Ryuk is a type of ransomware that once deployed encrypts files on an infected system. Ransom is typically demanded in bitcoin or other types of cryptocurrency. Ryuk has targeted many large organizations using Microsoft Windows and related systems. First spotted in August 2018 and initially thought to be a group that operates out of North Korea, however it is now believed to have been developed by Russian hackers. 70% of managed service providers (MSPs) report that ransomware is the most common malware threat to their clients. Protecting against Ryuk, and dealing with an attack is a critical functionality and key differentiator for MSPs.
What is unique about Ryuk Ransomware and why is it so successful?
Ryuk is unique in that it is, as Microsoft defines it, a human-operated ransomware attack. The attackers use highly sophisticated targeting and stealth tactics to ensure a high rate of success. Being human-operated means that attackers execute multi-level attacks against company networks.
It starts with carefully selecting targets rather than adopting an automated, “spray and pray” approach, and requires both broad and specific knowledge of target infrastructure in order to succeed. It then relies on tools such as Mimikatz to steal user credentials, after which the likes of PowerShell Empire are leveraged to perform reconnaissance and move laterally across the environment, finally perpetrating privilege escalation through Domain Administrator. This isn’t a quick in-and-out. This is a prolonged, ongoing attack that has real people active inside the network, gathering data. The attackers generally choose their targets carefully, going for large organizations rather than individuals. This has not only launched the Ryuk ransomware into the headlines but also netted the operators of the ransomware millions of dollars in ransom payments.
Famous Ryuk attacks in the news
Ryuk attack victims reportedly include large organizations, local governments, hospitals, and more. For example:
- The Department of Social Services
- Tribune Publishing including the Los Angeles Times, Chicago Tribune, Wall Street Journal, and the New York Times
- Boston’s Committee for Public Counsel Services
- Jackson County, Georgia, (paid a $400,000 ransom)
- Riviera Beach, Florida (paid $594,000 ransom)
- LaPorte County, Indiana (paid $130,000 ransom)
How is Ryuk delivered?
Like many other strains, Ryuk ransomware attacks are primarily delivered via a phishing email. According to the U.S. Cybersecurity and Infrastructure Security Agency (CISA), Ryuk is spread by “phishing campaigns that contain either links to malicious websites that host the malware or attachments with the malware.
In a nutshell, a user would receive a phishing email that looks legitimate at first glance. Attached to the email is a compromised Microsoft Office document. This document might be called “Quarterly Results”, or something similarly innocuous. However, upon opening the document, attackers use the macro function to begin executing code. Once this process is started, attackers use a toolbox of products to move laterally within the organization and gain ever higher access privileges.
Ryuk was identified over two years ago. Why does it still wreak havoc?
Ransomware attacks change constantly. Attackers are leveraging automation to mutate common threat variants, resulting in a massive increase in previously unseen first-time threats.
This is a popular technique allowing attackers to bypass most security solutions – which typically misidentify variants of existing threats even if the original threats already have their signatures registered. This weakness allows attackers to continue to target organizations, bypass their existing security solutions, and deploy their payload on the victim’s network.
Combat the latest threats with Datto’s ransomware solutions >
The old Ryuk vs. the new Ryuk
In January 2021, a new Ryuk variant was identified. New variants emerge all the time, but this one had an enormous impact since it has worm-like capabilities allowing it to automatically spread laterally within the infected networks. Previous versions of Ryuk could not automatically move laterally through a network and required a dropper and then manual movement. The new version entails a computer worm spreading copies of itself from device to device without any human intervention required.
How to protect against the next Ryuk variant – even before you know it’s out there
As we’ve noted previously, Ryuk, like other common ransomware instances, is primarily deployed using a phishing or spear-phishing email. Phishing is tricky and even the most experienced cyber experts aren’t always able to detect it. Therefore, in addition to educating employees on how to avoid phishing threats, the best defense against such an attack for yourself and your clients is to ensure that you use advanced protection for email and other collaboration tools, one that covers phishing as well as malware. When selecting a protection solution, use one that uses an attack-agnostic detection mechanism so it will protect from unknown Ryuk variants as they emerge.
In addition, since Ryuk looks for the weakest link in the chain, it’s highly recommended to constantly scan your network and systems for security vulnerabilities and patch those as soon as they are detected.
What is the ransom demand in Ryuk attacks?
Ransom amounts vary, but there have been records of Ryuk attacks demanding ransoms in the millions of dollars. Remember, paying the ransom is not the solution to escaping a ransomware attack.
How to detect and stop Ryuk infections
First and foremost, it’s important to have ransomware detection and remediation in place for you as business and for your clients. Ransomware detection is a component of backup systems that can reduce the impact of an attack. By detecting an attack early, systems can be quickly isolated and recovered to prevent paying the attacker a ransom for decryption.
For example, our remote monitoring and management (RMM) enables to remotely monitor, manage, and support every endpoint under contract. This provides an additional layer of security, one with native ransomware detection.
If ransomware is detected, RMM automatically sends alerts allowing us to take proactive steps. These include terminating the ransomware process and isolating the infected device to prevent the ransomware from spreading. This serves to reduce downtime and saves us from having to wait for clients to report possible infections.