Key lessons from ‘Petya’ ransomware attack

As per the article published in computerweekly, despite paying the demanded money, the Petya attacked systems & data could not be recovered; could not even be decrypted. It is pretty annoying that most of the attacks are happening on Windows machines & the victimized can not be recovered. While it is easier to suggest an upgrade, what do we do with the ATMs (most of them on run obsolete windows versions) & several other small vendors who do not license their OS & make them secure. May be now on-wards there should be an API exposed to end users on what kind of OS their digital transactions are happening, before they actually initiate any transaction or as soon as they log in. There is a strong need to look at these hazardous ransomware attacks & disable them as soon as they are infected if not can be predicted. Also the users should understand - if upgrading license cost is looking higher, the loss due to these attacks is much higher & it is a bigger loss.


To view or add a comment, sign in

More articles by Anupama Itikirala

Insights from the community

Others also viewed

Explore topics