NATO wants to respond to the Petya Ransomware Attack

“As major government operations have been targeted,  in fact, the operation is assigned to a state this could include as a violation of sovereignty,” wrote Tomáš Minárik, a researcher at the CCD COE law office, in the release. “Consequently, this could be an internationally wrongful act, which might provide the targeted nations several options to return with countermeasures.”

The bill puts the CCD COE, a NATO-sponsored cybersecurity research center based near Estonia, in understanding with researchers opening over the details of the attack. The Petya virus was apparently aimed at central Ukrainian organizations instead of a broad array of Ransom targets, and Ukraine bore the brunt of the attack. That fact, near with the basic errors that make ransom seem like a weak reason for a campaign of this order and complexity, makes it looks like cyber criminals implied not the culprits.

“The development was not too complex, but still complicated and high enough to have been equipped and executed by unaffiliated hackers for the sake of habit,” the Centre wrote in the release. “Cyber crooks are not behind this unless, as the method for getting the ransom was so poorly planned that the ransom would apparently not even cover the cost of the operation.”

It’s possible Russia advocated the campaign, given its history of military and cyber attacks in Ukraine, though there’s no actual evidence proving the Russian government’s involvement.

Take your time to comment on this article.

Related posts

Apple Addressed Two Zero-Day Flaws In Intel-based Macs

Really Simple Security Plugin Flaw Risks 4+ Million WordPress Websites

Glove Stealer Emerges A New Malware Threat For Browsers