$20 Bonus + 25% OFF
Securing Higher Grades Costing Your Pocket? Book Your Assignment at The Lowest Price Now!

Cadbury Australia Hit By Ransomware: Cybercriminals

tag 0 Download11 Pages / 2,571 Words tag Add in library Click this icon and make it bookmark in your library to refer it later. GOT IT


Discuss about the Cadbury Australia Hit by Ransomware for Cybercriminals.




In recent times with the advent of computers and the Internet, the human life is getting more and more facilitated. The cybercriminals taking advantage of this Internet are conducting malicious activities over the Internet (Fimin 2017). The business organisation, Cadbury Australia has been chosen for the project. The issues they face due to Petya ransomware attack has been highlighted in the report. The news highlighted in the newspaper around June 2017.

The report focuses the deadly Petya ransomware attack which shut down the computer server and computer system to halt and hampers the chocolate production. The overview and the detailed impact of Petya Ransomware virus in Cadbury Australia has been showcased. 


Overview of ransomware attack on Cadbury Australia

In Tasmania, the famous chocolate company, Cadbury Australia has been attacked by the ransomware virus a few months ago the effect was disastrous. The virus forced the entire company to cease the production causing a huge loss for the company. The attack was carried out on June 20, 2017. On Tuesday night, the employees of the company experienced the effect of Petya ransomware attack in the system. John Short the secretary of the Australian Manufacturing Worker Union stated that the entire production was stopped due to the Petya Attack. The next day on Wednesday the employees of the company went for work and found that the systems of the company are not working and they are stopped (Gordon, Fairhall and Landman 2017). Around 500 employees on Wednesday morning were sitting idle as the production was put into a halt. Cadbury Australia faced a huge loss that day. Besides, the management team, as well as the workers, were not sure when their system would be normal. The workers were moved on to the cleaning shifts to keep the company working, again the pest control team were moved to keep the night shift schedule busy. Cadbury Australia was not sure when their company would recover from the attack (Richardson and North 2017). The professional team worked there addressing the issues and other vulnerabilities of the network. Will Hodgeman in the meanwhile asked all the Tasmanian business to install computer updates to stay away from the potential ransomware attack.

The ransomware attacked the parent company of Cadbury Australia, Mondelez International and that affected the other subsidiaries (Le Guernic and Legay 2017). The website and the system of Tasmania, Victoria and New Zealand suffered as the parent company got affected. The ransomware attack was responsible for sabotaging the phone lines, emails and damaged the entire production system.

Details of the ransomware attack on Cadbury Australia

The Petya GoldenEye actually attacked the computer database and the system and the database and makes the entire system vulnerable to attack. The employees as well as the managers while trying to enter their system they were not able to log in their system, instead they get the warning message that their system has been hacked and the files have been encrypted, the employees and the management can get back the file in lieu of money (Shackelford 2017). They faced huge difficulties to carry on their work as they could not use the computer system, instead they moved to paper and handwriting to carry on the production process. The entire team unit was tensed when the system would be ok and would be operational to work. The customers could not able to communicate with the company and the outsourcing suffered a lot. The entire enterprise goes into the disruption as a result of this malware attack. According to the officials of Cadbury Australia, their website is the highly advanced site, their website is highly automated. Most of the company’s operations are conducted via their website and because of this attack, everything is put into a halt.

The reason behind this disruption is the outdated software, outdated operating system and the outdated antivirus software (Skrzewski and Rybka 2017). They do not use the patches as well. Cadbury Australia then conducted all the business operations offline, all the employees patiently conducted all the operations However, they are now safe, they have recovered from the disaster they were at the beginning (Schilling 2017). The IT team has worked really hard to make the venture successful and now the Cadbury Australia, however, there are certain risks still associated with it. Cadbury Australia should make the network strong and secured enough to conduct the business operations, must have the latest antivirus installed, they must also install the updates of the antivirus software, operating system as well as all the applications.

Petya ransomware attack and its impact

Effect of Petya ransomware

The system of Cadbury Australia did not get boot up, Cadbury Australia uses Windows operating system at their premises, the Petya attacks the primarily and thus they become the victims. The victims those who got affected by Petya generally got the message that the users’ files have been encrypted and those files can only be retrieved by paying a sum of money (Hammill 2017). They also mention that nobody can access those files or those files cannot be decrypted back any other means.

The workings of Petya ransomware

Petya can only attack the outdated system having outdated antivirus software, outdated operating system and the outdated applications. The system generally lacks the updates and the latest patches. This makes their task simpler to hijack the system as they are knowledgeable of the software and the operating system (Gilbert 2017). The ransomware utilises the hijacked software updates as an attack vector. The Petya also uses the phishing emails as an attack vector.

Petya utilises the advanced version of Mimikatz to rob the sensitive information of the users from the database. They utilise WMIC and PsExec to hack and attack the system. After entering the system, Petya targets the files and the hidden files within the system and encrypts the files.

There are two NSA-stolen SMB exposures which Petya uses and they are Eternal Blue and Eternal Romance. Petya steals WMIC, Windows tools, PsExec and other sensitive information of the companies and the individuals from the system and encrypts those and even they use those data to spread the malicious activities from one system to the other.

The Petya virus is not only limited to attack one’s system files and the sensitive information, rather they attack the hard drive’s MFT and MBR. In this way, they make the whole system unbootable. For the unbootable system, the users or the victims cannot get the opportunity to log into their system (Odilinye, Butakov and Aghili 2017). If the users do not log into their system, they cannot access the files even cannot decrypt the files by any other means. In this way, the Petya makes retrieving of files and decryption of files impossible.

They take control over the insecure network first and then takes control over the system and the database, they automatically get the administrative rights and thus it becomes easy to conduct the business operations.

In case of Cadbury Australia, the Petya attacks the system and the database of the Cadbury Australia, they shut down the server by attacking the hard drive’s MFT and MBR and put the entire system to halt. Petya steals WMIC, Windows tools, PsExec and other sensitive information of Cadbury Australia (Siddiqui, Lee and Saqib 2017). The employees and the management team while tries to enter the system they get a warning message that their system has been hacked and the files residing within the system has been encoded and those files cannot be decoded by any other means, they can be decoded by the hackers. They also demanded $300 to set free the system and the files. The screenshot has been given below which can demonstrate the same.

Petya Ransomware attack on Cadbury factory Australia

Fig 1: Petya Ransomware attack on Cadbury factory Australia

(Source: Skrzewski and Rybka 2017, pp. 144-153)

Identifying the risks associated with Cadbury Australia

Cadbury Australia must monitor the system and the database daily to find out the security breaches all the time, that can mitigate the risks within and can check the negative impacts on Cadbury Australia.

Cadbury Australia must educate their employees about the threats and the security measures for conducting the business operations in a well-secured manner. The training programs must be conducted on daily basis to train them effectively.

All the employees and the management team must be aware of the security threats symptoms, in this way they can identify the cyber threats pretty early and can take actions against the threats quite early (Yaqoob et al. 2017).

Finally, they must monitor, then maintain and regularly reviews the security program and should check whether their system is up to date or not, whether their database and the antivirus software is up to date or not.

Security control measures to keep the Cadbury Australia’s system protected

  1. Cadbury Australia must be aware of the securities and the policies and the procedures and should implement the IT security measures to keep their system protected. As they conduct all the activities online they must not compromise the security. Cadbury Australia must install the updates for the application software they use, must install updates for the operating system and the antivirus software they use.
  2. Cadbury Australia must implement an effective response plan, they must implement the business continuity plan, that can help to conduct the business activities effectively and in agile fashion (Hernandez-Castro, Cartwright and Stepanova 2017). They must have a plan from beforehand and must stay ready to work offline. They must have a proper plan so that they should not halt the business process due to any kind of security breaches or any security mishaps.

Cadbury Australia must have a security awareness training program and this training program along with the proactive testing must be communicated to the customers and the third parties of the company (Rajput 2017).

  1. Cadbury Australia must keep back of the files all the data, there will be no risk of data loss and this can be easy to retrieve the files with ease.
  2. They must secure the network, the network they are using must be well secured enough and strong enough, that can protect Cadbury Australia from all kinds of security breaches.
  3. They must implement endpoint monitoring; they must keep notice on all the malicious activities occurring within the system.

vii. They must check the system and the database frequently to test the virus residing within the system (Chakraborty, Pierazzi and Subrahmanian, 2017).

viii. The security of the system and the database can be ensured via EY Managed SOC services, this EY managed SOC services are capable to detect the threats and better response to the threats.

Cadbury Australia responses and adoption of MIS system

Cadbury Australia if gets compromised must take appropriate steps to secure and protect the systems. They must be responsive all the time, they must have the damage control measures all the time. Cadbury Australia must communicate with the customers and the clients and must keep a healthy relationship with them. Thus when their system gets hacked, they must do the following thing at first, they must disconnect the system and the database from the Internet. Secondly, they must keep backup of all the files. This procedure can save the rest of the files from being hacked or lost or being encrypted (Kharraz and Kirda 2017).  They must forensically analyse network and host systems as that can detect the penetration and the attack of ransomware attack. They must have a professional IT team who has the capability to recover lost data or the encrypted data from the infected system. The IT team must be knowledgeable to deliver the best security solutions, they must analyse the network all the time to find out any security breaches. They must be capable of identifying and the vulnerabilities to check the intruders’ entry and must ensure the safety of the system from future attack (Kulshrestha 2017). The business continuity plan must be activated by Cadbury Australia and an incident response plan to add security to the system and the database.

They must adopt the management information system as that can help them to conduct the financial operations as well as other management services. Again, they can conduct all the operations securely and effectively using MIS system.


It can be concluded from the above discourse by adopting security measures they can keep their system safe and secure and can assist in conducting the business activities fluently and with full proficiency. The overview and the detailed attack of the ransomware virus have been discussed in the report. The effect of Petya ransomware attack, how the Petya Ransomware attack works, the threats and the risks associated has been highlighted in the report, also the security controls have been elaborated in details in the report. Along with all the aspects, Cadbury Australia and their forward look have been focussed as well. The IT team of Cadbury Australia must be capable to cater the best security solutions. Cadbury is the reputed company all over the world, thus they must have a top-notch security in their factory premises.



Batcheller, A., Fowler, S.C., Cunningham, R., Doyle, D., Jaeger, T. and Lindqvist, U., 2017. Building on the Success of Building Security In. IEEE Security & Privacy, 15(4), pp.85-87.

Chakraborty, T., Pierazzi, F. and Subrahmanian, V.S., 2017. EC2: Ensemble Clustering and Classification for Predicting Android Malware Families. IEEE Transactions on Dependable and Secure Computing.

Fimin, M., 2017. Are employees part of the ransomware problem?. Computer Fraud & Security, 2017(8), pp.15-17.

Gilbert, S., 2017. Can a cyber insurance policy keep businesses ahead of information-security risk?. Journal of Data Protection & Privacy, 1(3), pp.321-328.

Gordon, W.J., Fairhall, A. and Landman, A., 2017. Threats to Information Security—Public Health Implications. New England Journal of Medicine, 377(8), pp.707-709.

Hammill, A., 2017. The rise and wrath of ransomware and what it means for society (Doctoral dissertation, Utica College).

Hernandez-Castro, J., Cartwright, E. and Stepanova, A., 2017. Economic Analysis of Ransomware.

Kharraz, A. and Kirda, E., 2017. Redemption: Real-time Protection Against Ransomware at End-Hosts.

Kulshrestha, S., 2017. Artificial Intelligence and Cyber Defense. IndraStra Global, (8), p.3.

Le Guernic, C. and Legay, A., 2017, April. Ransomware and the Legacy Crypto API. In Risks and Security of Internet and Systems: 11th International Conference, CRiSIS 2016, Roscoff, France, September 5-7, 2016, Revised Selected Papers (Vol. 10158, p. 11). Springer.

Odilinye, L., Butakov, S. and Aghili, S., 2017, November. Audit Plan for Patch Management of Enterprise Applications. In International Conference on Information Theoretic Security (pp. 168-175). Springer, Singapore.

Rajput, T.S., 2017. Evolving Threat Agents: Ransomware and their Variants. International Journal of Computer Applications, 164(7).

Richardson, R. and North, M., 2017. Ransomware: Evolution, Mitigation and Prevention. International Management Review, 13(1), p.10.

Schilling, J., 2017. RANSOMWARE 101-HOW TO FACE THE THREAT. Petroleum Accounting and Financial Management Journal, 36(2), p.6.

Shackelford, S., 2017. Exploring the ‘Shared Responsibility’of Cyber Peace: Should Cybersecurity Be a Human Right?.

Siddiqui, A.S., Lee, C.C. and Saqib, F., 2017. Hardware based protection against Malwares by PUF based access control Mechanism.

Skrzewski, M. and Rybka, P., 2017, June. The Possibilities of System’s Self-defense Against Malicious Software. In International Conference on Computer Networks (pp. 144-153). Springer, Cham.

Yaqoob, I., Ahmed, E., Rehman, M.H., Ahmed, A.I.A., Al-garadi, M.A., Imran, M. and Guizani, M., 2017. The rise of ransomware and emerging security challenges in the Internet of Things. Computer Networks.


Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2018). Cadbury Australia Hit By Ransomware: Cybercriminals. Retrieved from

"Cadbury Australia Hit By Ransomware: Cybercriminals." My Assignment Help, 2018,

My Assignment Help (2018) Cadbury Australia Hit By Ransomware: Cybercriminals [Online]. Available from:
[Accessed 28 May 2020].

My Assignment Help. 'Cadbury Australia Hit By Ransomware: Cybercriminals' (My Assignment Help, 2018) <> accessed 28 May 2020.

My Assignment Help. Cadbury Australia Hit By Ransomware: Cybercriminals [Internet]. My Assignment Help. 2018 [cited 28 May 2020]. Available from: is the leading essay writing service in Australia. We are committed to resolving students' all academic problems and help them acquire higher grades. We provide comprehensive essay paper help to students, who struggle to put up a good quality essay. With 3000+ talented essay writers, we cover 100+ subjects while providing essay writing service to students in Australia. Contact us to premier quality academic assistance at an affordable price.

Latest Management Samples

HI6008 Business Research Data Report

Download : 0 | Pages : 9

Answer: Introduction Accounting is a key aspect which incorporates history of different activities, theories, framework, and model. It also entails the technological intervention. However, there is number of accounting challenges such as effect of modernization, increasing dynamicity and globalization. All these challenges are experienced by the corporation at the global level. There is need to focus on accounting functions to overcome the ch...

Read More arrow

ACC539 Accounting Information Systems01

Download : 0 | Pages : 7
  • Course Code: ACC539
  • University: Charles Sturt University
  • Country: Australia

Answer: Introduction: The report is prepared to be presented to the CEO of Bucks Phyz that deals with the implementation of specific internal controls for mitigation of risks posed by the existing sales process of organization. In the current sales process, accountant is required to raise the purchase order and then it is required to be sent to suppliers. Raising the purchase order took long time and when transactions was to be made online, t...

Read More arrow Tags: Australia Gilberton Management University of New South Wales 

SRR782 Research Methodology

Download : 0 | Pages : 10
  • Course Code: SRR782
  • University: Deakin Business School
  • Country: Australia

Answer: Title: Reduction Of Construction Wastes During Construction Work Of Large Scale Projects In Developing Countries Section 1: Annotated Bibliography Miquel Casals, Núria Forcada, Marcel Macarulla, Analysis of the implementation of effective waste management practices in construction projects and sites, December 2014, Volume 93, 38 “Current waste generation rates are still below predicted levels, and the infrastru...

Read More arrow

BUS708 Statistics And Data Analysis For Proportions Of Agent Lodgement

Download : 0 | Pages : 4
  • Course Code: BUS708
  • University: Kings Own Institute
  • Country: Australia

Answer: Lodgement classification: The frequencies of agent lodgement is found by the excel formula:  “=COUNTIF(C2:C1001, "=1")”. The frequencies of self lodgement is found as: “=COUNTIF(C2:C1001, "=2")”. Proportions are counted by each count/total frequency. By clicking “Insert”, then “Pie”, pie chart is generated. The axes, borders are decorated by right clicking “Format chart area&r...

Read More arrow

MG4101 Operations Strategy 2

Download : 0 | Pages : 10
  • Course Code: MG4101
  • University: University Of Central Lancashire
  • Country: United Kingdom

Answer: Introduction  The report helps in analysing the different kind of business activities along with analysis of the service delivery along with manufacturing process of the Sky Plc Company. Proper identification of the different strategies will help in improving the different processes of manufacturing as well. Proper discussion is essential in nature wherein it has helped in making the organization successful or not successful in n...

Read More arrow

Save Time & improve Grade

Just share Requriment and get customize Solution.

We will use e-mail only for:

arrow Communication regarding your orders

arrow To send you invoices, and other billing info

arrow To provide you with information of offers and other benefits




Overall Rating



Our Amazing Features


On Time Delivery

Our writers make sure that all orders are submitted, prior to the deadline.


Plagiarism Free Work

Using reliable plagiarism detection software, only provide customized 100 percent original papers.


24 X 7 Live Help

Feel free to contact our assignment writing services any time via phone, email or live chat.


Services For All Subjects

Our writers can provide you professional writing assistance on any subject at any level.


Best Price Guarantee

Our best price guarantee ensures that the features we offer cannot be matched by any of the competitors.

Our Experts

Assignment writing guide
student rating student rating student rating student rating student rating 5/5

285 Order Completed

99% Response Time

Eugene Baranowski

MBA in Supply Chain

London, United Kingdom

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

755 Order Completed

95% Response Time

Douglas Cowley

Masters in Finance with Specialization in Audit

Wellington, New Zealand

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

134 Order Completed

95% Response Time

Thomas Nelson

MS in Information Systems Technology with Specialization in Database Administration

New Jersey, United States

Hire Me
Assignment writing guide
student rating student rating student rating student rating student rating 5/5

154 Order Completed

97% Response Time

Harold Alderete

PhD in Economics

London, United Kingdom

Hire Me

FREE Tools


Plagiarism Checker

Get all your documents checked for plagiarism or duplicacy with us.


Essay Typer

Get different kinds of essays typed in minutes with clicks.


GPA Calculator

Calculate your semester grades and cumulative GPa with our GPA Calculator.


Chemical Equation Balancer

Balance any chemical equation in minutes just by entering the formula.


Word Counter & Page Calculator

Calculate the number of words and number of pages of all your academic documents.

Refer Just 5 Friends to Earn More than $2000

Check your estimated earning as per your ability




Your Approx Earning

Live Review

Our Mission Client Satisfaction

The work was very professional and easy to understand excellent service; the writer was very detail and followers all instruction. I was very please with the fast service that I received. Awesome work


User Id: 369399 - 27 May 2020


student rating student rating student rating student rating student rating

The structure was very well done. No grammar mistakes. Speedy service. I would highly recommend whoever wrote this.


User Id: 431962 - 27 May 2020


student rating student rating student rating student rating student rating

Did not regret choosing premium. The writer is extremely good and no doubt I am very impressed with his work! Thank you so much!


User Id: 384662 - 27 May 2020


student rating student rating student rating student rating student rating

thank you so much it was great homework ! you made it in 24 hours , Im happy to work with you.


User Id: 359586 - 27 May 2020


student rating student rating student rating student rating student rating
callback request mobile
Have any Query?