Did you know that in 2020 Ryuk ransomware targeted 67.3 million targets?

What is Ryuk?

Ryuk is a crypto-ransomware strain that encrypts access to a system, device or a file and demands ransom to release it. Ryuk is unleashed on target assets through malware, notably TrickBot and is used to gain access to a system through remote desktop services.

Ryuk typically targets vulnerable organizations or critical entities like hospitals where the probability of ransom payout is high. And since the ransom is their primary motive they demand more than any other ransomware threat group. The ransom amount oscillates between $100,00 to $500,00 in bitcoins and they are very successful in their campaigns because they select high-profile targets for whom data and information is sacrosanct and hence the chance of the payout is high.

Ryuk debuted in mid-August 2018 and was being operated by Wizard Spider, a sophisticated group that targeted large organizations with critical and sensitive data for high ransom payouts.

The creation of Ryuk is generally attributed to a cybercriminal group known as CryptoTech who were selling Hermes 2.1 in underground forums but there are researchers who believe that it was created by the Russian cyber criminal cartel.

New Variant

Researchers noted that since July 2020, a new variant called Conti has been making the rounds. The consensus among security experts is that Ryuk threat actors have rebranded themselves as Conti ransomware.

Conti is a private Ransomware as a Service (RaaS) that encrypts files and delivers the ransom note.

The converging similarities in Ryuk and Conti can be seen through features –

  • Encrypts files stored on network

  • Disables backup and OS services

  • Can be manually deployed

  • Infects local disks

  • Linked to same developer group based on the malware code

  • AES-256 encryption key being used

  • Same ransom text template is observed

  • Both use TrickBot framework

How does Ryuk attack?

Ryuk is primarily spread through malware that drops the ransomware on the existing infected system. Here is how it attacks –

Once the files in the system are encrypted it will create the ransom note, “RyukReadMe.txt” and place it in every folder.

Ryuk MITRE ATT&CK Mapping

ATT&CK Tactic Category Techniques

Privilege Escalation

T1134 – Access Token Manipulation

Persistence

T1547 – Boot or Logon Autostart   

             Execution: Registry Run Keys

             /Startup Folder

T1059 – Command and Scripting 

             Interpreter: Windows Command 

             Shell

Impact

T1486 – Data Encrypted for Impact

T1490 – Inhibit System Recovery

T1489 – Service Stop

Discovery

T1083 – File and Directory Discovery

T1057 – Process Discovery

T1016 – System Network Configuration Discovery

Defense Evasion

T1562 – Impair Defenses: Disable or 

             Modify Tools

T1036 – Masquerading: Match 

              Legitimate Name or Location

T1055 – Process Injection

Execution

T1106 – Native API

Ryuk – A Cheat Sheet

  1. Ryuk has within its arsenal 17 CVEs that it exploits to mount attacks on its victims.

  2. The year of discovery of these CVEs range from 2013 to 2020.

  3. Six CVEs are Remote Code Execution Exploits (RCE) and one CVE is a Privilege Execution.

  4. 57% of CVEs that are in Ryuk’s arsenal are rated critical, 5 are medium and 1 of low severity.

  5. Five CVEs in numerical order (CVE-2017-0143, CVE-2017-0144, CVE-2017-0145, CVE-2017-0146, CVE-2017-0147) are tied to five APT groups.

  6. Seven CVEs exist in Microsoft products such as Windows Vista, Windows Server (2007, 2008, 20012, 2010, 2016, 2019 ) Internet explorer, Microsoft Edge etc.

  7. Five CVEs are weaknesses that exist in multiple products such as Novell, Fedoraproject, Debian, Canonical, Huawei, Gentoo, Oracle, Amazon, IBM, Openbsd, Winscp, Netapp, redhat, VMware, synology, samba etc.

  8. External Blue kit is used to exploit vulnerabilities – CVE-2017-0143 and CVE-2017-0144.

  9. All 17 CVEs have patches and it is recommended that they be prioritized for remediation immediately.

  10. CWE – 20 is the most exploited weakness among the Ryuk associated CVEs which topped third in the Top 25 Common Weakness Enumeration.

  11. CVE-2020-1472 is a recent CVE added in Ryuk’s arsenal while the rest are old. This brings the focus back to cyber hygiene that needs to be practiced diligently.

  12.  CVE-2018-1156 and CVE-2018-14847 are RCE bugs where Ryuk comprises an unpatched Mikrotik router and turns it into a command and control server that infects with rootkits.

Check out our Spotlight Ransomware report for more!

Threat Groups & APT Groups

Ryuk is associated with the following threat and APT groups, which use Ryuk to launch complex cybersecurity attacks on vulnerable organizations with critical information and data.

Threat Groups APT Groups
  1. Gothic Panda

  2. Pirpi

  3. UPS Team

  4. Buckeye

  5. Threat Group-0110

  1. TG-0110

  2. HIDDEN COBRA

  3. Guardians of Peace

  4. ZINC

  5. NICKEL ACADEMY

  1. APT3 

  2. APT10

  3. Stone Panda 

  4. Shadow Brokers

  5. Lazarus Group (APT37 & APT38)

How to detect Ryuk in your environment

Here are some types of IoCs that will alert you about malicious objects on endpoints:

Ryuk payload

SHA256: BDDAF6020F8DF169E1901C709701240F1A810D0E0FCEC7D4479D5354360E1795

Registry: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

MD5: 

795db7bdad1befdd3ad942be79715f6b0c5083d859901b81657b590c9628790f

501e925e5de6c824b5eeccb3ccc5111cf6e312258c0877634935df06b9d0f8b9

Fe909d18cf0fde089594689f9a69fbc6d57b69291a09f3b9df1e9b1fb724222b

c0202cf6aeab8437c638533d14563d35

d348f536e214a47655af387408b4fca5

958c594909933d4c82e93c22850194aa

86c314bc2dc37ba84f7364acd5108c2b

29340643ca2e6677c19e1d3bf351d654

cb0c1248d3899358a375888bb4e8f3fe

1354ac0d5be0c8d03f4e3aba78d2223e

cb0c1248d3899358a375888bb4e8f3fe

d4a7c85f23438de8ebb5f8d6e04e55fc

3895a370b0c69c7e23ebb5ca1598525d

567407d941d99abeff20a1b836570d30

c0d6a263181a04e9039df3372afb8016

Ryuk-related IPs

200[.]107[.]59[.]130:449

5[.]196[.]154[.]93 

94[.]103[.]94[.]154

186[.]42[.]186[.]202:449 

177[.]52[.]79[.]29:449

187[.]8[.]169[.]10:449

187[.]65[.]49[.]88:449 

200[.]83[.]49[.]141:449

200[.]35[.]56[.]81:449 

177[.]183[.]194[.]194:449

200[.]110[.]72[.]134:449 

186[.]248[.]163[.]198:449

191[.]241[.]233[.]195:449 

187[.]95[.]32[.]18:449 

187[.]95[.]123[.]179:449  

177[.]52[.]28[.]238:449

Ryuk-related file paths    

c:\Windows\System32\setup.exe c:\Users\Default\AppData\Roaming\msnet\uetur.exe c:\Users\*\AppData\Roaming\msnet\uetur.exe c:\Users\*\AppData\Roaming\msnet c:\Windows\System32\config\systemprofile\AppData\Roaming\msnet\uetut.exe c:\Windows\System32\config\systemprofile\AppData\Roaming\msnet c:\Windows\System32\Tasks\Ms net

Ryuk-related web files

/login/process.php 

/admin/get.php 

/news.php

Today, Ryuk is being sold on the dark web in a ransomware as a service affiliate model business and it is empowering threat actors to go after vulnerable and critical entities like hospitals. Organizations need to recognize the threat, understand the risks, and prioritize preventions and measures that will protect them against Ryuk. Our researchers have spotlighted the threats that are influencing the growth of ransomware.

Check out our path-breaking Ransomware Spotlight report.

Are you susceptible to Ryuk? Find out now!

Share This Post On