{"id":1985,"date":"2021-06-15T12:20:08","date_gmt":"2021-06-15T03:20:08","guid":{"rendered":"https:\/\/cyberenso.jp\/?page_id=1985"},"modified":"2021-07-05T20:49:06","modified_gmt":"2021-07-05T11:49:06","slug":"ryuk-ransomware","status":"publish","type":"page","link":"https:\/\/cyberenso.jp\/en\/types-of-ransomware\/ryuk-ransomware\/","title":{"rendered":"Ryuk Ransomware"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1985\" class=\"elementor elementor-1985\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4a5ed55 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4a5ed55\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-eb0f84e\" data-id=\"eb0f84e\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-baacdc3 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"baacdc3\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-068c9ca\" data-id=\"068c9ca\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e3a50ba elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"e3a50ba\" data-element_type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;shake&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-xl\">RYUK RANSOMWARE<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-47ccc17 elementor-widget elementor-widget-image\" data-id=\"47ccc17\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/i0.wp.com\/cyberenso.jp\/wp-content\/uploads\/2021\/06\/ransomware-3998798_1920.jpg?fit=800%2C500&amp;ssl=1\" title=\"ransomware-3998798_1920\" alt=\"ransomware-3998798_1920\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-5651a3d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5651a3d\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-bdfe1f5\" data-id=\"bdfe1f5\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b56880b elementor-widget elementor-widget-text-editor\" data-id=\"b56880b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h4 style=\"text-align: left;\"><strong><span style=\"color: #444444;\">Introduction<\/span><\/strong><\/h4><p style=\"text-align: left;\">Ryuk ransomware made its first appearance in 2018 as it was being distributed by spam emails that had the Ryuk dropper attached. Then the dropper would download Trickbot or Emotet as well as downloading the ransomware. <br \/>Attacks involving the Ryuk ransomware have been frequent and have been recorded to target organisation of medium to large size from many countries.<br \/>There is no decryptor for any of the active variants of the Ryuk ransomware and the average ransom required is $100k in Bitcoin which can be paid via provided email addresses in the ransomware note.<\/p><h3 style=\"text-align: left;\"><strong><span style=\"color: #444444;\">Modus Operandi<\/span><\/strong><\/h3><h5 style=\"text-align: left;\"><strong><span style=\"color: #444444;\">Initial access<\/span><\/strong><\/h5><p style=\"text-align: left;\">The threat actor would send a phishing email with a Microsoft Office word document file which contain a malicious macro script. As soon as the attachment is opened, the macro attemepts to run a PowerShell code which attempts to download Emotet. Emotet then attempts to download Trickbot which allows for the threat actor to install other tools like Mimikatz and Cobalt Strike that will used to collect credentials, disable security measures, and harvest information, for the purpose of lateral movement and privilege escalation.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-d96cd7a\" data-id=\"d96cd7a\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-3003b4b elementor-widget elementor-widget-text-editor\" data-id=\"3003b4b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h5><strong>Installation<\/strong><\/h5><p>Eventually, the threat actors will establish a connection with the target\u2019s servers like the domain controllers and active directories via a remote desktop protocol and then they download Ryuk onto the servers. Upon execution, Ryuk will attempt to kill processes and stop services related to antivirus, database, backup, and document editing software from a list of predefined service and process names by executing \u201ctaskkill\u201d and \u201cnet stop\u201d. <br \/>Then Ryuk make sure it can be executed after reboot of any infected machines by writing itself to the Run registry key where it will then attempt to escalate its privileges to be able to infect itself into processes using OpenProcess and VirtualAllocEx function. Then it will attempt to write three dummy files: a test file, \u201cPUBLIC\u201d which contains the RSA Public key, and \u201cUNIQUE_ID_DO_NOT_REMOVE\u201d which contains a unique hardcoded key.<\/p><h5><strong>Encryption<\/strong><\/h5><p>Ryuk uses a three-tier trust model where three kinds of keys are used in the encryption: global RSA key pair, per-victim RSA keypair, AES symmetric encryption key generated per victim file. So, after a file is encrypted using the CryptGenKey function, the AES symmetric encryption key is encrypted using the unique RSA keypair of the victim before the encrypted key appended to the encrypted file. After the encryption is done, Ryuk deletes the keys used in the encryption and attempts to delete any shadow copies by executing a .BAT file.<\/p><h5><strong>Command and Control<\/strong><\/h5><p>The information that Emotet and Trickbot collects from the compromised machines like emails and credentials, are sent to a C&amp;C server during the attack.<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>RYUK RANSOMWARE Introduction Ryuk ransomware made its first appearance in 2018 as it was being distributed by spam emails that had the Ryuk dropper attached. Then the dropper would download Trickbot or Emotet as well as downloading the ransomware. Attacks involving the Ryuk ransomware have been frequent and have been recorded to target organisation of medium to large size from<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":1,"featured_media":1994,"parent":3201,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1985","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/pages\/1985"}],"collection":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/comments?post=1985"}],"version-history":[{"count":18,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/pages\/1985\/revisions"}],"predecessor-version":[{"id":3382,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/pages\/1985\/revisions\/3382"}],"up":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/pages\/3201"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media\/1994"}],"wp:attachment":[{"href":"https:\/\/cyberenso.jp\/en\/wp-json\/wp\/v2\/media?parent=1985"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}