Does MetaDefender Core v5 Detect the NotPetya Ransomware?

This article applies to all MetaDefender Core releases subsequent to V4.21.2, including all V5 releases, deployed on Windows or Linux systems.

The voracious NotPetya ransomware attacks were first detected in Ukraine in 2017 and quickly spread across Europe and the world, continuing on their devastating course for approximately two years.

OPSWAT was swift to incorporate defenses against this threat into the latest MetaDefender Core technology and, since the group responsible for the NotPetya attacks are still at large today, we (and our vendors) remain vigilant and dedicated to safeguarding organizations against NotPetya and similar threats.

At the heart of the solution, the base MetaDefender Core multi-scanning engine uses up to 33 anti-malware engines to scan files for threats. Our detection rate is dependent on the number of enabled engines, with a higher number of engines increasing malware detection rates overall.

Currently, most of the engines included in our MetaDefender Core base packages acknowledge the NotPetya ransomware threat. Below is a package breakdown with relevant information provided by each of the engine vendors.

  1. Lower packages of MetaDefender Core are subsets of higher packages. So, higher packages include the same engines as lower packages - plus more.
  2. For a comprehensive list of engines per package and OS, expand the Metascan tab on the following webpage: MetaDefender Enterprise Licensing
  3. Some of our vendors may already be detecting the NotPetya threat but do not have any official post about it. These vendors are not listed below but will be included as more information becomes available.
  4. Specific engine detection is based on the most up-to-date engine definitions. Some latency may occur due to update frequency, update methods, or network speeds.

Windows

MetaDefender Core 8

Avira:

Petya strikes back - Avira Blog

ESET:

“Petya” Ransomware: What we know now | | ESET

Bitdefender:

Massive GoldenEye Ransomware Campaign Slams worldwide users

MBR-Encrypting Ransomware Petya Gets Bitdefender Vaccine

Petya Ransomware Goes Low Level

Quick Heal:

Petya ransomware is affecting users globally, here are things you can do

VirITeXplorer:

Petya or notPetya ? questo è il dilemma.... nuovo ransomware o vecchia conoscenza...

MetaDefender Core 12

CYREN:

Petya Ransomware Rises by Using Similar Exploit As WannaCry - Cyren

MetaDefender Core 16

Emsisoft:

Petya ransomware variant attacks computers worldwide

Zillya!:

Кибертака Украина: В антивирусной компании рассказали, кто может стоять за хакерской атакой Petya.A и чем это грозит — Украина

VirusBlokAda:

New Ransomworm Follows WannaCry Exploits

MetaDefender Core 20

McAfee:

How to protect against Petya, Ransom-WannaCry, and other ransomware | McAfee Support

How to Protect Against Petya Ransomware in a McAfee Environment | McAfee Blog

Sophos:

Petya variants behind global ransomware outbreak – Sophos News

Troj/Petya-AQ - Viruses and Spyware - Advanced Network Threat Protection | ATP from Targeted Malware Attacks and Persistent Threats | sophos.com - Threat Center

Linux

MetaDefender Core 5

Bitdefender:

Massive GoldenEye Ransomware Campaign Slams worldwide users

Petya Ransomware Goes Low Level

ESET: “Petya” Ransomware: What we know now | | ESET

MetaDefender Core 10

Avira:

Petya strikes back - Avira Blog

CYREN:

Petya Ransomware Rises by Using Similar Exploit As WannaCry - Cyren

Quick Heal:

Petya ransomware is affecting users globally, here are things you can do

For more information on virus-specific protections, or to report a suspected vulnerability or threat, please follow these instructions on How to Create Support Package With Bundle Tools?, before creating a support case or chatting with our support engineer.

Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard