Supply chain β›“ Supply Chain

NotPetya Supply Chain Wiper via M.E.Doc Update (Sandworm, $10B+ Damages)

πŸ“… 2017-06-27 🏒 M.E.Doc (MeDoc) Ukrainian tax accounting software 🦠 NotPetya (Petya variant / wiper) πŸ”Ž CVE-2017-0144
Primary Source β†—

Incident Details

On June 27, 2017, Russian military intelligence (GRU Unit 74455 / Sandworm) deployed NotPetya β€” a destructive wiper disguised as ransomware β€” by trojanizing the automatic update mechanism of M.E.Doc, a Ukrainian accounting software package used by approximately 80% of Ukrainian companies for tax filing. NotPetya spread beyond Ukraine via multinational companies with Ukrainian operations, triggering one of the most destructive cyberattacks in history. Unlike WannaCry, NotPetya was a pure wiper β€” it permanently destroyed data and the ransom payment mechanism was non-functional. Spread mechanism: initial delivery via M.E.Doc update; then spread internally via EternalBlue (CVE-2017-0144) + WMIC/PsExec + Mimikatz credential harvesting. Major victims and estimated losses: Maersk ($300M, destroyed 45,000 PCs and 1,000 applications; rebuilt in 10 days by air-shipping hard drives globally), TNT Express / FedEx ($400M), Merck ($870M, destroyed 40,000 computers including vaccine manufacturing systems), Mondelez ($100M), Reckitt Benckiser ($129M), Nuance Communications ($92M). Total global damages estimated at $10+ billion. The US, UK, EU, and others officially attributed NotPetya to Russian GRU in February 2018. The NotPetya attack established the precedent of nation-state cyber operations causing catastrophic civilian and commercial collateral damage, and triggered major debates about whether such attacks constitute acts of war under international law.

Technical Details

Initial Attack Vector
Russian GRU Sandworm APT compromised M.E.Doc (MeDoc), a Ukrainian tax accounting software used by ~80% of Ukrainian companies, and trojanized the automatic update mechanism to deliver the NotPetya destructive wiper; lateral spread used EternalBlue + Mimikatz credential harvesting
Vendor / Product
M.E.Doc (MeDoc) Ukrainian tax accounting software
Software Package
M.E.Doc
Malware Family
NotPetya (Petya variant / wiper)
CVE / GHSA References
CVE-2017-0144
Supply Chain Attack
βœ… Confirmed third-party / vendor compromise

Timeline

  1. 2017-06-27 Breach occurred
  2. 2017-06-27 Publicly disclosed