Did you know that in 2020 Ryuk ransomware targeted 67.3 million targets?
What is Ryuk?
Ryuk is a crypto-ransomware strain that encrypts access to a system, device or a file and demands ransom to release it. Ryuk is unleashed on target assets through malware, notably TrickBot and is used to gain access to a system through remote desktop services.
Ryuk typically targets vulnerable organizations or critical entities like hospitals where the probability of ransom payout is high. And since the ransom is their primary motive they demand more than any other ransomware threat group. The ransom amount oscillates between $100,00 to $500,00 in bitcoins and they are very successful in their campaigns because they select high-profile targets for whom data and information is sacrosanct and hence the chance of the payout is high.
Ryuk debuted in mid-August 2018 and was being operated by Wizard Spider, a sophisticated group that targeted large organizations with critical and sensitive data for high ransom payouts.
The creation of Ryuk is generally attributed to a cybercriminal group known as CryptoTech who were selling Hermes 2.1 in underground forums but there are researchers who believe that it was created by the Russian cyber criminal cartel.
New Variant
Researchers noted that since July 2020, a new variant called Conti has been making the rounds. The consensus among security experts is that Ryuk threat actors have rebranded themselves as Conti ransomware.
Conti is a private Ransomware as a Service (RaaS) that encrypts files and delivers the ransom note.
The converging similarities in Ryuk and Conti can be seen through features –
Encrypts files stored on network
Disables backup and OS services
Can be manually deployed
Infects local disks
Linked to same developer group based on the malware code
AES-256 encryption key being used
Same ransom text template is observed
Both use TrickBot framework
How does Ryuk attack?
Ryuk is primarily spread through malware that drops the ransomware on the existing infected system. Here is how it attacks –
Once the files in the system are encrypted it will create the ransom note, “RyukReadMe.txt” and place it in every folder.
Ryuk has within its arsenal 17 CVEs that it exploits to mount attacks on its victims.
The year of discovery of these CVEs range from 2013 to 2020.
Six CVEs are Remote Code Execution Exploits (RCE) and one CVE is a Privilege Execution.
57% of CVEs that are in Ryuk’s arsenal are rated critical, 5 are medium and 1 of low severity.
Five CVEs in numerical order (CVE-2017-0143, CVE-2017-0144, CVE-2017-0145, CVE-2017-0146, CVE-2017-0147) are tied to five APT groups.
Seven CVEs exist in Microsoft products such as Windows Vista, Windows Server (2007, 2008, 20012, 2010, 2016, 2019 ) Internet explorer, Microsoft Edge etc.
Five CVEs are weaknesses that exist in multiple products such as Novell, Fedoraproject, Debian, Canonical, Huawei, Gentoo, Oracle, Amazon, IBM, Openbsd, Winscp, Netapp, redhat, VMware, synology, samba etc.
External Blue kit is used to exploit vulnerabilities – CVE-2017-0143 and CVE-2017-0144.
All 17 CVEs have patches and it is recommended that they be prioritized for remediation immediately.
CWE – 20 is the most exploited weakness among the Ryuk associated CVEs which topped third in the Top 25 Common Weakness Enumeration.
CVE-2020-1472 is a recent CVE added in Ryuk’s arsenal while the rest are old. This brings the focus back to cyber hygiene that needs to be practiced diligently.
CVE-2018-1156 and CVE-2018-14847 are RCE bugs where Ryuk comprises an unpatched Mikrotik router and turns it into a command and control server that infects with rootkits.
Threat Groups & APT Groups
Ryuk is associated with the following threat and APT groups, which use Ryuk to launch complex cybersecurity attacks on vulnerable organizations with critical information and data.
Threat Groups
APT Groups
Gothic Panda
Pirpi
UPS Team
Buckeye
Threat Group-0110
TG-0110
HIDDEN COBRA
Guardians of Peace
ZINC
NICKEL ACADEMY
APT3
APT10
Stone Panda
Shadow Brokers
Lazarus Group (APT37 & APT38)
How to detect Ryuk in your environment
Here are some types of IoCs that will alert you about malicious objects on endpoints:
c:\Windows\System32\setup.exe c:\Users\Default\AppData\Roaming\msnet\uetur.exe c:\Users\*\AppData\Roaming\msnet\uetur.exe c:\Users\*\AppData\Roaming\msnet c:\Windows\System32\config\systemprofile\AppData\Roaming\msnet\uetut.exe c:\Windows\System32\config\systemprofile\AppData\Roaming\msnet c:\Windows\System32\Tasks\Ms net
Ryuk-related web files
/login/process.php
/admin/get.php
/news.php
Today, Ryuk is being sold on the dark web in a ransomware as a service affiliate model business and it is empowering threat actors to go after vulnerable and critical entities like hospitals. Organizations need to recognize the threat, understand the risks, and prioritize preventions and measures that will protect them against Ryuk. Our researchers have spotlighted the threats that are influencing the growth of ransomware.