What Petya/NotPetya Ransomware Is and What Its Remidiations Are

  • Sharifah Yaqoub A. Fayi
Conference paper
Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 738)


Ransomware attacks have been growing worldwide since they appeared around 2012. The idea of ransomware attacks is, encrypting and locking the files on a computer until the ransom is paid. These attacks usually enter the system by using Trojans, which has malicious programs that run a payload that encrypts and locks the files. The basic goal of this type of attack is getting money, so hackers usually unlock the files when they receive the money, but really there is no guarantee of that. Ransomware attacks have various versions such as Reveton, CryptoWall, WannaCry, and Petya. The Petya attack is the attack that this paper discusses, especially the most recent version of it, which is referred as NotPetya. This paper defines the NotPetya attack, explains how it works, and where and how it spreads. Also, this paper discusses four solutions available to recover after a system infected by the NotPetya attack and propose the best solution depending on intense research about the recovering solutions of this attack.


NotPetya recovering NotPetya ransomware NotPetya ransomware removing NotPetya ransomware solutions NotPetya ransomware prevention 


  1. 1.
    Alert (TA17-181A) Petya Ransomware, US-CERT (2017). [Online]. Accessed 7 Nov 2017
  2. 2.
    O. Solon, A. Hern, Petya’ ransomware attack: what is it and how can it be stopped?, The Guardian (2017) [Online]. Accessed 7 Nov 2017
  3. 3.
    Q. Yeh, A.J. Chang, Threats and countermeasures for information system security: a cross-industry study. Inf. Manag. 44, 480–491 (2007)CrossRefGoogle Scholar
  4. 4.
    P. Bedwell, A deep dive into the NotPetya ransomware attack, Lastline (2017) [Online]. Accessed 7 Nov 2017
  5. 5.
    L. Abrams, Petya Ransomware skips the Files and Encrypts your Hard Drive Instead, BleepingComputer (2016). [Online]. Accessed 7 Nov 2017
  6. 6.
    A. Kharpal, ‘Petya’ ransomware: All you need to know about the cyberattack and how to tell if you’re at risk, CNBC (2017). [Online]. Accessed 7 Nov 2017
  7. 7.
    T. Fox-Brewster, 3 Things You Can Do To Stop ‘NotPetya’ Ransomware Wrecking Your PC, Forbes (2017). [Online]. Accessed 7 Nov 2017
  8. 8.
    I. Thomson in San Francisco 2017 at 03:19 tweet_btn(), Everything you need to know about the Petya, er, NotPetya nasty trashing PCs worldwide, The Register®—Biting the hand that feeds IT (2017). [Online]. Accessed 8 Nov 2017.
  9. 9.
    Symantec Security Response, Petya ransomware outbreak: Here’s what you need to know, Symantec (2017). [Online]. Accessed 8 Nov 2017
  10. 10.
    S. Eschweiler, Decrypting NotPetya/Petya: Tools for recovering your MFT after an attack, CrowdStrike (2017). [Online]. Accessed 7 Nov 2017
  11. 11.
    J. Splinters, NotPetya ransomware virus. How to remove? (Uninstall guide), 2-spyware (2017). [Online].! Accessed 7 Nov 2017
  12. 12.
    Patrik, Petya.A/NotPetya virus removal——How to protect computer, My AntiSpyware (2017). [Online]. Accessed 7 Nov 2017
  13. 13.
    CASPAR, Guide to remove NotPetya ransomware permanently, Viruses Removal Pro (2017). [Online]. Accessed 7 Nov 2017]
  14. 14.
    P. Paganini, Ransomware: How to recover your encrypted files, the last guide, Security Affairs (2016). [Online]. Accessed 7 Nov 2017

Copyright information

© Springer International Publishing AG, part of Springer Nature 2018

Authors and Affiliations

  • Sharifah Yaqoub A. Fayi
    • 1
  1. 1.Department of Computer and Information SystemsRobert Morris UniversityMoon TownshipUSA

Personalised recommendations