> series: anatomy_of_a_breach —— part: 102 —— weapon: notpetya —— damage: $10,000,000,000+ —— disguise: ransomware —— reality: cyber_weapon<span class="cursor-blink">_</span>_
On 27 June 2017, a malware outbreak began in Ukraine and spread globally within hours. Initially mistaken for a variant of the Petya ransomware — hence 'NotPetya' — the malware encrypted the master boot records of infected computers and demanded a $300 Bitcoin ransom. But analysis quickly revealed that NotPetya was not ransomware at all: its encryption was irreversible by design. The payment mechanism was non-functional. The key generation was broken intentionally. NotPetya was a destructive cyber weapon — attributed to Russia's GRU military intelligence — masquerading as ransomware to create confusion.
NotPetya's initial infection vector was a poisoned software update from M.E.Doc — a Ukrainian accounting and tax-filing application used by approximately 80% of Ukrainian businesses. The compromised update installed NotPetya on every M.E.Doc customer's systems simultaneously. From there, NotPetya used EternalBlue and Mimikatz (a credential-harvesting tool) to spread laterally through corporate networks at devastating speed. Any multinational company with operations in Ukraine — or network connectivity to Ukrainian partners — was exposed. The result was the most expensive cyber attack in history: over $10 billion in total global damage.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping Call| Organisation | Impact | Cost |
|---|---|---|
| Maersk (shipping) | 49,000 laptops destroyed, 4,000 servers wiped, 2,500 applications. Entire IT infrastructure rebuilt from scratch in 10 days. | $300 million |
| Merck (pharmaceutical) | Manufacturing halted. Vaccine production disrupted. Borrowed $240M of Gardasil vaccine from CDC reserves. | $870 million |
| FedEx/TNT Express | European operations paralysed. TNT's systems never fully recovered — some data permanently lost. | $400 million |
| Reckitt Benckiser (UK) | Manufacturing and distribution disrupted across Dettol, Nurofen, and Durex brands. | $129 million |
| Mondelēz (food) | 1,700 servers and 24,000 laptops destroyed. | $188 million |
| Saint-Gobain (construction) | IT systems across 67 countries affected. | $384 million |
NotPetya's initial infection vector — a poisoned M.E.Doc update — was the most consequential supply chain attack in history. M.E.Doc was effectively mandatory for doing business in Ukraine (it was used for mandatory tax filings), meaning every multinational with Ukrainian operations was exposed. Maersk had a single office in Odessa. Through that office's M.E.Doc connection, NotPetya reached Maersk's entire global network — destroying 49,000 laptops and 4,000 servers across 130 countries.
NotPetya proved that prevention alone is insufficient against destructive nation-state attacks delivered through trusted supply chains. The defence requires resilience: immutable offline backups (tested regularly), network segmentation (limiting blast radius), incident response plans (tested and rehearsed), and the recognition that any software vendor, any business partner, any country you operate in could be the vector for the next supply chain attack.
Our infrastructure penetration testing validates segmentation, backup integrity, and recovery procedures. Red team engagements simulate destructive attack scenarios. Cyber Essentials mandates patching and baseline controls. SOC in a Box detects lateral movement and wiper deployment. And UK Cyber Defence provides the crisis management and incident response capability that organisations need when everything is destroyed and the question is: can we rebuild?
<a href="/penetration-testing/infrastructure">Infrastructure testing</a> validates your recovery capability. <a href="/penetration-testing/red-team">Red team testing</a> simulates destructive scenarios. <a href="https://www.socinabox.co.uk">SOC in a Box</a> detects wiper deployment. <a href="https://www.cyber-defence.io/services/incident-response">UK Cyber Defence</a> manages the crisis.
We'll scope your test for free and tell you exactly what you need. No obligation, no hard sell.
Free Scoping Call