Written by Richard Hosgood, Director of Engineering – North America
Cyber extortion has become an attack of choice for hackers. The average ransomware payment amount as of Q3 2019 was $41,198, with larger enterprises often faced with ransomware demands of over $1 million. It is estimated that these attacks cost the US more than $7.5 billion in 2019 and malware attacks can be expected to increase in 2020. As of now, U.S. law generally does not prohibit paying a ransom, but this may change in the future.
First discovered in mid-August 2018, Ryuk is a type of ransomware that penetrates a target and uses encryption to block access to files, systems, or networks until a ransom is paid. These ransomware attacks cause significant damage, including data loss, disruption of service, downtime, damage to the enterprise or organization’s reputation, and loss of revenue. Currently, Ryuk ransomware is one of the most prevalent variants in the state, local, tribal, and territorial (SLTT) government threat landscape, with infections steadily increasing.
Where did Ryuk ransomware come from?
The fact that Ryuk is a fictional character from the Japanese comic series Death Note, does not reveal much about the malware under the same name. Instead, criminal groups are often tied to their malware by searching for similarities in the code base, structure, language, and attack vectors. Back in 2018, Check Point found a link between Ryuk and another type of ransomware called Hermes. Comparisons between the two indicate that Ryuk was derived from the Hermes source code, although Ryuk only targets enterprise environments and includes modifications such as removing anti-analysis checks.
This connection may also link Ryuk with the North Korean Advanced Persistent Threat (APT) Lazarus Group, a cybercrime group that has been closely connected with Hermes ransomware in the past. Others, including cybersecurity experts at CrowdStrike, McAfee, FireEye and Kryptos Logic believe that the cybercriminals behind Ryuk ransomware may be linked to two Russian-based cyber-criminal entities: Wizard Spider, the operator of TrickBot and CryptoTech, an organization also linked to Hermes.
As Ryuk’s ransom payments vary widely in amounts and methods, some experts feel there may be more than one criminal group operating Ryuk ransomware. In addition, Ryuk may be sold on the black market to other cyber-criminals seeking to build their own versions of the ransomware.
How does Ryuk ransomware operate?
The cybercriminals behind Ryuk ransomware employ a multi-stage scheme to ensure this malware penetrates their target. Typically, the campaign starts with phishing emails, or by clicking on a deceptive link, or via Remote Desktop Services. When an unsuspecting user unsuspectingly executes the embedded malicious macro, an Emotet bot (Detection name: Trojan-Banker.Win32.Emotet) will automatically be downloaded and infect the machine.
Once the Emotet bot penetrates the machine, it downloads and installs the second piece of malware – Trickbot (verdict: Trojan.Win32.Trickster) – into the infected system. This Trickbot enables cybercriminals to have full visibility into the network and to perform extensive mapping and identification of assets. These criminals can now determine whether the target is worthwhile – for example, a large municipal network or a high-profile enterprise – and if so, they will deploy the Ryuk ransomware to infect as many endpoints and servers as possible, by encrypting both the local drives and network shared folders – and their backups – of the compromised network.
Encrypted files will receive an additional extension (.RYK), and a ransom note “RyukReadMe.txt” from the criminals will appear in every folder on the system. Ryuk generally demands payment via Bitcoin cryptocurrency, and the ransom is typically between 15-50 Bitcoins, which is about $100,000-$500,000, an amount that is ten times the average asking amount, according to ransomware specialists Coveware.
Ryuk’s ability to target backups and use anti-recovery tools are more sophisticated than other types of ransomware, which is why targets generally fail in their recovery efforts unless backups have been stored offline.
How prevalent is Ryuk malware?
As a ransomware targeting enterprises and governments, Ryuk has been wreaking havoc all over the world, although some countries have been affected more than others. According to Kaspersky Security Network’s known cases, the top three countries affected are Germany, China, and Algeria, with the United States ranking at 7th in the world for Ryuk attacks. This type of attack is on the rise in the United States. See chart below for the percentage of users attacked in each country by Ryuk, relative to users attacked worldwide by this malware:
|United Arab Emirates||3.23%|
Ryuk Ransomware Attacks in the US
As of March 2020, there have been 32 publicized Ryuk ransomware attacks in the US on government entities. There have also been attacks on government contractors, retailers, healthcare providers and hospitals, manufacturers, and professional services firms.
Notable Ryuk ransomware attacks
City of New Orleans: In December 2019, New Orleans became victim to a Ryuk ransomware attack via a phishing email. The malware attack impacted over 450 servers and 3500 laptops and caused the city to declare a state of emergency. Ultimately, the attack cost the city $3 million in mitigation and recovery costs, a sum that was covered by the city’s cyber insurance policy.
National Veterinary Associates: In October 2019, the largest private owner of veterinary hospitals in the US was attacked by Ryuk ransomware. The malware affected 400 of NVA’s clinics, taking down their patient and payment systems. The company said the infection penetrated its network via a third-party system, but declined to confirm whether the company paid the requested ransom.
New Bedford, Massachusetts: In July 2019, a Ryuk ransomware attack infected a network of 200 systems and over 3,800 laptops and workstations in the city of New Bedford, Massachusetts. The hackers reportedly demanded a $5.3 million ransom. However, New Bedford attempted to negotiate the sum and offered $400,000 in bitcoins to contain the malware and decrypt the files. The counter-offer was refused, and the city’s IT staff instead chose to restore the systems from backups. The ultimate cost of recovery and mitigation is unknown.
Lake City, Florida: In June 2019, a Ryuk ransomware attack disrupted the entire computer network of Lake City, FL. Police had to issue paper tickets, the 911 line was not fully operational, and the city’s water supply grid went offline. After failing to resolve the issue on their own using an outside security consultant, the city paid the Bitcoin equivalent of $460,000 to recover its data, of which all but $10,000 was covered by insurance. This attack came only two weeks after another small Florida city, Riviera Beach, paid the Bitcoin equivalent of $600,00 in ransom to bring their systems back online.
Tribune Publishing: In December 2018, during the Christmas holiday, Tribune Publishing was attacked by Ryuk ransomware, disrupting the delivery of LA Times and Tribune papers across the US. IT teams managed to identify the issue and bring back servers, but the virus overcame their security patches and began to re-infect the network. Tribune worked with the FBI to resolve but did not divulge specifics of the malware attack or its resolution.
Tips to prevent Ryuk from affecting your networks
CISOs and IT administrators should be proactive in protecting their enterprises against Ryuk ransomware attacks. Some suggested actions:
Deploy a CDR solution: Content Disarm and Reconstruction (CDR)-based technology is proven to be highly effective in neutralizing external malicious threats while preserving the integrity and functionality of the original file. This technology applies to all files and email files incoming into an organization, whether as attachments, downloads from the web, or uploaded from a client-facing portal.
Authenticate users: Utilize a password management system and single sign-on services for all users. Allow access to mapped drives to specific roles only. Determine which authentication process works best for the enterprise.
Minimize attack surface: Ensure that all software is up to date and adequately patched across all endpoints.
Automated scans: Implement a solution that proactively and continuously scans your network for malware and takes steps to fix it before any significant damage ensues.
Backup Your Data: Backup your critical data in the cloud. Consider using third-party storage systems to maintain critical stat outside the primary enterprise network.
Ryuk ransomware presents a serious threat to enterprises and government organizations everywhere. Consequences of a ransomware attack are significant. No enterprise or governmental organization is immune. CISOs and IT administrators can take some key steps to protect important systems and networks, such as putting protocols in place to limit damage, deploying technical solutions— such as CDR – to filter email attachments and other incoming files, and ensuring all data is properly backed up. With Ryuk malware, the absolute best protection is prevention.