For the complete documentation index, see llms.txt.
Skip to main content
New

NotPetya

Updated May 20, 2026

A destructive 2017 cyberattack disguised as ransomware that caused over $10 billion in global damage — attributed to Russian military intelligence (GRU).

What It Is

NotPetya was a destructive 2017 cyberattack disguised as ransomware that caused over $10 billion in global damage — attributed to Russian military intelligence (GRU). It was deployed on 27 June 2017, initially through a compromised update to Ukrainian tax software MEDoc.

Though NotPetya presented a ransomware demand, decryption was technically impossible — making it pure destructive 'wiper' malware. The ransomware framing was a deception: encrypted files could not be recovered even with the demanded payment, because the malware's design prevented decryption.

Technical Architecture

NotPetya was technically sophisticated:

  • Initial infection vector: compromised update to Ukrainian tax-accounting software MEDoc, which was used by most Ukrainian businesses.
  • Lateral propagation: spread globally through SMB protocols (the same protocols that WannaCry had exploited in May 2017), using stolen NSA exploits (EternalBlue, EternalRomance) and credential-stealing techniques.
  • Disk encryption: encrypted the master file table on infected machines, making the entire disk unreadable.
  • Boot sector destruction: overwrote the master boot record, preventing recovery.
  • Ransomware facade: displayed a ransomware demand, but the encryption was designed to be irreversible.

The technical architecture revealed sophisticated state-actor capabilities: combining stolen NSA exploits with custom destructive payloads and credible deception.

Global Impact

From Ukrainian initial infection, NotPetya spread globally through SMB protocols, devastating major multinational corporations:

  • A.P. Moller-Maersk (Danish shipping giant): operations halted globally; estimated $300 million in damages.
  • FedEx (through TNT): $300+ million in damages; multi-month operational disruption.
  • Merck (US pharmaceutical): $870 million in damages; manufacturing disruption that affected vaccine production.
  • Mondelez (Cadbury, Oreo parent): $100+ million in damages.
  • WPP (advertising giant): operational disruption.
  • Rosneft, Bashneft (Russian oil companies, ironically): some damage from the spillover.
  • Various other firms globally.

Total damage exceeded $10 billion — the most costly cyberattack in history at the time.

Attribution

The US, UK, Australia, Canada, Denmark, Estonia, Lithuania, New Zealand, and Norway publicly attributed NotPetya to Russian GRU unit 74455 (Sandworm) in February 2018 — the most coordinated state cyber attribution ever conducted at that time.

The attribution was notable for:

  • Multilateral coordination: nine governments aligned on a single cyber attribution, demonstrating intelligence-sharing and political coordination.
  • Operational detail: the attribution named the specific GRU unit responsible.
  • Speed: roughly eight months from the attack to public attribution.
  • Political consequences: the attribution contributed to subsequent sanctions and political action against Russian cyber operations.

Subsequent reporting and indictments (the 2020 US indictments of GRU Sandworm officers) provided additional confirmation and detail.

Insurance Industry Reform

The attack drove insurance industry reform on cyber 'war exclusions' after Merck won a key 2022 ruling against Ace American on the issue. Insurers had argued that war exclusions in property insurance policies excluded NotPetya damage from coverage, since the attack was attributed to a state actor.

Merck argued that the war exclusion required actual and didn't apply to cyber operations against non-belligerent third parties. The court agreed with Merck. Subsequent insurance-industry reform has tightened cyber exclusions and clarified the boundary between cyber-war exclusions and standard cyber coverage.

The litigation has reshaped cyber insurance globally — establishing what insurers cover and what they don't in cases of state-attributed destructive cyber attacks.

Why NotPetya Matters

NotPetya matters as the defining case of state destructive cyber spillover. The attack was aimed at Ukrainian organizations but quickly spread globally, causing massive damage to bystander companies in dozens of countries. The case established that state cyber operations cannot reliably be contained to their intended targets — destructive cyber tools, once deployed, spread.

The attack also illustrated the operational sophistication of Russian military cyber capability and established Sandworm as a major adversary in Western cyber-threat intelligence frameworks.

Lasting Consequences

  • Multilateral attribution norms: the February 2018 multilateral attribution established a template for subsequent coordinated cyber attributions.
  • Sanctions and indictments: the 2018 attribution led to US sanctions on Russian individuals and entities; the 2020 indictments of GRU officers created lasting legal exposure.
  • Industry security investments: NotPetya prompted massive cyber-security investment by multinationals to prevent similar incidents.
  • Cyber-insurance evolution: the post-NotPetya insurance litigation reshaped the industry.
  • Ukrainian critical-infrastructure focus: the attack and subsequent Russian cyber operations against Ukraine (continuing through the 2022 invasion) established Ukraine as the primary testing ground for state-on-state destructive cyber.

Common Misconceptions

NotPetya is sometimes characterized as a successful ransomware operation. It was not — it generated almost no ransom payments because decryption was impossible. The financial motive was a cover for destructive intent.

Another misconception is that NotPetya was contained to Ukraine. It spread globally and caused most damage outside Ukraine, particularly to Western multinationals with offices in or connections to Ukraine.

Real-World Examples

The June-July 2017 Maersk recovery — documented in industry case studies — became the canonical example of recovering from a destructive cyber attack. The 2018 multilateral attribution established a precedent for coordinated public attribution that has been followed in subsequent cyber operations. The 2022 Merck v. Ace American ruling reshaped the cyber-insurance industry's approach to war exclusions.

Example

Maersk had to reinstall 4,000 servers and 45,000 PCs after NotPetya — estimated cost $300 million. The shipping giant's experience became a foundational case study in cyber business continuity.

Frequently asked questions

No — it presented a ransom demand but decryption was impossible by design. It was destructive 'wiper' malware disguised as ransomware.
Talk to founder