Ryuk Ransomware Operators Shift Tactics to Target Victims | #malware | #ransomware

The Ryuk ransomware operators continue to target critical infrastructure and extract high ransom payments from vulnerable groups, including an attack on a large health care organization last year.

The victim has 90,000 employees and around 400 hospitals, outpatient clinics and behavioral health centers in the U.S. and U.K. During the attack, which shut down computers and systems at all of its U.S. health care centers, the group had to send patients to other hospitals.

In early October, the health care provider said it was restoring its main IT network and reconnecting applications. It had recovered its servers at the corporate data center, as well as linked U.S. inpatient facilities back to the data center.

Other Ryuk ransomware victims include several oil and gas companies, a U.S. agency, a large engineering and construction services firm, city and county government, a financial software provider, a food and drink manufacturer and a newspaper.

 In June 2020, the FBI issued an alert warning that Ryuk ransomware operators were targeting K-12 educational institutions. In this alert, the agency reported an increased number of Ryuk ransomware attacks exploiting remote desktop protocol (RDP) endpoints to carry out school ransomware attacks.

New Tools, More Money

The Ryuk ransomware, which was first spotted in 2018, was derived from the source code used by the Hermes ransomware. Threat actors deploy it using manual hacking techniques and open-source tools to move through networks. By doing this, they secure administrative access to as many systems as possible before encrypting files.

They had been using Emotet and TrickBot as initial droppers for Ryuk ransomware and leveraging commodity trojans, but recently shifted tactics. They now employ encoded PowerShell commands to download the initial payload, disable security tools, stop data backups and scan the network. In addition, they exploit Windows Management Instrumentation (WMIC) and BitsAdmin to deploy the ransomware.

This strategy shift is designed to avoid detection and enable the Ryuk ransomware to remain on infected networks longer.

Ryuk Ransomware Hits Government Systems

The Ryuk ransomware actors recently used these new tools to compromise a government organization and encrypt close to 2,000 systems and critical services. To do so, the attackers compromised a domain administrator account by accessing the passwords stored in a group policy.

First, the attackers used PowerShell to disable malware monitoring protection and scan the network. Next, they used BitsAmin, WMIC and PowerShell with privileged account credentials to copy Ryuk to additional hosts.

How to Defend Against Ryuk Ransomware

To help companies combat the threat, the U.S. federal government has issued guidance on ransomware prevention.

The guidance recommends that you ask the following questions to ensure your networks are secure from attacks like Ryuk ransomware:

Backups: Do we back up critical information? Are backups stored offline? Have we tested our capacity to recover backups during an attack?

Risk Analysis: Have we carried out a risk analysis of the organization?

Staff Training: Have we conducted staff training on cybersecurity best practices?

Vulnerability Patching: Have we implemented comprehensive patching of system vulnerabilities?

Application Whitelisting: Do we allow only approved applications on our networks?

Incident Response: Have we written an incident response plan? Have we practiced it?

Business Continuity: Are we able to continue business operations without access to critical systems? For how long? Have we tested this?

Penetration Testing: Have we tried to hack into our own systems to test their security and our ability to defend against attacks?

In the end, your workplace can best protect users from attacks like the Ryuk ransomware by employing basic cybersecurity hygiene. This will prevent most, if not all, network breaches and other attacks.

Original Source link

Leave a Reply

Your email address will not be published.

forty seven + = 57