Petya Ransomware Update: A Message from TSA

Transportation Systems Sector Colleagues –
 
You are probably well aware that there is an ongoing ransomware attack that is being reported to have impacted critical infrastructure, including transportation system owners and operators, in the U.S. and around the globe. In an effort to transmit reliable and timely information, we wanted to direct your attention to the information being distributed by the U.S.-CERT.  U.S.-CERT will be publishing additional information, indicators, and mitigation measures as they become available.  The information can be found online.
 
Original release date: June 27, 2017
US-CERT has received multiple reports of Petya ransomware infections occurring in networks in many countries around the world. Ransomware is a type of malicious software that infects a computer and restricts users' access to the infected machine until a ransom is paid to unlock it. Individuals and organizations are discouraged from paying the ransom, as this does not guarantee that access will be restored. Using unpatched and unsupported software may increase the risk of proliferation of cybersecurity threats, such as ransomware.
 
Petya ransomware encrypts the master boot records of infected Windows computers, making affected machines unusable. Open-source reports indicate that the ransomware exploits vulnerabilities in Server Message Block. US-CERT encourages users and administrators to review the US-CERT article on the Microsoft SMBv1 Vulnerability and the Microsoft Security Bulletin MS17-010 (link is external). For general advice on how to best protect against ransomware infections, review US-CERT Alert TA16-091A. Please report any ransomware incidents to the Internet Crime Complaint Center (IC3).