Petya

What Is Petya/GoldenEye/NotPetya?

Petya is a ransomware variant that first appeared in 2016 and became known for its massive attacks in 2017 under different names such as GoldenEye or NotPetya. Unlike other ransomware, Petya does not only encrypt files, but renders the system unusable by encrypting the master boot record (MBR), thereby blocking access to the infected device hard disk.

Try Panda Dome for:Windows | Android | Mac | iOS

How Does Petya Work?

This malware spreads primarily through phishing emails containing infected attachments or through vulnerabilities in outdated operating systems, such as the infamous EternalBlue on Windows systems. After infecting a computer, Petya restarts the system, encrypts the MBR, and shows a ransom note demanding payment in cryptocurrencies to restore the machine to normal use.

Main Features

  • Encrypts the MBR, not only files.
  • Renders the system unusable.
  • Masquerades as a Windows update.
  • Uses network propagation mechanisms.

What Is NotPetya?

Although similar to Petya, NotPetya is even more destructive. This malware spread rapidly in 2017 through a compromised update of the M.E.Doc Ukrainian software. Rather than financial gain, NotPetya was designed mainly for data destruction, which made it a wiper rather than ransomware.

Types de malwares - Panda Security

How Can I Tell If My Device Is Infected?

Symptoms include: unexpected reboots, inability to access the operating system, ransom notes with messages in red demanding payment in Bitcoin. It is very important that you do not pay the ransom. Many variants such as NotPetya do not enable data recovery even if payment is made.

How to Protect Yourself from Petya

Your best defense is an advanced cybersecurity solution such as the Panda Dome product line, combined with good digital practices:

 

  • Keep your operating system and software always up to date.
  • Do not open attachments or links from unknown senders.
  • Use secure passwords and a password manager such as Panda Dome Passwords.
  • Back up your files regularly.
  • Protect your connection with Panda Dome VPN.

What Should You Do If You Are Already Infected?

1. Disconnect your device from the network or Internet to prevent the malware from spreading further.

 

2. Do not pay the ransom. It does not guarantee data recovery.

 

3. Use a safe boot disk to try to regain control of the system.

 

4. Contact Panda Security Support.

Petya FAQs
Does Petya Still Pose a Threat in 2025?

Yes, although the peak of its activity was in 2017. Many variants remain active and can take advantage of outdated systems. Stay updated on the latest cybersecurity trends and new threats on our Panda Security Media Center blog.

What Is the Difference Between a Common Ransomware Attack and NotPetya?

NotPetya’s aim is not to extort money, but cause permanent damage to systems.

Need help?

Call us 24 hours a day, 7 days a week, and get a free diagnosis.

Additional resources

Digital security is everyone's responsibility. With the right information and tools, you can reduce risks and use the Internet with peace of mind. Explore our guides and protect your online privacy.