Ryuk Ransomware has added 'selective' encryption capabilities.
A new variant of Ryuk Ransomware has been found to have added IP addresses and blacklists of computer systems so that appropriate computers will not be encrypted.
This new Ryuk Ransomware variant was discovered yesterday by MalwareHunterTeam. Security researchers have found that the new variant is signed by a digital certificate. After this ransomware sample was thoroughly tested by security researcher Vitali Kremez, it was discovered that several important changes were applied to the new variant, which was not found in the previous version.
- The official GandCrab 5.2 decoder was released, ending the bad nightmare called GandCrab Ransomware
Ryuk blackmail code
Vitali Kremez has found that with the new variant, Ryuk Ransomware will be added with the ability to check arp -a output data for specific IP address strings and if these IPs are found, it will Do not encrypt the victim computer.
The localized malicious IP address strings include: 10.30.4, 10.30.5, 10.30.6 or 10.31.32.
Local IP address string is found malicious code
In addition to the IP address blacklist, this new Ryuk variant will also be able to compare the target computer name with the "SPB", "Spb", "spb", "MSK", "Msk" and "msk" strings. ". If the target computer name contains any of these strings, Ryuk will not proceed to encrypt the computer.
- Shade ransomware, the nightmare of 5 years ago is showing signs of returning
Comparative character strings
The real purpose for this new feature of the money-ridden Ryuk has raised a lot of questions for security researchers. The answer that received the most conclusive opinions so far is to avoid coding 'wrong' computer systems in a particular region or country, such as in Russia - where set the command and control servers (C&C) of this malicious code.
Although Ryuk Ransomware tried to 'ignore' Russian, Ukrainian or Belarusian-language computer systems, it did not rule out the possibility that Russian-based computers could still be infected. ' wrong '.
For example, an attacker may target computer systems based in the United States, but security expert Vitali Kremez said that after using the "EternalRomance exploit and the SMB spread method, they could use cobalt strike to attack Russian-based systems'.
- New ransomware detection not only encrypts files but also helps 'clean up' the system
By examining the "MSK" sequences (which may be short for Moskow and "SPB", meaning St. Petersburg), malicious code will avoid the possibility of infecting computers in National Community regions. Independent (CIS).
Encryption as usual
If the target computer system does not contain the same characteristics as the malicious code, it will still be encrypted as normal. Ryuk Ransomware will append the .RYK extension to the files that have been successfully encrypted.
The file was encrypted by Ryuk Ransomware
While encrypting the file, the malicious code will also generate RyukReadMe.html files with the contents of the ransom note containing the "balance of shadow universe" phrase, and some email addresses for victims to contact payment. ransom.
"Balance of shadow universe" sounds pretty cool, but security researchers have yet to really grasp what the meaning behind it is. Meanwhile, the email addresses currently used in ransom notes are sorcinacin@protonmail.com and neyhyretim@protonmail.com.
Ryuk Ransomware's notes
As always, we recommend that you do not pay a ransom if possible and instead restore important data from backups.
- [Infographic] 7 effective ways to protect businesses from Ransomware
Protect your computer against the spread of Ryuk Ransomware
In essence, extortion code is only really harmful in case you have absolutely no way to recover your encrypted data. Therefore, it is important to always have a reliable backup of important data, and build your own backup plan periodically so that it is most reasonable.
Besides, backups of important documents should also be stored offline and make ransomware inaccessible.
Although this ransomware software is not distributed via spam like many other well-known extortion codes, it is most likely being installed by Trojans. Thus, the next important thing is that all users in the computer system must be trained, as well as adding knowledge about how to correctly identify malicious spam and not open any attachments. but questions have not been clearly defined as they are sent from and why they were sent.
Finally, the most important thing is to make sure that your network does not make the Remote Desktop Service services publicly accessible over the Internet. Instead, you should place it behind the firewall and the settings are only accessible via VPN.
- The cybersecurity tools that every business should know
You should read it
- Mexico's largest oil and gas corporation has been attacked by ransomware, presenting a cyber security disaster
- Ryuk Ransomware stops encrypting Linux directory
- Strange ransomware detection only attacks the rich
- Shade ransomware, the nightmare of 5 years ago is showing signs of returning
- PureLocker - a very 'weird' ransomware strain that can encrypt servers
- Lukitus Guide to preventing extortion malicious code
- STOP - Ransomware is the most active in the Internet but rarely talked about
- Ransomware LockerGoga is making a big corporation miserable
May be interested
- Ransomware can encrypt cloud dataransomware is as small as a grain of sand, they are everywhere around us. and they can encrypt hard drive attacks but also attack other system drives, and cloud drives don't get out of sight.
- Even DSLR cameras can be easily attacked by ransomwareransomware, also known collectively as ransom data encryption software, has become one of the major security threats to all computer systems worldwide in recent years. .
- Microsoft will enhance the encryption capabilities of the servicemicrosoft said it would upgrade the encryption capabilities of its online services such as outlook.com, office 365, skydrive, windows azure to prevent intrusion from other organizations.
- 3 ways to disable USB Selective Suspend in Windows 11windows' usb selective suspend feature puts usb devices in a low-power state when not in use. while this can improve battery life, it can cause problems with peripherals that need uninterruptible power.
- STOP - Ransomware is the most active in the Internet but rarely talked aboutthe fight against stop ransomware in particular and other ransomware strains in general is still very difficult and no appointment of an end date.
- Ako ransomware is raging all over the world, what do you know about this ransomware?ako was first discovered when a victim posted information about an infection he encountered on the bleeping computer security forum.
- New ransomware strain discovered using leaked Windows and Linux encryptiona new ransomware operation called 'buhti' uses leaked code of the lockbit and babuk ransomware families to target windows and linux systems
- Selective Forwarding attack in wireless sensor networksin this type of selective forwarding attack, malicious nodes reject the request to facilitate some information packets and ensure that they are not forwarded any further.
- Forecast 2021: The world of security will be devastated by ransomware 'ransomware has been one of the top security threats for nearly three years.
- What is Ransomware CryptoWall 4.0? How to clean up Ransomware CryptoWall 4.0?cryptowall 4.0 is a form of ransomware that encrypts files, this ransomware encrypts the personal documents it finds on the victim's computer using the rsa-2048 key (256-bit aes cbc encryption algorithm). ). it will then display a message saying that to decrypt the data you need to pay a sum of money.