{"id":2108,"date":"2026-03-31T12:00:00","date_gmt":"2026-03-31T12:00:00","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/locky\/?p=2108"},"modified":"2026-02-20T02:59:15","modified_gmt":"2026-02-20T02:59:15","slug":"darknet-diaries-notpetya-attack-2","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/locky\/2026\/03\/31\/darknet-diaries-notpetya-attack-2\/","title":{"rendered":"Darknet Diaries: NotPetya Attack"},"content":{"rendered":"\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/05\/CYSE-280-HW2-DN-Podcast-54-ODUwebsite.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"both\" data-toolbar-fixed=\"on\">CYSE-280-HW2-DN-Podcast-54-ODUwebsite<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<ul class=\"wp-block-social-links has-normal-icon-size has-visible-labels has-icon-color has-icon-background-color is-style-default is-horizontal is-content-justification-center is-layout-flex wp-container-core-social-links-layout-1 wp-block-social-links-is-layout-flex\"><li style=\"color: #ffffff; background-color: #cf2e2e; \" class=\"wp-social-link wp-social-link-chain has-white-color wp-block-social-link\"><a rel=\"https:\/\/www.credly.com\/users\/carl-lochstampfor-jr noopener nofollow\" target=\"_blank\" href=\"http:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/05\/CYSE-280-HW2-DN-Podcast-54-ODUwebsite.pdf\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M15.6,7.2H14v1.5h1.6c2,0,3.7,1.7,3.7,3.7s-1.7,3.7-3.7,3.7H14v1.5h1.6c2.8,0,5.2-2.3,5.2-5.2,0-2.9-2.3-5.2-5.2-5.2zM4.7,12.4c0-2,1.7-3.7,3.7-3.7H10V7.2H8.4c-2.9,0-5.2,2.3-5.2,5.2,0,2.9,2.3,5.2,5.2,5.2H10v-1.5H8.4c-2,0-3.7-1.7-3.7-3.7zm4.6.9h5.3v-1.5H9.3v1.5z\"><\/path><\/svg><span class=\"wp-block-social-link-label\">Full Screen or Download<\/span><\/a><\/li><\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n","protected":false},"excerpt":{"rendered":"<p>This article analyzes the NotPetya cyberattack as discussed in Darknet Diaries Episode 54. It examines the tools used\u2014Mimikatz, EternalBlue, and worm-based ransomware\u2014the strategic targeting of Ukraine, and the unintended global spread that disrupted multinational companies and critical infrastructure worldwide.<\/p>\n","protected":false},"author":30379,"featured_media":2109,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"image","meta":{"advanced_seo_description":"This article analyzes the NotPetya cyberattack as discussed in Darknet Diaries Episode 54. It examines the tools used\u2014Mimikatz, EternalBlue, and worm-based ransomware\u2014the strategic targeting of Ukraine, and the unintended global spread that disrupted multinational companies and critical infrastructure worldwide.","jetpack_seo_html_title":"NotPetya Attack: Tools, Impact, and Global Fallout","jetpack_seo_noindex":false,"footnotes":"","wds_primary_category":50,"jetpack_publicize_message":"NotPetya wasn\u2019t just ransomware\u2014it was cyber warfare \ud83c\udf0d\ud83d\udd10. A breakdown of Mimikatz, EternalBlue, and how a targeted attack on Ukraine caused billions in global damage.\n#Cybersecurity #NotPetya #ThreatAnalysis","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[200,196,50,197,195,198,199],"tags":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2026\/02\/Not_Petya_attack.jpg?fit=784%2C1168&ssl=1","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/posts\/2108"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/users\/30379"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/comments?post=2108"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/posts\/2108\/revisions"}],"predecessor-version":[{"id":2110,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/posts\/2108\/revisions\/2110"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/media\/2109"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/media?parent=2108"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/categories?post=2108"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/tags?post=2108"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}