← Back to Blog
Cyberwarfare

NotPetya: The Most Devastating Cyberattack in History

June 2017β€’11 min read
NotPetya Cyberattack Concept

What Happened

On **June 27, 2017**, a cyberattack disguised as ransomware spread across the globe with unprecedented speed and destruction. **NotPetya** (also called ExPetr or Petya) caused **over $10 billion in damages**, making it **the most costly cyberattack in history**.

πŸ’£ Unlike typical ransomware, NotPetya was designed to **destroy data permanently**β€”a cyberweapon, not a money-making scheme.

How It Started

NotPetya began with a **supply chain attack** targeting Ukraine:

  1. Software Update Hijacked: Attackers compromised M.E.Doc, popular Ukrainian accounting software
  2. Trojan Delivered: A malicious update was pushed to 400,000 users
  3. Initial Infection: Companies in Ukraine were infected first
  4. Global Spread: The malware spread beyond Ukraine within hours
  5. Mass Destruction: Data was encrypted and rendered permanently unrecoverable

The Terrifying Speed

NotPetya spread **faster than WannaCry**, using multiple propagation methods:

  • πŸ”₯ **EternalBlue exploit** (the same SMB vulnerability used by WannaCry)
  • πŸ”‘ **Credential theft** using Mimikatz to steal passwords
  • ⚑ **Lateral movement** across networks using legitimate admin tools
  • πŸ“‘ **No internet required** once inside a network

Within **two hours**, NotPetya had infected organizations on **six continents**.

The Devastating Impact

NotPetya didn't just encrypt dataβ€”it **destroyed it**. Major companies worldwide were crippled:

🚒 Maersk (Global Shipping Giant)

  • πŸ’° **$300+ million in losses**
  • πŸ“¦ All 130 offices went offline simultaneously
  • ⛴️ Ships stuck in ports unable to unload cargo
  • πŸ’» Had to reinstall 4,000 servers and 45,000 PCs
  • πŸ“… **10 days** before partial recovery

🍫 Mondelez International (Cadbury, Oreo)

  • πŸ’° **$100+ million in losses**
  • 🏭 Production facilities shut down globally
  • πŸ’Ύ 1,700 servers destroyed
  • πŸ’» 24,000 laptops wiped

πŸ’Š Merck (Pharmaceutical Company)

  • πŸ’° **$870 million in losses**
  • πŸ’‰ Vaccine production disrupted
  • πŸ₯ Drug shortages in hospitals
  • πŸ“Š Financial systems paralyzed

πŸš› FedEx/TNT Express

  • πŸ’° **$400 million in losses**
  • πŸ“¦ Package tracking systems offline
  • 🌐 Had to rebuild entire IT infrastructure

Other Major Victims

  • πŸ”‹ **Rosneft** (Russian oil company)
  • ⚑ **Ukraine's power grid**
  • 🏦 **Multiple Ukrainian banks**
  • πŸ₯ **UK's National Health Service** (some hospitals)
  • πŸ“Ί **Heritage Valley Health System** (US hospitals)

Why It Was So Destructive

1. Not Really Ransomware

NotPetya **looked like ransomware** but was actually a **wiper** (destructive malware). Even if victims paid the ransom:

  • ❌ The decryption was **permanently broken by design**
  • ❌ The email for "recovery" was **shut down within hours**
  • ❌ Data was **impossible to recover**

2. State-Sponsored Attack

The US, UK, and other governments attributed NotPetya to **Russian military intelligence (GRU)**. It was:

  • 🎯 **Targeted at Ukraine** during ongoing conflict
  • πŸ’₯ **Collateral damage** affected global companies
  • βš”οΈ **Act of cyberwarfare**, not cybercrime

3. Exploited Trusted Software

By compromising **M.E.Doc accounting software**, attackers exploited **trust relationships**. Companies trusted the software and didn't suspect the update.

Critical Security Lessons

1. Patch Your Systems Immediately

NotPetya used **EternalBlue**, the same vulnerability as WannaCry (just one month earlier). Microsoft had released a patch **months before**, but many organizations hadn't applied it.

⚠️ **Lesson:** Patch known vulnerabilities immediately, especially those actively exploited.

2. Supply Chain Security Matters

The attack came through a **trusted software update**. Companies need to:

  • βœ… Vet all third-party software
  • βœ… Monitor software updates for anomalies
  • βœ… Use software signing verification
  • βœ… Limit vendor access to networks

3. Network Segmentation Saves You

Once inside, NotPetya spread **laterally** across networks. **Network segmentation** could have limited damage by:

  • βœ… Isolating critical systems
  • βœ… Preventing spread between departments
  • βœ… Containing the infection

4. Offline Backups Are Essential

Companies with **offline, immutable backups** recovered faster. NotPetya destroyed:

  • ❌ Online backups (encrypted)
  • ❌ Network-attached storage (encrypted)
  • βœ… Offline/air-gapped backups (survived)

5. Geopolitical Risk is Real

Even if you're not in a conflict zone, **state-sponsored attacks can affect you as collateral damage**. Global companies must prepare for cyberwarfare spillover.

How to Protect Your Business

Apply these lessons to your own security:

πŸ”„ Keep Systems Patched

  • βœ… Apply security updates within **48 hours**
  • βœ… Prioritize patches for known exploited vulnerabilities
  • βœ… Use automated patch management tools
  • βœ… Don't delay "because it might break something"

πŸ’Ύ Maintain Offline Backups

  • βœ… **3-2-1 backup rule**: 3 copies, 2 media types, 1 offsite
  • βœ… Keep at least one backup **completely offline**
  • βœ… Test backup restoration regularly
  • βœ… Use immutable storage (write-once, read-many)

🏒 Segment Your Network

  • βœ… Separate critical systems from general network
  • βœ… Limit lateral movement capabilities
  • βœ… Use VLANs and firewalls between segments
  • βœ… Restrict admin credentials per segment

πŸ” Monitor Supply Chain

  • βœ… Audit all third-party software
  • βœ… Monitor software update integrity
  • βœ… Limit vendor network access
  • βœ… Use software composition analysis tools

The Bottom Line

NotPetya showed that **cyberattacks can have physical-world consequences** on a global scale. The $10 billion in damages made it **the costliest cyberattack in history**, affecting everything from vaccine production to global shipping.

For businesses: **basic security hygiene** (patching, backups, segmentation) could have prevented most of the damage. Don't wait for a catastrophic attack to get serious about security.

πŸ›‘οΈ Protect Your Business Today

Don't let your business become collateral damage. Get a free security scan to identify vulnerabilities before they're exploited.

Start Free Scan