GoldenEye/Petya Ransomware slams worldwide users
GoldenEye encrypts the entire hard disk drive and denies the user access to the computer. There is also no workaround to help victims retrieve the decryption keys from the computer. After the encryption process is complete, the ransomware has a specialised routine that forcefully crashes the computer to trigger a reboot that renders the computer unusable until the $300 ransom is paid.
"If you invested in the world leading product, Bitdefender," says Jorina van Rensburg, Managing Director of CONDYN, "you would not have been in danger this morning as you would have been protected. Bitdefender blocks the currently known samples of the new Goldeneye variant." It is time that companies and government organisations alike start realising no one is immune against ransomware attacks.
Bitdefender Endpoint Security HD protects enterprises against the full spectrum of sophisticated cyber threats with speed, accuracy, low administrative overhead and minimal system impact. The next-gen solution eliminates the need to run multiple endpoint security solutions on one machine, combining preventive controls, multi-stage non-signature detection techniques, and automatic response in a single platform.
Endpoint Security HD prevents unknown threats and detects targeted attacks that evade other endpoint security solutions, using advanced machine learning, behavioural analysis and an array of other non-signature-based technologies. Once a threat is detected, Endpoint Security HD takes immediate actions, including rolling back malicious changes to keep your business running normally.
Why invest in Bitdefender today?
Detect and prevent the full range of sophisticated threats and unknown malware Gravity Zone Security HD defeats advanced threats and unknown malware, including ransomware, that evade traditional endpoint protection solutions. Advanced attacks such as PowerShell, script-based, file-less attacks and sophisticated malware can be detected and blocked before execution. Blocks exploit based attacks.
High-profile attacks often start with exploits to execute code on target systems. Bitdefender anti-exploit technology focuses on attack tools and techniques to detect and block advanced attacks that exploit zero-day and unpatched vulnerabilities, such as ROP (return oriented programming), Shellcode and virtual pointer. It also prevents browser exploits. Enhance accuracy without false positives in the adaptive layered architecture, anti-exploit, machine learning, behavioural analysis and cloud-based Sandbox work together to achieve a higher detection rate with accuracy, eliminating disruption caused by false-positives.
Automatic and immediate action (Automate threat remediation and response) Once a threat is detected, the endpoint security HD instantly neutralises it through actions including process termination, quarantine, removal and roll-back of malicious changes. It shares threat information in real time with Global Protective Network, Bitdefender's cloud-based threat intelligence service, preventing similar attacks anywhere in the world. Gain threat context and visibility Bitdefender Endpoint Security HD's unique capability to identify and report on suspicious activities gives admins early warning of malicious behaviour such as dubious operating system requests, evasive actions and connections to command and control centres. Boost operational efficiency with single agent and integrated console Bitdefender's single, integrated endpoint security agent eliminates agent fatigue. The modular design offers maximum flexibility and lets administrators set security policies. GravityZone automatically customises the installation package and minimises the agent footprint. Architected from the ground up post-virtualisation and post-cloud security architectures, GravityZone provides a unified security management platform to protect physical, virtualised and cloud environment.
Don't get caught, contact email@example.com today to assist you through its partner network preventing your organisation from becoming another victim of ransomware.