which app and content code Petya ransomeware attack is mitigated

L1 Bithead

which app and content code Petya ransomeware attack is mitigated

want to know in which app and content release "Petya ransomware" attack is mitigated/protected. What code I should update it on to get the protection from this attack. 

 

As os now, we are on 698-4026 app and content code. Please suggest.

Highlighted
L0 Member

Re: which app and content code Petya ransomeware attack is mitigated

If you search Petya in the Threat Vault at https://threatvault.paloaltonetworks.com/ you will find the specific content release for Pre or Post 7.1.

L4 Transporter

Re: which app and content code Petya ransomeware attack is mitigated

Hi @vsingh

The below Palo Alto article gives you lots of good information on how to mitigate this threat.

 

Also, make sure that your firewall has the following Vulnerability Protection signature enabled and applied to your security rules to prevent exploitation by the EternalBlue exploit.

https://researchcenter.paloaltonetworks.com/2017/06/palo-alto-networks-protections-petya-ransomware/CVE-2017-0144.PNG

 

 As for checking the AV signatures (Hashes) for this malware, as @Michael_Zook mentioned, go to  https://threatvault.paloaltonetworks.com and type the name Petya in the search box, and it will list all contents for you.

 

I hope this helps

L1 Bithead

Re: by which app &content or antivirus code bad rabbit ransomeware attack is mitigated

by using which app &content or antivirus code bad rabbit ransomeware attack is mitigated.

Like what you see?

Show your appreciation!

Click Like if a post is helpful to you or if you just want to show your support.

Click Accept as Solution to acknowledge that the answer to your question has been provided.

The button appears next to the replies on topics you’ve started. The member who gave the solution and all future visitors to this topic will appreciate it!

These simple actions take just seconds of your time, but go a long way in showing appreciation for community members and the Live Community as a whole!

The Live Community thanks you for your participation!