Ryuk is a type of ransomware that encrypts files on an infected system, with the ransom typically demanded in bitcoin or other types of cryptocurrency. Ryuk has targeted many large organisations using Microsoft Windows and related systems.
First spotted in August 2018, it was initially thought to be a group that operates out of North Korea, but now is believed to have been developed by Russian hackers. With rising ransomware and phishing attacks becoming significant threats, 66% of SMBs report that they are concerned or extremely concerned — as we all should be.
Ryuk is unique in that it is, as Microsoft defines it, a human-operated ransomware attack. The attackers use highly sophisticated targeting and stealth tactics to ensure a high rate of success. Being human-operated means that attackers execute multi-level attacks against company networks. It starts with carefully selecting targets rather than adopting an automated, “spray and pray” approach, and requires both broad and specific knowledge of target infrastructure in order to succeed.
This isn’t a quick in-and-out. This is a prolonged, ongoing attack that has real people active inside the network, gathering data.
The attackers generally choose their targets carefully, going for large organisations rather than individuals. This has not only launched the Ryuk ransomware into the headlines but also netted the operators of the ransomware millions of dollars in ransom payments.
Like many other strains, Ryuk ransomware attacks are primarily delivered via a phishing email. According to the U.S. Cybersecurity and Infrastructure Security Agency (CISA), Ryuk is spread by phishing campaigns that contain either links to malicious websites that host the malware or attachments with the malware.
In a nutshell, a user would receive a phishing email that looks legitimate at first glance. Attached to the email is a compromised Microsoft Office document. This document might be called “Quarterly Results”, or something similarly innocuous. However, upon opening the document, attackers use the macro function to begin executing code. Once this process is started, attackers use a toolbox of products to move laterally within the organisation and gain ever higher access privileges.
Ransomware attacks change constantly. Attackers are leveraging automation to mutate common threat variants, resulting in a massive increase in previously unseen first-time threats. This is a popular technique allowing attackers to bypass most security solutions – which typically misidentify variants of existing threats even if the original threats already have their signatures registered. This weakness allows attackers to continue to target organisations, bypass their existing security solutions, and deploy their payload on the victim’s network.
In January 2021, a new Ryuk variant was identified. New variants emerge all the time, but this one had an enormous impact since it has worm-like capabilities allowing it to automatically spread laterally within the infected networks. Previous versions of Ryuk could not automatically move laterally through a network and required a dropper and then manual movement. The new version entails a computer worm spreading copies of itself from device to device without any human intervention required.
As we’ve noted previously, Ryuk, like other common ransomware instances, is primarily deployed using a phishing or spear-phishing email. Phishing is tricky and even the most experienced cyber experts aren’t always able to detect it. Therefore, in addition to educating employees on how to avoid phishing threats, the best defence against such an attack for yourself and your clients is to ensure that you use advanced protection for email and other collaboration tools, one that covers phishing as well as malware.
In addition, since Ryuk looks for the weakest link in the chain, it’s highly recommended to constantly scan your network and systems for security vulnerabilities and patch those as soon as they are detected. If you don’t have the expertise to do that yourself, that is something we do for our clients.
Ideally, you want to stop Ryuk from ever getting into your network, for example by blocking the phishing attempts often used to spread ransomware through email and collaboration tools.
We use email scanning software that detects phishing attempts and ransomware based on its behaviour, rather than relying on signature-based software that often misses new malware variants. Scanning emails is only one layer of defence though. We take a layered approach to our cyber security. This means if anything gets past your outer defences, it will be blocked by the next layer of defence, reducing the impact of an attack. By detecting an attack early, systems can be quickly isolated, reducing the impact of an attack.
With sophisticated Remote Monitoring and Management (RMM) tools, we are able to detect and correct problems with every endpoint on our clients’ networks. While this can be used to address routine maintenance issues, it includes native ransomware detection and remediation capabilities. If ransomware is detected, the RMM automatically alerts us to take proactive steps to stop it. That includes terminating the ransomware process and isolating the infected device to prevent the ransomware from spreading. This reduces downtime and allows us to stop threats before you even become aware of them.
Then the challenge is to recover any systems that may have been damaged in the attack to a ransomware-free state. Whether you will be able to do that depends largely on whether you have complete system image backups of important data. That includes cloud-based systems, for example Microsoft 365 and Microsoft Azure. Make sure your backups themselves are protected against ransomware because attackers will try to corrupt those, too. We have invested heavily in a number of advanced backup toolsets that will restore your data in minutes and eliminate downtime for your business.
Contact us today to learn more.