blog.fortinet.com/2017/02/01/ransomware-and-the-boot-process
Preview meta tags from the blog.fortinet.com website.
Linked Hostnames
10- 30 links towww.fortinet.com
- 13 links toblog.fortinet.com
- 1 link tocommunity.fortinet.com
- 1 link tofortiguard.com
- 1 link toinvestor.fortinet.com
- 1 link towww.facebook.com
- 1 link towww.instagram.com
- 1 link towww.linkedin.com
Thumbnail

Search Engine Appearance
Ransomware And The Boot Process
Since its discovery in early 2016, we have tracked a number variations of Petya, a ransomware variant famous for multi-stage encryption that not only locks your computer, but also overwrites the Master Boot Record. Petya continues to persist, and in this blog we will take a deeper look at its more complex second stage of attack. Petya overwrites the Master Boot Record (MBR), along with its neighboring sectors using its boot code and a small kernel code. The MBR contains the master boot code, the partition table,...
Bing
Ransomware And The Boot Process
Since its discovery in early 2016, we have tracked a number variations of Petya, a ransomware variant famous for multi-stage encryption that not only locks your computer, but also overwrites the Master Boot Record. Petya continues to persist, and in this blog we will take a deeper look at its more complex second stage of attack. Petya overwrites the Master Boot Record (MBR), along with its neighboring sectors using its boot code and a small kernel code. The MBR contains the master boot code, the partition table,...
DuckDuckGo
Ransomware And The Boot Process
Since its discovery in early 2016, we have tracked a number variations of Petya, a ransomware variant famous for multi-stage encryption that not only locks your computer, but also overwrites the Master Boot Record. Petya continues to persist, and in this blog we will take a deeper look at its more complex second stage of attack. Petya overwrites the Master Boot Record (MBR), along with its neighboring sectors using its boot code and a small kernel code. The MBR contains the master boot code, the partition table,...
General Meta Tags
25- titleRansomware And The Boot Process
- charsetUTF-8
- keywordspetya,fortiguard,malware,FortiGuard Labs Threat Research,cryptowall,ransomware
- descriptionSince its discovery in early 2016, we have tracked a number variations of Petya, a ransomware variant famous for multi-stage encryption that not only locks your computer, but also overwrites the Master Boot Record. Petya continues to persist, and in this blog we will take a deeper look at its more complex second stage of attack. Petya overwrites the Master Boot Record (MBR), along with its neighboring sectors using its boot code and a small kernel code. The MBR contains the master boot code, the partition table,...
- templatepost-page
Open Graph Meta Tags
6- og:site_nameFortinet Blog
- og:titleRansomware And The Boot Process
- og:urlhttps://www.fortinet.com/blog/threat-research/ransomware-and-the-boot-process
- og:typearticle
- og:descriptionSince its discovery in early 2016, we have tracked a number variations of Petya, a ransomware variant famous for multi-stage encryption that not only locks your computer, but also overwrites the Ma…
Link Tags
5- canonicalhttps://www.fortinet.com/blog/threat-research/ransomware-and-the-boot-process
- preload/etc/designs/fortinet/adb-target/visitorapi.min.js
- preload/etc/designs/fortinet/adb-target/at.js
- shortcut icon/etc/designs/fortinet-blog/favicon.ico
- stylesheet/etc.clientlibs/fortinet-blog/clientlibs/clientlib-base.min.7d0d07f86e5b51964800bdd1278aecb5.css
Website Locales
1en-us
https://www.fortinet.com/blog/threat-research/ransomware-and-the-boot-process
Links
51- https://blog.fortinet.com/blog/business-and-technology
- https://blog.fortinet.com/blog/ciso-collective
- https://blog.fortinet.com/blog/customer-stories
- https://blog.fortinet.com/blog/industry-trends
- https://blog.fortinet.com/blog/life-at-fortinet