need Administrator privileges to write into that directory

How to do it?

  1. Click on Start and type “cmd” without quotes
  2. Right click on it and choose “Run as administratorcmd with admin privilages
  3. Type “cd..” to navigate to previous directory
  4. Type “copy con perfc” and press Enter copy con
  5. Type any random text. When you are finished press “Enter” to go to a new line and press “Ctrl” + “Z” to create the new file create new file
  6. Type “dir pe*” to confirm it.
  7. Change attribute of the newly created file by executing the following command “attrib +R perfcchange attributes to read only
  8. Repeat these steps 4 to 7 replacing “perfc” with “perfc.dll” and “perfc.dat” at the same directory

Petya Ransomware works by encrypting the Master File Table (MFT). If your system is rebooting after infection turn it off immediately to prevent files being encrypted.

Stay tuned for further updates.

 

Possibly Related Posts:


Samsung R&D Institute Bangalore Hiring Challenge

June 8th, 2017 No comments

Samsung is looking to hire exceptional software talent to join their team in Bangalore. They are taking freshers too. Samsung Hiring Challenge

Experience: 0-14 years
CTC: Best in Industry
Job Location: Bangalore
Openings: 100

Samsung is looking for candidates with:

  • Excellent Programming Skills
  • Strong problem solving and trouble shooting skills
  • Good understanding of algorithms, data structures and performance optimization techniques
  • Hands on with Design, Coding, Debugging and Testing
  • Excellent Communication & Interpersonal Skills
  • Team PlayerRequired Skills:
  • C,C++ Java Python, Java Script
  • JSON, XML – Jquery, Spring, Struts, Hibernate, iBatis, Node.js
  • Web Services – REST
  • Web Security – mySQL, Memcache/Redis, Cassandra/Hbase, MongoDB/CouchDB
  • Map Reduce, Hadoop, Hive, Mahout
  • Fast Data Processing – Storm – Rules Engine – Drools

Brush up your skills by Sample Challenge 

Participate in Samsung R & D Institute Hiring Challenge

OPENS AT: Jun 09, 06:00 PM IST

CLOSES AT: Jun 11, 11:00 PM IST

DURATION: 3h

Note:
Though HackerEarth platform allows use of Libraries & Packages for the challenge, the second round of Samsung’s online test, most libraries will be DISALLOWED. Only the following Libraries are allowed

  • Basic Memory mgmt (malloc/free, new/delete)
  • Basic I/O (scanf/printf, cin/cout)
  • Equivalent in Java.
  • All other libraries/packages (e.g. string, stl, collections etc) are DISALLOWED

Possibly Related Posts: