Skip To Content
BuzzFeed News Home Reporting To You

Utilizamos cookies, próprios e de terceiros, que o reconhecem e identificam como um usuário único, para garantir a melhor experiência de navegação, personalizar conteúdo e anúncios, e melhorar o desempenho do nosso site e serviços. Esses Cookies nos permitem coletar alguns dados pessoais sobre você, como sua ID exclusiva atribuída ao seu dispositivo, endereço de IP, tipo de dispositivo e navegador, conteúdos visualizados ou outras ações realizadas usando nossos serviços, país e idioma selecionados, entre outros. Para saber mais sobre nossa política de cookies, acesse link.

Caso não concorde com o uso cookies dessa forma, você deverá ajustar as configurações de seu navegador ou deixar de acessar o nosso site e serviços. Ao continuar com a navegação em nosso site, você aceita o uso de cookies.

Here’s Just Who Got Hit By The Latest Massive Cyberattack

Hospitals, state-run infrastructure, and even supermarkets were hit hard by the latest wave of ransomware based on NSA-developed exploits.

Posted on June 27, 2017, at 6:40 p.m. ET

More than 2000 computers and millions of people were affected on Tuesday as a virus ran rampant in the computer systems of companies and government infrastructure alike around the world.

Some of our gov agencies, private firms were hit by a virus. No need to panic, we’re putting utmost efforts to tack…

The ransomware virus — which infects a computer and then encrypts its files, promising to decrypt them if a ransom is paid — crippled state-run infrastructure and major companies.

Cybersecurity researchers have said that the virus uses an exploit developed by the NSA known as EternalBlue.

Valentyn Ogirenko / Reuters

The exploit, dubbed ExPetr, takes advantage of a vulnerability in Microsoft’s Windows XP through 2008, and was also used for the WannaCry attack that happened in May. (North Korea has been identified as the likely source of WannaCry.)

EternalBlue was developed by the NSA over five years ago and remained secret until April, when a trove of NSA secrets were disclosed by a group known as the Shadow Brokers. NSA alerted Microsoft to the vulnerability in March and Microsoft has released a patch, however the patch depends on end-users making software updates, leaving those who are slow to update vulnerable to attack.

It remains unclear who was behind Tuesday’s attack.

Schroedinger’s Pet(ya) via @Securelist #petya #notpetya

Ukraine was the hardest hit, but companies in Russia, the United States, UK, Denmark, France, and others were also hit. Initially Symantec and Kaspersky Labs had identified the attack as a strain of Petya, a virus available for distribution on the dark web, but Kaspersky Labs released a statement later in the day saying that this is “new ransomware that has not been seen before," and that they were renaming it NotPetya.

To give a sense of scale of the attack, here’s a list of just some of its targets by country:


1. The Cabinet of Minister’s Secretariat

Та-дам! Секретаріат КМУ по ходу теж "обвалили". Мережа лежить.

2. Boryspil Airport

Valentyn Ogirenko / Reuters

3. National Bank of Ukraine + ATMs

4. Oschadbank

5.Kiev Metro

6. Ukrenergo

7. Kyivenergo

8. Radiation monitoring system at Chernobyl

9. Ministry of Infrastructure

10. Supermarkets

A supermarket in Ukraine. The country is under cyberattack. via @golub


11. Rosneft

12. Evraz

13. Home Credit


14. Maersk

Phil Noble / Reuters


15. Saint-Gobain


16. WPP

Benjamin Fathers / AFP / Getty Images


17. Merck

18. DLA Piper

A tipster sends along this photo taken outside DLA Piper's D.C. office around 10am. #Petya

A BuzzFeed News investigation, in partnership with the International Consortium of Investigative Journalists, based on thousands of documents the government didn't want you to see.