NotPetya Wiper Disguised as Ransomware Causes $10 Billion in Global Damage

Wired
NotPetya Wiper Disguised as Ransomware Causes $10 Billion in Global Damage
Image: Wikimedia Commons

What happened

NotPetya, a destructive wiper disguised as ransomware, spread via a trojanised Ukrainian accounting software update and EternalBlue. It destroyed systems at Maersk (shipping), Merck (pharma), FedEx, and hundreds of other companies. With no real decryption mechanism, victims could not recover data — total damage exceeded $10 billion.[1]

What went wrong

The initial infection vector was a software supply chain compromise of MeDoc, widely used Ukrainian accounting software. Once inside corporate networks, NotPetya spread rapidly because of flat network architectures and legitimate admin credential reuse via Mimikatz.[1]

Lesson learned

Cyber weapons do not respect borders — a nation-state operation against Ukraine became the costliest cyberattack in history for Western multinationals. Offline backups, network segmentation, and software supply chain verification are existential requirements, not optional hardening.

Est. value burned ~$10B Merck $870M + Maersk $300M + others

Sources

  1. [1] Wired NotPetya Wiper Disguised as Ransomware Causes $10 Billion in Global Damage