NotPetya (2017): The Malware That Pretended to Be a Ransom Attack… Then Destroyed Everything

It began in Ukraine — inside a widely used tax accounting software called M.E.Doc. Attackers compromised the update server and delivered a poisoned software patch to businesses across the country.

The Story

If WannaCry was chaos, NotPetya was calculated brutality.

It began in Ukraine — inside a widely used tax accounting software called M.E.Doc. Attackers compromised the update server and delivered a poisoned software patch to businesses across the country.

But NotPetya didn’t care about ransoms.
It wasn’t here for money.

It was built to destroy.

Once activated, it spread using EternalBlue (yes, again) and lateral movement techniques so effective they felt almost unfair — like watching a cheetah race a herd of drunk donkeys.

It overwrote the MBR (master boot record), destroyed file tables, scrambled data, then pretended to demand a ransom. But even if someone paid, the malware had no mechanism to restore files.

It was ransomware without the ransom.
A hostage-taker who shot the hostages immediately.

The attack spiraled beyond Ukraine:

  • Maersk shipping
  • Merck pharmaceuticals
  • FedEx TNT
  • Rosneft
  • Global logistics networks

The damage was staggering — over $10 billion in global impact.

At Maersk, the malware shut down ports worldwide. Ships were stuck at sea, containers stacked like frozen Tetris pieces. Employees had to rebuild their entire Active Directory from the only surviving domain controller — found by accident in a remote office in Ghana that happened to be offline during the attack.

Aftermath

  • Widely attributed to Russian GRU
  • Considered the most costly cyberattack ever
  • Insurance companies refused many payouts, calling it “an act of war”
  • The world realized supply-chain attacks were existential threats

Global Impact

  • Cemented supply-chain compromise as a top-tier attack vector
  • Forced companies to audit every dependency
  • Sparked international debate over cyber warfare

NotPetya didn’t want money. It wanted collateral damage — and it succeeded beyond imagination.

Share:

More Tales From The Hack

Send Us A Message

More Tales From The Hack