• Skip to primary navigation
  • Skip to main content
  • About
  • Team
  • Industries
  • Products
  • News
  • Case Studies
  • Portal
  • Pay Now

Advantage Technology

Advantage Tech logoAdvantage Tech logo light

Cybersecurity & Managed IT Service Provider

  • Managed IT
    • Managed IT
    • Antivirus & Spam Filtering
    • Data Backup & Recovery
    • IT Help Desk
    • Maintenance & Support
    • Remote Monitoring & Management
  • Cybersecurity
    • Cybersecurity
    • Services & Solutions

      • AI Support Services
      • Attack Surface Management (ASM)
      • Cloud Security
      • Continuous Compliance Monitoring
      • Data Loss Prevention (DLP)
      • Email Security
      • Encryption
      • Endpoint Security
      • Identity & Access Management (IAM)
      • Managed Detection & Response (MDR)
      • Multi & Two-Factor Authentication
      • Network Security
      • Security Information & Event Management (SIEM)
      • Security Operations Center
      • Web Security
    • Audits & Testing

      • Cyber Security Risk Assessments
      • Cyber Threat Intelligence
      • Digital Forensics & Incident Response (DFIR)
      • Penetration Testing
      • Vulnerability Management
    • Compliance

      • CMMC Compliance
      • CMMC 2.0 Requirements
      • Certification Audit Support
      • FedRAMP
      • FISMA
      • NIST 800-171
      • Readiness Assessment
      • RPO Support
      • 3PAO Support
  • IT Infrastructure
    • IT Infrastructure
    • On-Premises

      • Network Administration
      • Security Camera Installation
      • Server Consolidation
      • Server Installation & Maintenance
      • Server Migration
      • Structured Cabling
    • Cloud-Based

      • Cloud Migration
      • Cloud Hosting
      • Colocation Data Center
      • Virtualization
    • Phone & Telecom

      • PBX Phone Systems
      • SIP Phone Systems
      • Unified Communications (UCaaS)
      • VoIP Phone Systems
  • IT Consulting
    • IT Consulting
    • IT Staff Augmentation
    • GSA Capabilities & Schedule 70
    • Security Awareness Training
    • Technical Support
    • Virtual CIO
    • Virtual CISO
  • Products
    • Products
    • Computers
    • Networking
    • Security Cameras
    • Servers
    • Telecommunications
  • About
    • About
    • Areas Served
    • Blog
    • Careers
    • Case Studies
    • Contact
    • Events
    • Industries
    • News
    • Team
  • Portal
  • Pay Now
  • Request Consultation

A New Ransomware Encrypts Your Entire Hard Drive

April 7, 2016 · Advantage Technology · Cybersecurity

UPDATE 4-11-2016: Petya has been cracked, but recovery is technical. If you have been infected we'll help you recover your system.

UPDATE 4-11-2016: Petya has been cracked, but recovery is technical. If you have been infected give us a call and we’ll help you recover your system.

Original Post: Reported a few weeks ago by Ars Technica and BleepingComputers, there is a new kind of ransomware that is taking data extortion to the next level. It’s called Petya, and rather than encrypting a file or two here or there, Petya infects the Master Boot Record, and when you reboot, it encrypts the Master File Table.

What does all this mean? It means when Petya infects your computer, it makes your entire hard drive completely unreadable until you enter a decryption code. Your entire hard drive! Not a file or two. The whole thing.

How do you get the decryption code? You have to pay the hacker, and hope he’s kind enough to provide it to you.

We’ve written about Ransomware and Crypto-Viruses in the past, but this takes it to a new level. With Petya, there is no way to access your files without the key. You can’t even copy them to another computer. Without paying the hacker, you can never access them again.

How does Petya spread? Same as any other malware: email. So far, it’s being delivered via Dropbox links rather than explicit attachments. We’ve written before about avoiding malware delivered via email attachments. Remember that the same rules apply when you receive a link to a file as to when the file is attached to the email; be suspicious and never, ever open an EXE, COM, SCR, VB or ZIP file.

Below is a video produced by BleepingComputers that shows the Petya infection.

Anti-Virus software should protect you from this type of malware. Unfortunately, anti-virus won’t do anything if it doesn’t have the signature of the virus in its database. So make sure you keep your anti-virus up-to-date! And even with an up-to-date anti-virus, it won’t protect you on zero-day threats — that’s when the malware first arrives. So be smart and use our tips to stay safe.

Advantage Lunch

Dell has recently released their new, cutting edge Dell Data Protection | Endpoint Security Suite Enterprise; this software suite has an anti-virus that uses artificial intelligence rather than signatures to detect viruses. It has a 99% prevention rate, even on zero-day threats! It’s so good that a year-old version of the engine was able to catch mutated versions of popular ransomwares Cryptolocker, Wall and Pucky on zero-day. This is totally unheard of with traditional, signature-based anti-virus.

It’s brand new and very exciting. It’s so new and exciting that we’re bringing in a representative from Dell to demo it at our next Advantage Lunch. So, if you want to see a demo of this cutting edge software and get a free meal, sign-up for the April 20th Advantage Lunch and reserve your seat today!

Let's Talk About Your Ideas

Toll-Free: 866-497-8060
support@advantage.tech

Charleston, WV

950 Kanawha Blvd E. #100 / Charleston, WV 25301
V: 304-973-9537 | F: 304-720-1423

Bridgeport, WV

1509 Johnson Avenue / Bridgeport, WV 26330
V: 304-973-9550

Frederick, MD

8 East 2nd St. #201 / Frederick, MD 21701
V: 240-685-1255

"*" indicates required fields

Full Name*
This field is hidden when viewing the form
Send Now

Advantage Tech logo light

Since the early 2000's, Advantage Technology has been providing reliable managed IT services to organizations across a range of industry types. With multiple offices located in West Virginia and Maryland, we tailor our IT solutions to the unique needs and requirements of businesses throughout the Mid-Atlantic region.


Company

  • About
  • Areas Served
  • Blog
  • Careers
  • Case Studies
  • Contact
  • Events
  • Industries
  • News
  • Team
  • Request Consultation

Managed IT

  • Antivirus & Spam Filtering
  • Data Backup & Recovery
  • IT Help Desk
  • Maintenance & Support
  • Remote Monitoring & Management

Cybersecurity

  • Services & Solutions
  • Audits & Testing

IT Infrastructure

  • On-Premises
  • Cloud-Based
  • Phone & Telecom

IT Consulting

  • IT Staff Augmentation
  • GSA Capabilities & Schedule 70
  • Security Awareness Training
  • Technical Support
  • Virtual CIO
  • Virtual CISO

Link to company Facebook page

Link to company Instagram page

Link to company LinkedIn page

Link to company Twitter page

Link to company YouTube page

© Copyright 2025 | Powered by 321 Web Marketing

Popup Modal: Windows 10 EOL Announcement

Advantage Technology favicon

Windows 10 Support Is Ending

Microsoft will stop supporting Windows 10 soon, putting your systems at risk. Let Advantage Technology help you upgrade to a secure, efficient, and future-ready solution.

Learn More