{"id":10047,"date":"2017-11-23T18:27:38","date_gmt":"2017-11-23T17:27:38","guid":{"rendered":"https:\/\/www.riskinsight-wavestone.com\/?p=10047\/"},"modified":"2020-01-02T15:16:39","modified_gmt":"2020-01-02T14:16:39","slug":"notpetya-what-are-the-impacts","status":"publish","type":"post","link":"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/11\/notpetya-what-are-the-impacts\/","title":{"rendered":"NotPetya: 5 months later, what are the impacts?"},"content":{"rendered":"<figure id=\"post-10048 media-10048\" class=\"align-none\">\n<figure id=\"post-10055 media-10055\" class=\"align-none\"><\/figure>\n<\/figure>\n<figure id=\"post-10057 media-10057\" class=\"align-none\">\n<figure id=\"post-10067 media-10067\" class=\"align-none\">\n<figure id=\"post-10073 media-10073\" class=\"align-none\">\n<figure id=\"post-10080 media-10080\" class=\"align-none\">\n<figure id=\"post-10089 media-10089\" class=\"align-none\">\n<figure id=\"post-10118 media-10118\" class=\"align-none\">\n<figure id=\"post-10235 media-10235\" class=\"align-center\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-10235\" src=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/09\/cyber-resilience_EN_v4.png\" alt=\"\" width=\"1250\" height=\"2914\" srcset=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/09\/cyber-resilience_EN_v4.png 1250w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/09\/cyber-resilience_EN_v4-82x191.png 82w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/09\/cyber-resilience_EN_v4-768x1790.png 768w, https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2017\/09\/cyber-resilience_EN_v4-17x39.png 17w\" sizes=\"auto, (max-width: 1250px) 100vw, 1250px\" \/><\/figure>\n<\/figure>\n<\/figure>\n<\/figure>\n<\/figure>\n<\/figure>\n<\/figure>\n<p style=\"text-align: right;\"><em>Learn more on\u00a0<a href=\"http:\/\/bit.ly\/wavestone-cyber-resilience\">http:\/\/bit.ly\/wavestone-cyber-resilience<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn more on\u00a0http:\/\/bit.ly\/wavestone-cyber-resilience<\/p>\n","protected":false},"author":15,"featured_media":9811,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"page-templates\/tmpl-one.php","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[3266,2777],"tags":[2871,3327,3364,3365],"coauthors":[837,2867],"class_list":["post-10047","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-next-gen-it-security-en","category-cybersecurity-digital-trust","tag-cyberattack","tag-cyberresilience-en","tag-impacts-en","tag-notpetya-en"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>NotPetya: 5 months later, what are the impacts? - RiskInsight<\/title>\n<meta name=\"description\" content=\"Following NotPetya attack, this is an synthesis about business and financial impacts of the attack on impacted organizations.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/11\/notpetya-what-are-the-impacts\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NotPetya: 5 months later, what are the impacts? - RiskInsight\" \/>\n<meta property=\"og:description\" content=\"Following NotPetya attack, this is an synthesis about business and financial impacts of the attack on impacted organizations.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/11\/notpetya-what-are-the-impacts\/\" \/>\n<meta property=\"og:site_name\" content=\"RiskInsight\" \/>\n<meta property=\"article:published_time\" content=\"2017-11-23T17:27:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-01-02T14:16:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/12\/mobilesecurity.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"610\" \/>\n\t<meta property=\"og:image:height\" content=\"370\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"G\u00e9r\u00f4me Billois\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"G\u00e9r\u00f4me Billois\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/11\/notpetya-what-are-the-impacts\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/11\/notpetya-what-are-the-impacts\/\"},\"author\":{\"name\":\"G\u00e9r\u00f4me Billois\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17\"},\"headline\":\"NotPetya: 5 months later, what are the impacts?\",\"datePublished\":\"2017-11-23T17:27:38+00:00\",\"dateModified\":\"2020-01-02T14:16:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/11\/notpetya-what-are-the-impacts\/\"},\"wordCount\":14,\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/11\/notpetya-what-are-the-impacts\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/12\/mobilesecurity.jpg\",\"keywords\":[\"cyberattack\",\"cyberresilience\",\"impacts\",\"Notpetya\"],\"articleSection\":[\"Cloud &amp; Next-Gen IT Security\",\"Cybersecurity &amp; Digital Trust\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/11\/notpetya-what-are-the-impacts\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/11\/notpetya-what-are-the-impacts\/\",\"name\":\"NotPetya: 5 months later, what are the impacts? - RiskInsight\",\"isPartOf\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/11\/notpetya-what-are-the-impacts\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/11\/notpetya-what-are-the-impacts\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/12\/mobilesecurity.jpg\",\"datePublished\":\"2017-11-23T17:27:38+00:00\",\"dateModified\":\"2020-01-02T14:16:39+00:00\",\"description\":\"Following NotPetya attack, this is an synthesis about business and financial impacts of the attack on impacted organizations.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/11\/notpetya-what-are-the-impacts\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/11\/notpetya-what-are-the-impacts\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/11\/notpetya-what-are-the-impacts\/#primaryimage\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/12\/mobilesecurity.jpg\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/12\/mobilesecurity.jpg\",\"width\":610,\"height\":370},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/11\/notpetya-what-are-the-impacts\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NotPetya: 5 months later, what are the impacts?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#website\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"name\":\"RiskInsight\",\"description\":\"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants\",\"publisher\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#organization\",\"name\":\"Wavestone\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"contentUrl\":\"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png\",\"width\":50,\"height\":50,\"caption\":\"Wavestone\"},\"image\":{\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17\",\"name\":\"G\u00e9r\u00f4me Billois\",\"description\":\"G\u00e9r\u00f4me Billois is a Partner at Wavestone in the Cybersecurity and Digital Trust practice. He graduated from the National Institute of Applied Sciences in Lyon. He has deep expertise in risk management and cybersecurity, developed over more than 15 years of experience. G\u00e9r\u00f4me is a board member of CLUSIF, a member of the ISO JTC1\/SC27 committee, responsible for information security standardisation, and a founding member of Club27001, a non-profit dedicated to promoting the ISO 27001 standard. He holds CISA, CISSP and ISO 27001 PA certifications. G\u00e9r\u00f4me co-authored several books on cybersecurity (Eyrolles, Cepadues, Wiley &amp; Sons, Larcier), is a regular media and conference speaker (Assises de la S\u00e9curit\u00e9, ISACA, CLUSIF, CNIS, etc.), and gives university lectures.\",\"url\":\"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gerome-billois\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NotPetya: 5 months later, what are the impacts? - RiskInsight","description":"Following NotPetya attack, this is an synthesis about business and financial impacts of the attack on impacted organizations.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/11\/notpetya-what-are-the-impacts\/","og_locale":"en_US","og_type":"article","og_title":"NotPetya: 5 months later, what are the impacts? - RiskInsight","og_description":"Following NotPetya attack, this is an synthesis about business and financial impacts of the attack on impacted organizations.","og_url":"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/11\/notpetya-what-are-the-impacts\/","og_site_name":"RiskInsight","article_published_time":"2017-11-23T17:27:38+00:00","article_modified_time":"2020-01-02T14:16:39+00:00","og_image":[{"width":610,"height":370,"url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/12\/mobilesecurity.jpg","type":"image\/jpeg"}],"author":"G\u00e9r\u00f4me Billois","twitter_misc":{"Written by":"G\u00e9r\u00f4me Billois"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/11\/notpetya-what-are-the-impacts\/#article","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/11\/notpetya-what-are-the-impacts\/"},"author":{"name":"G\u00e9r\u00f4me Billois","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17"},"headline":"NotPetya: 5 months later, what are the impacts?","datePublished":"2017-11-23T17:27:38+00:00","dateModified":"2020-01-02T14:16:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/11\/notpetya-what-are-the-impacts\/"},"wordCount":14,"publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/11\/notpetya-what-are-the-impacts\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/12\/mobilesecurity.jpg","keywords":["cyberattack","cyberresilience","impacts","Notpetya"],"articleSection":["Cloud &amp; Next-Gen IT Security","Cybersecurity &amp; Digital Trust"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/11\/notpetya-what-are-the-impacts\/","url":"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/11\/notpetya-what-are-the-impacts\/","name":"NotPetya: 5 months later, what are the impacts? - RiskInsight","isPartOf":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/11\/notpetya-what-are-the-impacts\/#primaryimage"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/11\/notpetya-what-are-the-impacts\/#primaryimage"},"thumbnailUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/12\/mobilesecurity.jpg","datePublished":"2017-11-23T17:27:38+00:00","dateModified":"2020-01-02T14:16:39+00:00","description":"Following NotPetya attack, this is an synthesis about business and financial impacts of the attack on impacted organizations.","breadcrumb":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/11\/notpetya-what-are-the-impacts\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.riskinsight-wavestone.com\/en\/2017\/11\/notpetya-what-are-the-impacts\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/11\/notpetya-what-are-the-impacts\/#primaryimage","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/12\/mobilesecurity.jpg","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2016\/12\/mobilesecurity.jpg","width":610,"height":370},{"@type":"BreadcrumbList","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/2017\/11\/notpetya-what-are-the-impacts\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.riskinsight-wavestone.com\/en\/"},{"@type":"ListItem","position":2,"name":"NotPetya: 5 months later, what are the impacts?"}]},{"@type":"WebSite","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#website","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","name":"RiskInsight","description":"The cybersecurity &amp; digital trust blog by Wavestone&#039;s consultants","publisher":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.riskinsight-wavestone.com\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#organization","name":"Wavestone","url":"https:\/\/www.riskinsight-wavestone.com\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","contentUrl":"https:\/\/www.riskinsight-wavestone.com\/wp-content\/uploads\/2021\/08\/Monogramme\u2013W\u2013NEGA-RGB-50x50-1.png","width":50,"height":50,"caption":"Wavestone"},"image":{"@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.riskinsight-wavestone.com\/en\/#\/schema\/person\/8c7dc7008d92d9f59fb0c108c988cb17","name":"G\u00e9r\u00f4me Billois","description":"G\u00e9r\u00f4me Billois is a Partner at Wavestone in the Cybersecurity and Digital Trust practice. He graduated from the National Institute of Applied Sciences in Lyon. He has deep expertise in risk management and cybersecurity, developed over more than 15 years of experience. G\u00e9r\u00f4me is a board member of CLUSIF, a member of the ISO JTC1\/SC27 committee, responsible for information security standardisation, and a founding member of Club27001, a non-profit dedicated to promoting the ISO 27001 standard. He holds CISA, CISSP and ISO 27001 PA certifications. G\u00e9r\u00f4me co-authored several books on cybersecurity (Eyrolles, Cepadues, Wiley &amp; Sons, Larcier), is a regular media and conference speaker (Assises de la S\u00e9curit\u00e9, ISACA, CLUSIF, CNIS, etc.), and gives university lectures.","url":"https:\/\/www.riskinsight-wavestone.com\/en\/author\/gerome-billois\/"}]}},"_links":{"self":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/10047","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/comments?post=10047"}],"version-history":[{"count":12,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/10047\/revisions"}],"predecessor-version":[{"id":10237,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/posts\/10047\/revisions\/10237"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media\/9811"}],"wp:attachment":[{"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/media?parent=10047"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/categories?post=10047"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/tags?post=10047"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.riskinsight-wavestone.com\/en\/wp-json\/wp\/v2\/coauthors?post=10047"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}