January 15, 2020 By David Bisson 2 min read

Security researchers observed the Ryuk ransomware using a special hardware feature to wake up powered-down devices in order to encrypt them.

According to Bleeping Computer, a security researcher observed some samples of Ryuk ransomware spawning subprocesses with “8 LAN” as their argument upon execution. Ryuk leveraged this argument to scan the device’s ARP table. It did so in an effort to check if the listed entries of network devices were part of the “10.,” “172.16.” and/or “192.168” private IP address subnets.

If it found that any of the entries appeared on any of those networks, Ryuk used a hardware feature known as “Wake-on-Lan” to wake up a powered-down device by sending it a “magic packet.” The ransomware then attempted to mount the device’s C$ administrative share and encrypt the computer’s drive in the event that the Wake-on-Lan request was successful. Subsequently, this technique helped Ryuk reach into a corporate network from a single compromised device.

A Look at Ryuk’s Recent Threat Activity

The technique described above is just the latest instance in which Ryuk has made headlines. Back in early December, Emsisoft discovered a bug in a decryptor that Ryuk’s operators provided to paying victims. This security issue, in turn, could have prevented victims from successfully recovering large files encrypted by the ransomware.

Just a few days later, Bleeping Computer reported on a memory dump that contained numerous references to Ryuk and the city of New Orleans, indicating that the threat could have been responsible for the New Orleans ransomware attack. The next day, the U.S. Coast Guard disclosed that a Maritime Transportation Security Act (MTSA) regulated facility had suffered a Ryuk ransomware infection.

How to Defend Against Ryuk Ransomware

Security professionals can help defend against a Ryuk ransomware infection by having the latest threat intelligence to stay on top of emerging attack trends and techniques. Organizations should also implement a solid data backup strategy, test this strategy’s recovery capabilities regularly and isolate backup systems to prevent ransomware attackers from encrypting them.

More from

What does resilience in the cyber world look like in 2025 and beyond?

6 min read -  Back in 2021, we ran a series called “A Journey in Organizational Resilience.” These issues of this series remain applicable today and, in many cases, are more important than ever, given the rapid changes of the last few years. But the term "resilience" can be difficult to define, and when we define it, we may limit its scope, missing the big picture.In the age of generative artificial intelligence (gen AI), the prevalence of breach data from infostealers and the near-constant…

Airplane cybersecurity: Past, present, future

4 min read - With most aviation processes now digitized, airlines and the aviation industry as a whole must prioritize cybersecurity. If a cyber criminal launches an attack that affects a system involved in aviation — either an airline’s system or a third-party vendor — the entire process, from safety to passenger comfort, may be impacted.To improve security in the aviation industry, the FAA recently proposed new rules to tighten cybersecurity on airplanes. These rules would “protect the equipment, systems and networks of transport…

Protecting your digital assets from non-human identity attacks

4 min read - Untethered data accessibility and workflow automation are now foundational elements of most digital infrastructures. With the right applications and protocols in place, businesses no longer need to feel restricted by their lack of manpower or technical capabilities — machines are now filling those gaps.The use of non-human identities (NHIs) to power business-critical applications — especially those used in cloud computing environments or when facilitating service-to-service connections — has opened the doors for seamless operational efficiency. Unfortunately, these doors aren’t the…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today