The Ryuk ransomware operators continue to target critical infrastructure and extract high ransom payments from vulnerable groups, including an attack on a large health care organization last year.

The victim has 90,000 employees and around 400 hospitals, outpatient clinics and behavioral health centers in the U.S. and U.K. During the attack, which shut down computers and systems at all of its U.S. health care centers, the group had to send patients to other hospitals.

In early October, the health care provider said it was restoring its main IT network and reconnecting applications. It had recovered its servers at the corporate data center, as well as linked U.S. inpatient facilities back to the data center.

Other Ryuk ransomware victims include several oil and gas companies, a U.S. agency, a large engineering and construction services firm, city and county government, a financial software provider, a food and drink manufacturer and a newspaper.

 In June 2020, the FBI issued an alert warning that Ryuk ransomware operators were targeting K-12 educational institutions. In this alert, the agency reported an increased number of Ryuk ransomware attacks exploiting remote desktop protocol (RDP) endpoints to carry out school ransomware attacks.

New Tools, More Money

The Ryuk ransomware, which was first spotted in 2018, was derived from the source code used by the Hermes ransomware. Threat actors deploy it using manual hacking techniques and open-source tools to move through networks. By doing this, they secure administrative access to as many systems as possible before encrypting files.

They had been using Emotet and TrickBot as initial droppers for Ryuk ransomware and leveraging commodity trojans, but recently shifted tactics. They now employ encoded PowerShell commands to download the initial payload, disable security tools, stop data backups and scan the network. In addition, they exploit Windows Management Instrumentation (WMIC) and BitsAdmin to deploy the ransomware.

This strategy shift is designed to avoid detection and enable the Ryuk ransomware to remain on infected networks longer.

Ryuk Ransomware Hits Government Systems

The Ryuk ransomware actors recently used these new tools to compromise a government organization and encrypt close to 2,000 systems and critical services. To do so, the attackers compromised a domain administrator account by accessing the passwords stored in a group policy.

First, the attackers used PowerShell to disable malware monitoring protection and scan the network. Next, they used BitsAmin, WMIC and PowerShell with privileged account credentials to copy Ryuk to additional hosts.

How to Defend Against Ryuk Ransomware

To help companies combat the threat, the U.S. federal government has issued guidance on ransomware prevention.

The guidance recommends that you ask the following questions to ensure your networks are secure from attacks like Ryuk ransomware:

Backups: Do we back up critical information? Are backups stored offline? Have we tested our capacity to recover backups during an attack?

Risk Analysis: Have we carried out a risk analysis of the organization?

Staff Training: Have we conducted staff training on cybersecurity best practices?

Vulnerability Patching: Have we implemented comprehensive patching of system vulnerabilities?

Application Whitelisting: Do we allow only approved applications on our networks?

Incident Response: Have we written an incident response plan? Have we practiced it?

Business Continuity: Are we able to continue business operations without access to critical systems? For how long? Have we tested this?

Penetration Testing: Have we tried to hack into our own systems to test their security and our ability to defend against attacks?

In the end, your workplace can best protect users from attacks like the Ryuk ransomware by employing basic cybersecurity hygiene. This will prevent most, if not all, network breaches and other attacks.

More from Malware

Kronos Malware Reemerges with Increased Functionality

The Evolution of Kronos Malware The Kronos malware is believed to have originated from the leaked source code of the Zeus malware, which was sold on the Russian underground in 2011. Kronos continued to evolve and a new variant of Kronos emerged in 2014 and was reportedly sold on the darknet for approximately $7,000. Kronos is typically used to download other malware and has historically been used by threat actors to deliver different types of malware to victims. After remaining…

A View Into Web(View) Attacks in Android

James Kilner contributed to the technical editing of this blog. Nethanella Messer, Segev Fogel, Or Ben Nun and Liran Tiebloom contributed to the blog. Although in the PC realm it is common to see financial malware used in web attacks to commit fraud, in Android-based financial malware this is a new trend. Traditionally, financial malware in Android uses overlay techniques to steal victims’ credentials. In 2022, IBM Security Trusteer researchers discovered a new trend in financial mobile malware that targets…

RansomExx Upgrades to Rust

IBM Security X-Force Threat Researchers have discovered a new variant of the RansomExx ransomware that has been rewritten in the Rust programming language, joining a growing trend of ransomware developers switching to the language. Malware written in Rust often benefits from lower AV detection rates (compared to those written in more common languages) and this may have been the primary reason to use the language. For example, the sample analyzed in this report was not detected as malicious in the…

Raspberry Robin and Dridex: Two Birds of a Feather

IBM Security Managed Detection and Response (MDR) observations coupled with IBM Security X-Force malware research sheds additional light on the mysterious objectives of the operators behind the Raspberry Robin worm. Based on a comparative analysis between a downloaded Raspberry Robin DLL and a Dridex malware loader, the results show that they are similar in structure and functionality. Thus, IBM Security research draws another link between the Raspberry Robin infections and the Russia-based cybercriminal group 'Evil Corp,' which is the same…