Listen to “Episode #54: NotPetya of the DarkNet Diaries podcast which can be found at https://darknetdiaries.com/episode/54/Links to an external site.
Based on the podcast, answer the following questions.
Listen to “Episode #54: NotPetya of the DarkNet Diaries podcast which can be found at https://darknetdiaries.com/episode/54/
Based on the podcast, answer the following questions.
- What tools did the hackers use in this podcast?
Mimikatz was one of the tools the hackers used in the podcast. Mimikatz is able to extract usernames and passwords that are on Windows computers. The person also made Mimikatz update the tool to authenticate the laptop by passing through hashes and tokens. Mimikatz also allows hackers to be able to see every person’s username and password who have logged into the computer. The other tool that was used was called Eternal Blue, which is able to run code remotely run code on any vulnerable Windows computer.
- We know Ukraine was the target, but what was the goal of this Cyberattack?
The goal of the cyberattack was to destroy as many computers as possible. The hackers were able to achieve this goal by encrypting everything on the computer and no one could reaccess the computer unless they had the decryption key. The hackers also used ransomware called NotPetya which essentially rebooted and encrypted computers and it spread to all computers in the network making the computers useless.
- What events happened on Tuesday, June 27th, 2017?
NotPetya virus was put on the Medoc’s update server and it was sent to multiple computers in Ukraine. Once the computers received the update it was infected and it started spreading to multiple computers by getting the username and passwords of the computers. The virus also rebooted and encrypted the computer making it useless and multiple organizations in Ukraine had their networks down to the virus.
- What Companies were affected by this NotPetya Attack?
Several major companies were affected by the NotPetya attack, such as Maersk, Merck, FedEx, and many more.