This article applies to all MetaDefender Core releases subsequent to V4.21.2, including all V5 releases, deployed on Windows or Linux systems.
The voracious NotPetya ransomware attacks were first detected in Ukraine in 2017 and quickly spread across Europe and the world, continuing on their devastating course for approximately two years.
OPSWAT was swift to incorporate defenses against this threat into the latest MetaDefender Core technology and, since the group responsible for the NotPetya attacks are still at large today, we (and our vendors) remain vigilant and dedicated to safeguarding organizations against NotPetya and similar threats.
At the heart of the solution, the base MetaDefender Core multi-scanning engine uses up to 33 anti-malware engines to scan files for threats. Our detection rate is dependent on the number of enabled engines, with a higher number of engines increasing malware detection rates overall.
Currently, most of the engines included in our MetaDefender Core base packages acknowledge the NotPetya ransomware threat. Below is a package breakdown with relevant information provided by each of the engine vendors.
- Lower packages of MetaDefender Core are subsets of higher packages. So, higher packages include the same engines as lower packages - plus more.
- For a comprehensive list of engines per package and OS, expand the Metascan tab on the following webpage: MetaDefender Enterprise Licensing
- Some of our vendors may already be detecting the NotPetya threat but do not have any official post about it. These vendors are not listed below but will be included as more information becomes available.
- Specific engine detection is based on the most up-to-date engine definitions. Some latency may occur due to update frequency, update methods, or network speeds.
Windows
MetaDefender Core 8
Avira:
Petya strikes back - Avira Blog
ESET:
“Petya” Ransomware: What we know now | | ESET
Bitdefender:
Massive GoldenEye Ransomware Campaign Slams worldwide users
MBR-Encrypting Ransomware Petya Gets Bitdefender Vaccine
Petya Ransomware Goes Low Level
Quick Heal:
Petya ransomware is affecting users globally, here are things you can do
VirITeXplorer:
Petya or notPetya ? questo è il dilemma.... nuovo ransomware o vecchia conoscenza...
MetaDefender Core 12
CYREN:
Petya Ransomware Rises by Using Similar Exploit As WannaCry - Cyren
MetaDefender Core 16
Emsisoft:
Petya ransomware variant attacks computers worldwide
Zillya!:
VirusBlokAda:
New Ransomworm Follows WannaCry Exploits
MetaDefender Core 20
McAfee:
How to protect against Petya, Ransom-WannaCry, and other ransomware | McAfee Support
How to Protect Against Petya Ransomware in a McAfee Environment | McAfee Blog
Sophos:
Petya variants behind global ransomware outbreak – Sophos News
Linux
MetaDefender Core 5
Bitdefender:
Massive GoldenEye Ransomware Campaign Slams worldwide users
Petya Ransomware Goes Low Level
ESET: “Petya” Ransomware: What we know now | | ESET
MetaDefender Core 10
Avira:
Petya strikes back - Avira Blog
CYREN:
Petya Ransomware Rises by Using Similar Exploit As WannaCry - Cyren
Quick Heal:
Petya ransomware is affecting users globally, here are things you can do
For more information on virus-specific protections, or to report a suspected vulnerability or threat, please follow these instructions on How to Create Support Package With Bundle Tools?, before creating a support case or chatting with our support engineer.
