July 18, 2017 Breach

On June 27, 2017, computers across Ukraine suddenly locked up. Within hours, the disruption had spread worldwide, crippling multinational corporations, halting shipping ports, shutting down factories, and causing an estimated $10 billion in total global damage. The culprit was NotPetya — a piece of malware that remains the most destructive cyberattack in history, and a case study in why third-party risk management must account for every vendor in the software supply chain.

The Attack Vector: A Tax Software Update

NotPetya's initial infection vector was M.E.Doc, a Ukrainian accounting software application used by roughly 80% of Ukrainian businesses to file tax returns. The attackers — later attributed by the White House, the UK's NCSC, and multiple intelligence agencies to Sandworm, a unit of Russia's GRU military intelligence — compromised M.E.Doc's update servers. When the software pushed its routine update on June 27, it delivered NotPetya directly into the networks of every organization running M.E.Doc.

Once inside a network, NotPetya spread laterally with extraordinary speed. It used a combination of the EternalBlue and EternalRomance NSA exploits (leaked by the Shadow Brokers), along with credential-harvesting tools like Mimikatz, to propagate across Windows machines. An entire corporate network could be fully encrypted within minutes.

Not Ransomware — A Wiper

Although NotPetya displayed a ransom note demanding $300 in Bitcoin, security researchers quickly determined it was not actually ransomware. It was a wiper disguised as ransomware. The encryption key was generated randomly and never transmitted to the attackers, making decryption impossible even if a ransom was paid. The payment mechanism itself was a single email address that was quickly shut down. NotPetya was designed purely for destruction.

The Devastation: A Global Supply Chain Catastrophe

Any multinational corporation with operations in Ukraine — and therefore running M.E.Doc on even a single machine — was vulnerable. The malware spread from Ukrainian offices into global corporate networks with devastating effect:

OrganizationImpactEstimated Cost
A.P. Møller-MaerskGlobal shipping operations halted; entire IT infrastructure (49,000 laptops, 3,500 servers) rebuilt in 10 days$300 million
FedEx / TNT ExpressEuropean delivery operations crippled for weeks; permanent loss of some business$400 million
Merck & Co.Pharmaceutical manufacturing halted; had to borrow vaccines from CDC stockpile$870 million
Mondelez InternationalProduction and distribution disrupted globally$188 million
Reckitt BenckiserManufacturing and shipping disrupted across multiple countries$129 million

Maersk: Rebuilding an Empire in 10 Days

The impact on Maersk, the world's largest container shipping company, has become legendary in cybersecurity circles. As documented extensively in Andy Greenberg's Wired reporting, Maersk's entire IT infrastructure was destroyed. Every Windows machine across 574 offices in 130 countries was rendered useless. The company reverted to manual operations, tracking shipments on paper and whiteboards.

Maersk's IT team rebuilt the entire infrastructure — reinstalling 45,000 PCs, 4,000 servers, and 2,500 applications — in just 10 days, a feat described internally as a "heroic recovery." The company's only surviving copy of its Active Directory came from a domain controller in Ghana that had been offline during the attack due to a power outage. Without that single lucky break, recovery could have taken months.

TPRM Lesson Learned: NotPetya is the definitive case study in supply chain risk. Organizations were compromised not through their own security failures, but through a trusted software update from a small regional vendor. Effective third-party risk management requires inventorying every piece of vendor software in your environment — including regional compliance tools, tax software, and other applications that may seem low-risk but have deep network access. TPRM programs must assess the security posture of all software vendors, regardless of size, and implement network segmentation to limit the blast radius of a compromised update.

Attribution and Geopolitical Context

In February 2018, the White House formally attributed NotPetya to the Russian military, calling it "the most destructive and costly cyber-attack in history." The UK, Australia, Canada, and other Five Eyes nations concurred. The attack was widely understood as part of Russia's ongoing hybrid warfare campaign against Ukraine, with global collateral damage that far exceeded any intended scope.

The TPRM Imperative: Software Supply Chain Security

NotPetya fundamentally changed how the cybersecurity industry thinks about vendor risk management. Key takeaways for TPRM programs include:

For organizations building mature third-party risk management programs, NotPetya remains the most important case study in history. It demonstrated that in an interconnected world, a single compromised vendor can cause billions in damage across industries, continents, and supply chains. The lesson is clear: every vendor is a potential attack vector, and TPRM must be comprehensive, continuous, and uncompromising.

Protect Your Organization from Third-Party Risk

Fair TPRM is a free, open-source platform for vendor risk management, GRC compliance, and FAIR risk quantification.

Free Demo Download Source

Sources & References

  1. The Untold Story of NotPetya, the Most Devastating Cyberattack in History - Wired (Andy Greenberg), 2018
  2. Statement from the Press Secretary attributing NotPetya to Russia - The White House, February 2018
  3. A.P. Moller-Maersk Interim Report Q2 2017 - Maersk Investor Relations
  4. Merck 2017 Annual Report (Form 10-K) - Merck & Co. SEC Filing
  5. Six Russian GRU Officers Charged in Connection with NotPetya - U.S. Department of Justice, October 2020