BOOK A DEMO

Not-Petya is an understatement… Say hello to the latest destructive malware campaign.

This week saw another large-scale cyber-attack sending shock waves as it hit world leading enterprises and national IT infrastructures. NotPetya seemed to be yet another successful, fast spreading ransomware attack, but is now widely believed to be sophisticated wiper malware disguised as ransomware. In this blogpost, we will describe the attack and the malware behind it, discuss the meaning and implications of the events and lastly, present key takeaways and lessons learned.

The attack began early on Tuesday June 27th, and in the first half of the day appeared to be a wide spread attack across Ukraine, but with no major implications elsewhere. As the day progressed, more and more reports, mainly from Europe and the Americas, indicated that much like several weeks ago, when Wanna-Cry first hit, this attack is spreading fast and infected organizations are taking a major hit.

We believe NotPetya was written by a sophisticated threat actor. NotPetya elegantly implements concepts and exploits that proved to be successful in Petya and WannaCry, and combines them with additional methods for lateral movement and user output tricking victims. As a result of the media buzz, the attack and its scope are becoming more difficult to understand and analyze.

Initial Attack Vector and Lateral Movement

The first clue to the NotPetya focus on Ukrainian targets can be found in its initial attack vector. It appears that a legitimate update process (EzVit.exe) for a tax accounting software developed by the Ukrainian company M.E.Doc has been compromised and executed command lines dropping the malware. This was confirmed by Ukrainian Cyber Police and Microsoft Telemetry.

There are have also been reports of the malware being dropped by RTF files exploiting CVE-2017-0199 which allows to execute VBS and PowerShell commands contained in HTA files (the exploit downloads the HTA from a URL found in OLE2 files embedded in mostly RTF or doc files).

Infection based on supply chain vectors is impressive on its own, but lateral movement is this malware’s specialty. NotPetya can spread onto the network using credentials stolen by an adapted 32/64 bit Mimikatz version. Once credentials are stolen, the malware will rigorously search for network connections (enumerate all network adapters, DHCP leases). It will try to connect to every on TCP ports 139 and 445. Eventually it will copy the binaries onto the new victim machines and will then attempt to execute them using legitimate tools PSEXEC or WMI command line.

Other than that, NotPetya also leverages both Eternal-Blue and Eternal-Romance, the recently leaked and patched SMB vulnerabilities. Where these exploits apply, they are used to copy and execute the malware.

Behavior and Encryption

1. The malware will first overwrite the MBR (hence the resemblance to Petya) with code that will display the ransom message and encrypt the files on the drive.

Figure 1 – Ransom note in the malware file.

Figure 1 – Ransom note in the malware file.

2. At this point the malware will also check for hashes of process names. Brute-Forcing the hashes confirmed those to be  Kaspersky, Norton Security or Symantec processes. NotPetya will change its behavior accordingly (not run PSEXEC for example) or even not run at all. It will also verify the existence of the DLL perfc.dat (the same sample) to refrain from double execution. This can indeed be used as a “kill switch” of a sort.

3. It will then carry out its worm-like behavior described above and attempt to move laterally.

4. Then files encryption will start. It is interesting to note that files are encrypted using file mapping API’s (CreateFileMapping and MapViewOfFile) rather the more standard ReadFile/WriteFile API’s. We believe this is done to evade heuristic signatures that identify excessive use of the latter. Another evasive measure is deleting logs

5. Once encryption of files is completed (file types list at the end) the system will randomly reboot within 10-60 minutes.

6. During the boot a chkdsk screen will appear. Meanwhile the Master File Table – MFT will be encrypted as well.

Figure 2 – chkdsk screen displayed as MFT and other files are encrypted.

Figure 2 – chkdsk screen displayed as MFT and other files are encrypted.

7. Than finally the infamous ransom note will appear.

Figure 3 – The ransom not

Figure 3 – The ransom not

So, it’s not ransomware?

So far, sounds like we have a well-planned and written ransomware. But it is not. Right from the beginning of the attack two of its features seemed to be not consistent with a ransomware campaign aimed at monetization. First, a single Bitcoin wallet used for all ransom payments is a rare occasion. Second, the email to send payment and ID information is a regular account on a well-known German webmail service. The email address was deactivated shortly after the attack became known.

Those were early hints to the more important discovery – NotPetya’s encryption of files and corruption of MFT and the MBR are not meant to be reversible. Researcher Matt Suiche was among the first to realize that the MBR sectors overwritten are not stored anywhere and are lost (unlike original Petya code that encodes or encrypts them in a reversible manner).

Moreover, the so called “installation key” is randomly generated and cannot be used for providing a key for decryption. And while the encryption seems to be using standard AES implementation, encryption experts are saying there might be some bugs in the code that might render files un-decipherable even with the right key.

Well, we now have “ransomware” whose creator we can’t contact, has irreversibly damaged hard disk sectors, and encrypted the MFT and most of the file system, while the encrypted key (which should be decrypted and then used for decryption of files) is nowhere to be found.

This pretty much proves what everyone has come to realize – This was a destructive wiper attack, using Ransomware methods and user experience to attract publicity and resonate the effects of the attack. As mentioned earlier, the combination of powerful lateral movement capabilities and a sophisticated initial attack vector made NotPetya a remarkable campaign and unfortunately a successful one in the eyes of its perpetrators.

It remains unclear if the attack was intended to be contained to Ukraine only. While it is obvious that Ukraine was a big priority for the attackers, we doubt they didn’t expect the variants to travel much further than that quite fast.  since we believe the attackers fully understood the potential effect and spread this campaign could have.

This attack reminded us yet again, that many security solutions are struggling with new, unseen and sophisticated malware. Unfortunately, this struggle translates to huge, renowned enterprises based on multi-layered security postures still being vulnerable to advanced attack groups.

Another disturbing take away is the (rising) use of supply chains and legitimate tools as attack surfaces and enablers. This tactic requires industry officials as well as IT professionals to be more innovative and creative in finding solutions and mechanisms that minimize threats and risks while not creating overly policed, regulated and compliance oriented (rather than task oriented) work environments.

Since the start of this attack, Deep Instinct’s Research Team has been collecting and reviewing all samples associated with it. We are happy to report that Deep Instinct’s customers have been fully protected from NotPetya throughout the attack without any need for updates. The predictive nature of Deep Learning  as it is applied in Deep Instinct’s technology has once again proven to be essential in protecting against today’s threats.

IOC:

17dacedb6f0379a65160d73c0ae3aa1f03465ae75cb6ae754c7dcb3017af1fbd

ee29b9c01318a1e23836b949942db14d4811246fdae2f41df9f0dcd922c63bc6

027cc450ef5f8c5f653329641ec1fed91f694e0d229928963b30f6b0d7d3a745

64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1

02ef73bd2458627ed7b397ec26ee2de2e92c71a0e7588f78734761d8edbdcd9f

fe2e5d0543b4c8769e401ec216d78a5a3547dfd426fd47e097df04a5f7d6d206

eae9771e2eeb7ea3c6059485da39e77b8c0c369232f01334954fbac1c186c998

02ef73bd2458627ed7b397ec26ee2de2e92c71a0e7588f78734761d8edbdcd9f

eae9771e2eeb7ea3c6059485da39e77b8c0c369232f01334954fbac1c186c998

64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1

027cc450ef5f8c5f653329641ec1fed91f694e0d229928963b30f6b0d7d3a745

eae9771e2eeb7ea3c6059485da39e77b8c0c369232f01334954fbac1c186c998

64b0b58a2c030c77fdb2b537b2fcc4af432bc55ffb36599a31d418c7c69e94b1

027cc450ef5f8c5f653329641ec1fed91f694e0d229928963b30f6b0d7d3a745

45ef8d53a5a2011e615f60b058768c44c74e5190fefd790ca95cf035d9e1d5e0

02ef73bd2458627ed7b397ec26ee2de2e92c71a0e7588f78734761d8edbdcd9f

Encrypted files:

.3ds, .7z, .3ds, .7z, .accdb, .ai, .asp, .aspx, .avhd, .back, .bak, .c, .cfg, .conf, .cpp, .cs, .ctl, .dbf, .disk, .djvu,  .doc ,docx, .dwg, .eml, .fdb, .gz, .h, .hdd, .kdbx, .mail, .mdb, .msg, .nrg, .ora, .ost, .ova, .ovf, .pdf, .php, .pmf, .ppt, .pptx, .pst, .pvi, .py, .pyc, .rar, .rtf, .sln .sql, .tar, .vbox, .vbs, .vcb, .vdi, .vfd, .vmc .vmdk, .vmsd., vmx., vsdx., vsv, .work .xls, .xlsx, .xvd, .zip

5
New Call-to-action

Book a Demo

See the benchmarks for yourself!

To understand how you can thoroughly protect your organization against unknown and known threats, from any digital touchpoint, book your private demo with a Deep Instinct expert consultant.

Get an overview of how Deep Instinct’s security solution works, as well as an initial assessment of your specific security needs.

Start instinctively protecting your organization against all threats.

*
*
*
*
* We respect your privacy. Read our Privacy Policy
BOOK A DEMO TODAY

Terms of Use

Last updated: 20 September, 2015

THIS WEBSITE, www.Deep Instinct.com (the “Site”), is owned and operated by Deep Instinct Ltd. (“Deep Instinct”, “we”, “us” or “our”). Any use of this Site or the services available on the site from time to time (“Services”) is subject to and conditioned upon your consent to and compliance with, all of the terms and conditions in this terms of use agreement (the “Agreement”) which also incorporates our privacy policy [insert hyperlink to privacy policy]. By accessing and using the Site and/or any Services made available on it you hereby consent to be bound by this Agreement. If you do not agree with any of the terms and conditions of use, please cease any use or access to this Site and any use or access to the Services. We may amend this Agreement at any time by posting the amended terms on the Site. Your continued use of the Site or Services shall constitute your consent to any changes made. If you do not agree to the new or different terms, you should not use the Site or the Service. This Agreement may not be otherwise amended.

THE SITE AND THE SERVICES

We are engaged in the business of development, configuration, marketing, sales, integration and implementation of projects and solutions (including tactical verticals thereof) in the field of cyber security and our Site provides informative, educational and promotional information on our company, our products, and our services. We currently do not offer a direct download of our products from our site and provide our software directly to you subject to additional terms and conditions which are detailed in the end user license agreement accompanying each copy of our products.

ELIGIBILITY TO USE OUR SERVICES

This Site is aimed for use by individuals who are natural persons, who are at least 13 years old and who are of sufficient legal age and capability to form a binding agreement under the laws of their domicile. You may not use the Site and the Services and may not accept this Agreement if (a) you are not of legal age to form a binding contract with Deep Instinct (as determined in your domicile), or (b) you are a person barred from using the Site or the Services under the laws of the United States or Israel or other countries including the country in which you are domiciled or from which you access or use the Site and/or the Services. Subject to applicable law, Deep Instinct may, in its sole discretion, refuse to offer the Site and the Services to any person or entity and change its eligibility criteria at any time.

ELECTRONIC COMMUNICATIONS

When you contact us by sending emails to us, you are communicating with us electronically and you consent to receive communications from us electronically. We will communicate with you by email (if and to the extent you choose to provide with your e-mail address) or by posting notices on this Site. You agree that all agreements, notices, disclosures and other communications that we provide to you electronically satisfy any legal requirement that such communications be in writing.

PROPRIETARY RIGHTS

The Site, the Services and the content therein are proprietary to us and/or our licensors. Any and all intellectual property rights related to the Services and the Site are and shall remain our exclusive property or our licensors. Nothing in this Site grants any license or right to use any marks displayed on this Site without the written permission of the owner of the mark. Your misuse of the marks displayed on this Site or any other content on this Site is strictly prohibited. Without derogating from any of the provisions herein, you agree not to decompile, reverse-engineer, copy, transfer, assign, rent, resell, distribute or use the Site or the Services (or any part thereof, or any software underlying the Service), other than as expressly authorized by Deep Instinct. Any and all trademarks, service marks, product names, and trade names of Deep Instinct appearing on or through the Site and/or Service are exclusively owned by Deep Instinct. All other trademarks, service marks, product names, and logos appearing on or through the Service are the property of their respective owners. You may not use or display any trademark, service mark, product name, trade name, or logo appearing on or through the Service without the owner's prior written consent. Furthermore, the site is intended for use by natural persons. Any access or use of the Site by any automated means including but not limited to spiders, bots, scrapers and the like is prohibited. Any use of any information collected by such automated means constitutes a violation of this Agreement. Any use of the Site or any parts thereof or information therein for any commercial purposes is prohibited.

COMPLIANCE WITH LAWS

Access or use of the Internet or of certain websites may be prohibited in certain territories and/or certain restrictions may apply to you in such territories. Don’t access this Site if such access is prohibited under law applicable to you. You agree that your use of the Site and Services shall not violate any applicable local, national or international law, including but not limited to any regulations having the force of law.

LINKS TO OTHER WEBSITES

This Site may contain links and references to websites of others. We may, from time to time, at our sole discretion, add or remove links to other websites. These links are provided solely for informative purposes and as a convenience to you, and access to any such websites is at your own risk. We recommend that you review the information provided by third parties (such as, but not limited to, the terms of service and privacy policy of the relevant website) before accessing such websites. We do not review, approve, monitor, endorse, warrant, or make any representations with respect to such websites. In no event will we be responsible for the information contained in such websites, their practices or for your use of or inability to use such websites, or transmissions received from such sites. You expressly relieve us from any and all liability arising from your use of any third-party website. We encourage you to be aware when you leave the Site, and to read the terms and conditions and privacy policy of such other website/s that you visit.

NO WARRANTY

THE SITE, AND ANY SERVICES OFFERED THROUGH IT IS PROVIDED ON AN "AS IS" BASIS WITHOUT WARRANTIES OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, WARRANTIES OF TITLE OR IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. YOU EXPRESSLY AGREE THAT USE OF THE SITE IS AT YOUR SOLE RISK. NEITHER DEEP INSTINCT, ITS SUBSIDIARIES, ITS AFFILIATES NOR ANY OF THEIR RESPECTIVE EMPLOYEES, AGENTS, THIRD PARTY CONTENT PROVIDERS OR LICENSORS WARRANT THAT THE SITE WILL BE UNINTERRUPTED OR ERROR FREE; NOR DO THEY MAKE ANY WARRANTY AS TO THE RESULTS THAT MAY BE OBTAINED FROM USE OF THE SITE, OR AS TO THE ACCURACY, RELIABILITY OR CONTENT OF ANY INFORMATION, SERVICE, OR MERCHANDISE PROVIDED THROUGH THE SITE.

THE SITE OFFERS CERTAIN INFORMATION ABOUT THE COMPANY AND ITS PRODUCTS AND SERVICES, INCLUDING A KNOWLEDGE BASE IN WHICH THE COMPANY MAY UPLOAD CERTAIN DOCUMENTS OR PRESENTATIONS. SUCH INFORMATION IS DESIGNED FOR EDUCATIONAL AND INFORMATIONAL PURPOSES ONLY. THE INFORMATION CONTAINED ON THE SITE DOES NOT AND IS NOT INTENDED TO PROVIDE ANY REPRESENTATION OR WARRANTIES AS TO THE PRODUCTS, THEIR CAPABILITIES OR THEIR USE. ALL SUCH INFORMATION IS SPECIFICALLY PROVIDED IN THE DOCUMENTATION ACCOMPANYING THE COMPANY’S PRODUCTS AND SUCH DOCUMENTATION IS THE ONLY SOURCE OR REPRESENTATION AND WARRANTIES AS WITH RESPECT TO THE COMPANY’S PRODUCTS. YOU SHOULD NOT RELY ON THIS INFORMATION AS A SUBSTITUTE FOR, NOR DOES IT REPLACE THE COMPANY’S PRODUCTS’ DOCUMENTATION. DEEP INSTINCT IS NOT RESPONSIBLE FOR ANY ACTIONS OR INACTION ON YOUR PART BASED ON THE INFORMATION THAT IS PRESENTED IN THE SITE.

LIMITATION OF LIABILITY

IN NO EVENT SHALL WE, OUR SUBSIDIARIES, OFFICERS, DIRECTORS, EMPLOYEES OR OUR SUPPLIERS BE LIABLE FOR LOST PROFITS OR ANY SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF OR IN CONNECTION WITH OUR SITE, OUR SERVICES OR THIS AGREEMENT, HOWEVER ARISING. IF YOU ARE DISSATISFIED WITH THE SITE OR THE SERVICES OR ANY MATERIALS THEREON, OR WITH THESE TERMS AND CONDITIONS, YOUR SOLE AND EXCLUSIVE REMEDY IS TO DISCONTINUE USING THE SITE AND SERVICES. WITHOUT DEROGATING FROM ANY OF THE FOREGOING, OUR TOTAL AGGREGATE LIABILITY UNDER THIS AGREEMENT, IF ANY, IN CONNECTION WITH THE SITE, THE SERVICES OR THE AGREEMENT WILL NOT EXCEED USD $100. THE FOREGOING LIMITATIONS SHALL APPLY NOTWITHSTANDING ANY FAILURE OF ESSENTIAL PURPOSE OF ANY LIMITED REMEDY AND ARE FUNDAMENTAL ELEMENTS OF THE BARGAIN BETWEEN US AND YOU.

PRIVACY POLICY

Information that we collect and use about you is subject to our Privacy Policy located at http://www.dinstinct.com/privacy. By accessing this Site you consent to the collection and use of information as described in our Privacy Policy, as may be amended by us from time to time.

GOVERNING LAW; DISPUTE RESOLUTION

The laws of Israel will govern this Agreement, without regard to its conflict of law principles. Any and all legal claims, suits or actions that arise in connection with this Agreement and/or the Site or Services, claimed against us shall be brought exclusively in the courts located in Tel-Aviv, Israel. You agree that this Site shall be deemed a passive website that does not give rise to personal jurisdiction over Deep Instinct, either specific or general, in jurisdictions other than Israel.

LIMITATION OF CLAIMS

You agree that regardless of any statute or law to the contrary, any claim or cause of action arising out of or related to use of the Services or the Agreement must be filed within one (1) year after such claim or cause of action arose or be forever barred.

WAIVER AND SEVERABILITY

The failure of Deep Instinct to exercise or enforce any right or provision of this Agreement shall not constitute a waiver of such right or provision. If any of the provisions of this Agreement are held invalid, unenforceable, or void by a court or other tribunal of competent jurisdiction, the parties nevertheless agree that the court should endeavor to give effect to the parties' intentions as reflected in the provision, and the other provisions of the Agreement remain in full force and effect.

Deep Instinct Privacy Policy

Last updated: 20 September, 2015

This Privacy Policy ("Privacy Policy") describes the policies and practices of Deep Instinct Ltd. ("we," "us," or "Deep Instinct") and the choices you have in connection with the collection, use and disclosure of your personal information that you provide to us or that may be generated by your use of our website (the "Site"). Please review carefully this Privacy Policy before making any use of the Site. Each use of the Site by you constitutes your consent to the collection, transfer, storage, disclosure and other uses of your personal information as described in this Privacy Policy.

THE PRIVACY PHILOSOPHY OF DEEP INSTINCT

Your privacy is important to Deep Instinct. We follow generally accepted industry standards to protect the personal information submitted to us, both during transmission and once we receive it. However, due to the nature of Internet communications and evolving technologies, unauthorized entry or use, hardware or software failure, and other factors, the security of user information may be compromised at any time. No method of transmission over the Internet, or method of electronic storage, is 100% secure.

COLLECTION OF PERSONAL INFORMATION

We do not actively collect personal identifiable information. When you visit our Site you remain anonymous. Some areas of our Site may however require you to provide us with certain information, such as a user's name, email address, contact information and other personally-identifiable information ("Personal Information") may be collected from you and stored in our databases, request support, enter into a sales promotion or otherwise interact with us (for example through the "contact us" option). When you submit or make available your Personal Information through the Service, you are giving your consent to the collection, use and disclosure of such information pursuant to this Privacy Policy. If you do not wish us to collect any Personal Information from you, please do not provide us with any such information. However if you will not provide us with the required information we may not be able to provide you with the information/services requested by you.

COLLECTION OF NON-PERSONALLY IDENTIFIABLE INFORMATION

Our servers automatically collect data about your Internet Protocol address when you visit us. We collect non-identifiable information about your access to our site and your visit to it. We may also collect technical non identifiable information about the type of web browser, computer, platform, related software and settings you are using; any search terms you have entered on our Site or a referral website; and other web usage activity and data logged by our web servers. When you use the Site, we may employ clear gifs (also known as web beacons) which are used to track the online usage patterns of our users anonymously. In addition, we may also use clear gifs in HTML-based emails sent to our users to track which emails are opened by recipients. The information is used to enable more accurate reporting, improve the effectiveness of our marketing, and make Deep Instinct better for our users.

We may use "cookies" on or in connection with our Site to maintain non personally identifiable information about you. A cookie is a very small text document, which often includes an anonymous unique identifier. Deep Instinct may use both "session" cookies and "persistent" cookies. A persistent cookie remains on your hard drive after you close your browser. Persistent cookies may be used by your browser on subsequent visits to the Site. Persistent cookies can be removed by following your web browser’s directions. A session cookie is temporary and disappears after you close your browser. When you visit our Site, our computer may ask your computer for permission to employ the use of a session or persistent cookie. Our Site will then send a cookie to your browser if your browser’s preferences allow it, but (to protect your privacy) your browser only permits our Site to access the cookies it has already sent to you and not the cookies sent to you by other websites. Most web browsers can be adjusted to inform you when a cookie has been sent to you and provide you with the opportunity to refuse that cookie. However, refusing a cookie may, in some cases, preclude you from using, or negatively impact the display or function of, our Site or certain areas or features of our Site.

HOW WE USE INFORMATION

The personal information you provide to us may be used for a variety of purposes such as provide you with support, sales promotion or other interaction with us (for example through the "contact us" option). Any such use will be made only following your affirmative express consent through our Site. Your information may also be used by us, in aggregate manner for internal purposes to improve our site, content, customize advertising and content. We may also use information we collect for internal analytical purposes.

Deep Instinct uses "cookies", web beacons, log file information and other non-personally identifiable information for purposes such as to: (a) collect website users' usage data to enable easy access to the Site and otherwise improve the Site; (b) provide custom, personalized content and information; (c) monitor the effectiveness of the Site; (d) monitor aggregate metrics such as total number of visitors and pages viewed; and (e) track your entries and submissions to the Site.

HOW WE SHARE YOUR PERSONAL INFORMATION

Deep Instinct will not rent or sell your Personal Information to others.

OPT-OUT OPTIONS AND UNSUBSCRIBING

Deep Instinct may send you, from time to time, email communications, with news and updates about the Service or other products, as well as other marketing communications and promotional offers. If, you wish to stop receiving such promotional information you can opt-out by clicking the “unsubscribe” link available at the bottom part of each email sent from Deep Instinct which will remove your email address from any such mailing lists.

LINKS

The Site may contain links to third parties' web sites. While we attempt to provide links to sites that value your privacy, we cannot be responsible for the content or privacy policies of such sites. We encourage you to carefully review the privacy policies of such third parties' Web sites linked or provided through the Site prior to any use of such Web sites.

BUSINESS TRANSFERS

In the conduct of our business, we may sell some of our assets. Information collected from users of the Site, including personal information, could be transferred as part of such transaction. By submitting your personal information through the Site, you agree that your information may be transferred to third parties under such or similar circumstances.

CHANGES TO THIS PRIVACY POLICY

Deep Instinct may occasionally revise this Privacy Policy to reflect changes in its Site and other practices. Therefore, you should review Deep Instinct's Privacy Policy prior to each use of the Site, particularly each time before you submit your personal information through the Service, so you could be informed of any changes in our privacy practices. At all times, the most current version of our privacy policy will supersede any other versions of our privacy policy. You can determine when the Privacy Policy was last modified by checking the "Last updated" legend at the top of the Privacy Policy. If the policies described in our Privacy Policy change in any material respect, we will notify you by posting the revised policy on our Site, by email, or by other means that we may choose and as required by applicable law. We may apply changes to information previously collected by us, to the extent permitted by law. If you do not agree to be bound by the terms of the new or modified Privacy Policy, you agree to immediately notify us that your personal information should be deleted. Your continued use of the Site after such changes become effective constitutes your acceptance of any such changes.

HOW TO CONTACT US

If you have any questions or comments regarding this Privacy Policy, you can contact us by email at: Contact@dinstinct.com. GENERAL

This Privacy Policy replaces all previous disclosures we may have provided to you about our privacy practices associated with the Site. The examples contained in this Privacy Policy are illustrations only and are not intended to be exhaustive.