which app and content code Petya ransomeware attack is mitigated

cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
Announcements
Please sign in to see details of an important advisory in our Customer Advisories area.

which app and content code Petya ransomeware attack is mitigated

L2 Linker

want to know in which app and content release "Petya ransomware" attack is mitigated/protected. What code I should update it on to get the protection from this attack. 

 

As os now, we are on 698-4026 app and content code. Please suggest.

3 REPLIES 3

L0 Member

If you search Petya in the Threat Vault at https://threatvault.paloaltonetworks.com/ you will find the specific content release for Pre or Post 7.1.

Hi @vsingh

The below Palo Alto article gives you lots of good information on how to mitigate this threat.

 

Also, make sure that your firewall has the following Vulnerability Protection signature enabled and applied to your security rules to prevent exploitation by the EternalBlue exploit.

https://researchcenter.paloaltonetworks.com/2017/06/palo-alto-networks-protections-petya-ransomware/CVE-2017-0144.PNG

 

 As for checking the AV signatures (Hashes) for this malware, as @Michael_Zook mentioned, go to  https://threatvault.paloaltonetworks.com and type the name Petya in the search box, and it will list all contents for you.

 

I hope this helps

by using which app &content or antivirus code bad rabbit ransomeware attack is mitigated.

  • 6771 Views
  • 3 replies
  • 0 Likes
Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the LIVEcommunity as a whole!

The LIVEcommunity thanks you for your participation!