Home Blog Archive Internet Ransomware Petya: how to protect yourself from the Trojan

Ransomware Petya: how to protect yourself from the Trojan

  • Sep 29, 2025
  • 347
  • 0

The Ransomware Petya is shutting down the currently, thousands of companies and authorities around the world. In front of the Trojan, you can protect yourself but and hence the ransom note, as well as a loss of data to be missed. We explain in this practical tip, which is behind Petya, how you can protect yourself and, in the case of a hacker attack to respond.

Ransomware Petya: hack wave of gigantic proportions

  • The new Ransomware-wave Petya has already after a short period of time severe damage behind. The hackers are going, clearly organized before than, for example, in the case of WannaCry. They were able to infect, among other things, the nuclear power plant in Chernobyl and the Ukrainian Central Bank with the Trojans.
  • Especially in the Ukraine, countless companies and authorities are concerned. There Petya uses a gap in the accounting software, which is prescribed by the Ukrainian government. Thus, the number of potentially vulnerable businesses in the Ukraine is huge. In Germany and other countries in the Trojan searches for other vulnerabilities. So far are already more than 60 countries affected.
  • The claim of the Trojan on the screen of the victim is similar to that of WannaCry: The victims are expected to pay US $ 300 in Bitcoins. What is new is that you will take by E-Mail with the Blackmailers contact.
  • This has its pitfalls, because the E-mail address comes from the Berlin-based mailbox provider Posteo. Has now locked, of course, the E-mail account immediately, so that victims can't establish contact with the Extortionists. The police advises, in principle, to pay the ransom.
  • About the current status, we will inform you always up to date on this page.
Petya Trojan / Image: Bitdefender

Petya: how to protect yourself

  • Security researchers have discovered a way to stop Petya and to protect against Petya. Accordingly, Petya addiction during the encryption of the data for a specific file. Petya finds the file, it breaks the encryption.
  • This approach is one of the Exit strategies, which will consider hacking the programming of the Malware. It is used to protect your own Computer against a Malware infection and the Malware stop.
  • This you can use: Download the file from the CHIP download portal, download and then run it as Administrator.
  • Now, if the Trojan tries to infect your Computer and encrypt files, it finds the file and is stopped thereby.
  • Quick help: If you just Petya are affected, please follow us to the emergency Hacks for Ransomeware.
Protection against Petya

YOU MAY ALSO LIKE

0 COMMENTS

LEAVE A COMMENT

Human?
1 + 3 =