{"id":2082,"date":"2017-06-27T17:19:03","date_gmt":"2017-06-27T17:19:03","guid":{"rendered":"https:\/\/live-infoblox-blog.pantheonsite.io\/?p=2082"},"modified":"2020-05-06T10:27:58","modified_gmt":"2020-05-06T17:27:58","slug":"notpetya-the-ransomware-that-spreads-like-a-worm","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/security\/notpetya-the-ransomware-that-spreads-like-a-worm\/","title":{"rendered":"NotPetya \u2013 The Ransomware that Spreads like a Worm"},"content":{"rendered":"<p><em>(Title and content updated upon further analysis)<\/em><\/p>\n<p>Barely after the dust has settled on\u00a0<a href=\"https:\/\/www.infoblox.com\/threat-center\/wannacry\/?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">WannaCry<\/a>, the ransomware that affected hundreds of thousands of computers in 150 countries in May, another ransomware attack,\u00a0<strong><em>Not<\/em><\/strong><strong><em>Petya<\/em><\/strong>, started infecting organizations across Europe and into the Americas on June 27, 2017. Initially, this attack was thought to be a variant of Petya ransomware because the attackers crafted the malware to resemble Petya. Upon further analysis, it was discovered that the main distribution and payment schemes were not consistent with prior Petya campaigns. Where prior Petya campaign operated an organized payment and decryption key distribution system accessed via the Tor network, this attack relied upon a single email account for coordinating ransom payments and decryption keys. That address was identified and deactivated early leading investigators to conclude it was unlikely attackers intended for it to remain operational through the duration of the campaign.<\/p>\n<p>NotPetya was disseminated via the compromised software update service from MeDoc, a distributor of tax accounting software mandated by the Ukrainian government. The malware spread to more than 12,000 systems in Europe and the Americas. This new variant started spreading across networks using Windows Management Instrumentation Command-line (WMIC) or the Microsoft Server Message Block (SMB) exploit known as\u00a0<strong>ETERNALBLUE<\/strong>. The SMB exploit is the same method used by WannaCry ransomware, and Microsoft had already released a patch for the vulnerability.<\/p>\n<p>Once NotPetya infects a system, it setups encryption routines and attempts to spread over the network. What\u2019s different about NotPetya is that it attempts to extract cached user credentials from the original infected machine and propagates using WMIC. The other difference between NotPetya and WannaCry is that while WannaCry used a killswitch domain, NotPetya doesn\u2019t. Encryption will happen irrespective of whether the infected system is in an isolated environment or connected to the Internet. Our open source intelligence analysis has led us to conclude that the campaign involved the following major actions:<\/p>\n<ol>\n<li>Implanting a trojan into software essential to the intended target<\/li>\n<li>Utilize a watering hole attack through a compromise of the software supply chain and distributing the trojan through the legitimate vendor\u2019s genuine software update service<\/li>\n<li>Enhance the malware to harvest credential and use capabilities inherent in the operating system to move lateral and spread the malware.<\/li>\n<\/ol>\n<p>The end result of ransomware is to lock up the files on infected machines and demand a ransom to retrieve the data, though the true goals of the NotPetya creators may have been disruption rather than monetary gain,\u00a0\u00a0 NotPetya\u2019s encryption process presents a fake chkdsk splash page, which encrypts the hard disk master boot record if a privileged user executes it. Then it schedules a task to restart the system once to prompt the ransom note. If it is unable to execute the payload as a privileged user, then it encrypts the file types annotated below and writes a README.TXT ransom note.<\/p>\n<p><strong>Best practices for staying protected against ransomware<\/strong><\/p>\n<p>Ransomware has been constantly in the news recently. A total of $1 billion was paid out to ransomware criminals in 2016 alone. 2017 has seen a 6000% increase in ransomware infected emails compared to 2016. Organizations should follow certain best practices to stay protected against ransomware and other advanced malware.<\/p>\n<ol>\n<li><strong>Backup<\/strong>: Always backup essential data and test the restore procedures.<\/li>\n<li><strong>Timely Patches:<\/strong>\u00a0Prioritize and apply security updates and patches. Since a known vulnerability in the Microsoft Server Message Block (SMB) was used in this attack, installing updates in the\u00a0<a href=\"https:\/\/technet.microsoft.com\/en-us\/library\/security\/ms17-mar.aspx\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Microsoft March 2017 Security Bulletin<\/a>\u00a0will resolve the weakness. It is recommended that SMB is disabled until the proper patches can be applied to the system. (<a href=\"https:\/\/support.microsoft.com\/en-us\/help\/2696547\/how-to-enable-and-disable-smbv1-smbv2-and-smbv3-in-windows-and-windows\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">How to Disable SMB)<\/a><\/li>\n<li><strong>Network Hygiene<\/strong>: Segment networks to limit the propagation of malware.<\/li>\n<li><strong>User Training:<\/strong>\u00a0Train your employees to<\/li>\n<\/ol>\n<ul>\n<li>Not open email attachments from unknown senders<\/li>\n<li>Disable Microsoft Office document macros by default<\/li>\n<li>Not allow documents to open additional files or execute macros without external confirmation (e.g. phone, in person) that the sender is valid. Further, confirm that they intentionally sent the document that requires the use of those features for a specific reason.<\/li>\n<\/ul>\n<ol start=\"5\">\n<li><strong>High quality curated threat intelligence feeds:\u00a0<\/strong>Using high quality curated threat intelligence that is up-to-date can protect users from unwanted DNS communications and maximize DNS protection. In addition, using RPZ based security capability integrated with DNS to detect and block communications to bad sites and command and control servers can help stop the spread of advanced malware and ransomware.<\/li>\n<\/ol>\n<p>To learn about other ransomware threats in the news, read this\u00a0<a href=\"https:\/\/community.infoblox.com\/t5\/Company-Blog\/WannaCry-and-Jaff-Two-Different-Ransomware-Attacks-with-A-Common\/ba-p\/9900\" target=\"_blank\" rel=\"noopener noreferrer\">blog<\/a>.<\/p>\n<p>To see how Infoblox can help disrupt the cyber kill chain, mitigate ransomware threats and stop DNS based data exfiltration, try\u00a0<a href=\"https:\/\/www.infoblox.com\/products\/activetrust\/?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">ActiveTrust<\/a>\u00ae\u00a0or\u00a0<a href=\"https:\/\/www.infoblox.com\/products\/activetrust-cloud\/?utm_source=blox-community&amp;utm_campaign=community-q2&amp;utm_medium=blox-community\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">ActiveTrust Cloud<\/a>\u00a0free for 30 days.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>(Title and content updated upon further analysis) Barely after the dust has settled on\u00a0WannaCry, the ransomware that affected hundreds of thousands of computers in 150 countries in May, another ransomware attack,\u00a0NotPetya, started infecting organizations across Europe and into the Americas on June 27, 2017. Initially, this attack was thought to be a variant of Petya [&hellip;]<\/p>\n","protected":false},"author":262,"featured_media":894,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[2],"tags":[15],"class_list":{"0":"post-2082","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-security","9":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>NotPetya \u2013 The Ransomware that Spreads like a Worm<\/title>\n<meta name=\"description\" content=\"Barely after the dust has settled on WannaCry, the ransomware that affected hundreds of thousands of computers in 150 countries in May, another ransomware attack, NotPetya, started infecting organizations across Europe and into the Americas on June 27, 2017.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/security\/notpetya-the-ransomware-that-spreads-like-a-worm\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NotPetya \u2013 The Ransomware that Spreads like a Worm\" \/>\n<meta property=\"og:description\" content=\"Barely after the dust has settled on WannaCry, the ransomware that affected hundreds of thousands of computers in 150 countries in May, another ransomware attack, NotPetya, started infecting organizations across Europe and into the Americas on June 27, 2017.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/security\/notpetya-the-ransomware-that-spreads-like-a-worm\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-06-27T17:19:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-06T17:27:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/threatindexblog.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"660\" \/>\n\t<meta property=\"og:image:height\" content=\"454\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sean Tierney\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sean Tierney\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/notpetya-the-ransomware-that-spreads-like-a-worm\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/notpetya-the-ransomware-that-spreads-like-a-worm\\\/\"},\"author\":{\"name\":\"Sean Tierney\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/55f054bbb353d75a5e0efe8dc92b284e\"},\"headline\":\"NotPetya \u2013 The Ransomware that Spreads like a Worm\",\"datePublished\":\"2017-06-27T17:19:03+00:00\",\"dateModified\":\"2020-05-06T17:27:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/notpetya-the-ransomware-that-spreads-like-a-worm\\\/\"},\"wordCount\":778,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/notpetya-the-ransomware-that-spreads-like-a-worm\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/threatindexblog.jpg\",\"keywords\":[\"Security\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/notpetya-the-ransomware-that-spreads-like-a-worm\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/notpetya-the-ransomware-that-spreads-like-a-worm\\\/\",\"name\":\"NotPetya \u2013 The Ransomware that Spreads like a Worm\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/notpetya-the-ransomware-that-spreads-like-a-worm\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/notpetya-the-ransomware-that-spreads-like-a-worm\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/threatindexblog.jpg\",\"datePublished\":\"2017-06-27T17:19:03+00:00\",\"dateModified\":\"2020-05-06T17:27:58+00:00\",\"description\":\"Barely after the dust has settled on WannaCry, the ransomware that affected hundreds of thousands of computers in 150 countries in May, another ransomware attack, NotPetya, started infecting organizations across Europe and into the Americas on June 27, 2017.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/notpetya-the-ransomware-that-spreads-like-a-worm\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/notpetya-the-ransomware-that-spreads-like-a-worm\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/notpetya-the-ransomware-that-spreads-like-a-worm\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/threatindexblog.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/threatindexblog.jpg\",\"width\":660,\"height\":454,\"caption\":\"IPv6 and Internet Privacy\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/security\\\/notpetya-the-ransomware-that-spreads-like-a-worm\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"NotPetya \u2013 The Ransomware that Spreads like a Worm\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/55f054bbb353d75a5e0efe8dc92b284e\",\"name\":\"Sean Tierney\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5f656f4e9ebbb35daf8795f52e58e883b048ddb46dac9687d6755cfc37fa34ab?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5f656f4e9ebbb35daf8795f52e58e883b048ddb46dac9687d6755cfc37fa34ab?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5f656f4e9ebbb35daf8795f52e58e883b048ddb46dac9687d6755cfc37fa34ab?s=96&d=blank&r=g\",\"caption\":\"Sean Tierney\"},\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/sean-tierney\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"NotPetya \u2013 The Ransomware that Spreads like a Worm","description":"Barely after the dust has settled on WannaCry, the ransomware that affected hundreds of thousands of computers in 150 countries in May, another ransomware attack, NotPetya, started infecting organizations across Europe and into the Americas on June 27, 2017.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/security\/notpetya-the-ransomware-that-spreads-like-a-worm\/","og_locale":"en_US","og_type":"article","og_title":"NotPetya \u2013 The Ransomware that Spreads like a Worm","og_description":"Barely after the dust has settled on WannaCry, the ransomware that affected hundreds of thousands of computers in 150 countries in May, another ransomware attack, NotPetya, started infecting organizations across Europe and into the Americas on June 27, 2017.","og_url":"https:\/\/www.infoblox.com\/blog\/security\/notpetya-the-ransomware-that-spreads-like-a-worm\/","og_site_name":"Infoblox Blog","article_published_time":"2017-06-27T17:19:03+00:00","article_modified_time":"2020-05-06T17:27:58+00:00","og_image":[{"width":660,"height":454,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/threatindexblog.jpg","type":"image\/jpeg"}],"author":"Sean Tierney","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Sean Tierney","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/security\/notpetya-the-ransomware-that-spreads-like-a-worm\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/notpetya-the-ransomware-that-spreads-like-a-worm\/"},"author":{"name":"Sean Tierney","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/55f054bbb353d75a5e0efe8dc92b284e"},"headline":"NotPetya \u2013 The Ransomware that Spreads like a Worm","datePublished":"2017-06-27T17:19:03+00:00","dateModified":"2020-05-06T17:27:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/notpetya-the-ransomware-that-spreads-like-a-worm\/"},"wordCount":778,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/notpetya-the-ransomware-that-spreads-like-a-worm\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/threatindexblog.jpg","keywords":["Security"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/security\/notpetya-the-ransomware-that-spreads-like-a-worm\/","url":"https:\/\/www.infoblox.com\/blog\/security\/notpetya-the-ransomware-that-spreads-like-a-worm\/","name":"NotPetya \u2013 The Ransomware that Spreads like a Worm","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/notpetya-the-ransomware-that-spreads-like-a-worm\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/notpetya-the-ransomware-that-spreads-like-a-worm\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/threatindexblog.jpg","datePublished":"2017-06-27T17:19:03+00:00","dateModified":"2020-05-06T17:27:58+00:00","description":"Barely after the dust has settled on WannaCry, the ransomware that affected hundreds of thousands of computers in 150 countries in May, another ransomware attack, NotPetya, started infecting organizations across Europe and into the Americas on June 27, 2017.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/security\/notpetya-the-ransomware-that-spreads-like-a-worm\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/security\/notpetya-the-ransomware-that-spreads-like-a-worm\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/security\/notpetya-the-ransomware-that-spreads-like-a-worm\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/threatindexblog.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/threatindexblog.jpg","width":660,"height":454,"caption":"IPv6 and Internet Privacy"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/security\/notpetya-the-ransomware-that-spreads-like-a-worm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.infoblox.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"NotPetya \u2013 The Ransomware that Spreads like a Worm"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/55f054bbb353d75a5e0efe8dc92b284e","name":"Sean Tierney","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/5f656f4e9ebbb35daf8795f52e58e883b048ddb46dac9687d6755cfc37fa34ab?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/5f656f4e9ebbb35daf8795f52e58e883b048ddb46dac9687d6755cfc37fa34ab?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5f656f4e9ebbb35daf8795f52e58e883b048ddb46dac9687d6755cfc37fa34ab?s=96&d=blank&r=g","caption":"Sean Tierney"},"url":"https:\/\/www.infoblox.com\/blog\/author\/sean-tierney\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2082","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/262"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=2082"}],"version-history":[{"count":1,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2082\/revisions"}],"predecessor-version":[{"id":2086,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/2082\/revisions\/2086"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/894"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=2082"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=2082"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=2082"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}