Response to Peer Post (7)
Response to Peer Post
Author’s Name
Institutional Affiliation
Response to Peer Post
I appreciated reading your post regarding the Petya and NotPetya malware attacks because I noticed some aspects that I never addressed in my initial post. For instance, you mention that Petya could reformat victims’ hard discs and also reinstall the operating system afresh. Besides, I see we agree on some points such as why NotPetya is not ransomware. Here, we subscribe to the same idea that NotPetya did not attempt to achieve financial gain via cyber ransom but rather infect computers, encrypt data, and destroy data beyond repair while denying users the chance to restore their systems. You have demonstrated meticulous thoughts and in-depth comprehension of the topic of discussion.


