January 15, 2020 By David Bisson 2 min read

Security researchers observed the Ryuk ransomware using a special hardware feature to wake up powered-down devices in order to encrypt them.

According to Bleeping Computer, a security researcher observed some samples of Ryuk ransomware spawning subprocesses with “8 LAN” as their argument upon execution. Ryuk leveraged this argument to scan the device’s ARP table. It did so in an effort to check if the listed entries of network devices were part of the “10.,” “172.16.” and/or “192.168” private IP address subnets.

If it found that any of the entries appeared on any of those networks, Ryuk used a hardware feature known as “Wake-on-Lan” to wake up a powered-down device by sending it a “magic packet.” The ransomware then attempted to mount the device’s C$ administrative share and encrypt the computer’s drive in the event that the Wake-on-Lan request was successful. Subsequently, this technique helped Ryuk reach into a corporate network from a single compromised device.

A Look at Ryuk’s Recent Threat Activity

The technique described above is just the latest instance in which Ryuk has made headlines. Back in early December, Emsisoft discovered a bug in a decryptor that Ryuk’s operators provided to paying victims. This security issue, in turn, could have prevented victims from successfully recovering large files encrypted by the ransomware.

Just a few days later, Bleeping Computer reported on a memory dump that contained numerous references to Ryuk and the city of New Orleans, indicating that the threat could have been responsible for the New Orleans ransomware attack. The next day, the U.S. Coast Guard disclosed that a Maritime Transportation Security Act (MTSA) regulated facility had suffered a Ryuk ransomware infection.

How to Defend Against Ryuk Ransomware

Security professionals can help defend against a Ryuk ransomware infection by having the latest threat intelligence to stay on top of emerging attack trends and techniques. Organizations should also implement a solid data backup strategy, test this strategy’s recovery capabilities regularly and isolate backup systems to prevent ransomware attackers from encrypting them.

More from

New proposed federal data privacy law suggests big changes

3 min read - After years of work and unsuccessful attempts at legislation, a draft of a federal data privacy law was recently released. The United States House Committee on Energy and Commerce released the American Privacy Rights Act on April 7, 2024. Several issues stood in the way of passing legislation in the past, such as whether states could issue tougher rules and if individuals could sue companies for privacy violations. With the American Privacy Rights Act of 2024, the U.S. government established…

AI cybersecurity solutions detect ransomware in under 60 seconds

2 min read - Worried about ransomware? If so, it’s not surprising. According to the World Economic Forum, for large cyber losses (€1 million+), the number of cases in which data is exfiltrated is increasing, doubling from 40% in 2019 to almost 80% in 2022. And more recent activity is tracking even higher.Meanwhile, other dangers are appearing on the horizon. For example, the 2024 IBM X-Force Threat Intelligence Index states that threat group investment is increasingly focused on generative AI attack tools.Criminals have been…

The major hardware flaw in Apple M-series chips

3 min read - The “need for speed” is having a negative impact on many Mac users right now. The Apple M-series chips, which are designed to deliver more consistent and faster performance than the Intel processors used in the past, have a vulnerability that can expose cryptographic keys, leading an attacker to reveal encrypted data. This critical security flaw, known as GoFetch, exploits a vulnerability found in the M-chips data memory-dependent prefetcher (DMP). DMP’s benefits and vulnerabilities DMP predicts memory addresses that the…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today