Snynet Solution Logo
MON - SUN: 10 AM - 6 PM
+60 11 5624 8319

Blog

New Ryuk ransomware strain targets web servers

Image Description

Cybersecurity researchers have discovered a new strain of the Ryuk ransomware that appears to be going after web servers. 

McAfee Enterprise’s Advanced Threat research team notes that Ryuk, which first took victims in an August 2018 campaign against several businesses, previously functioned like all other ransomware, encrypting its victim’s files and demanding a ransom in cryptocurrency.

However, the new strain has added a couple more tricks to the ransomware’s arsenal in order to further traumatize its victims, forcing them to cough up the ranson.  

TechRadar needs you!

We're looking at how our readers use VPNs with streaming sites like Netflix so we can improve our content and offer better advice. This survey won't take more than 60 seconds of your time, and you can also choose to enter the prize draw to win a $100 Amazon voucher or one of five 1-year ExpressVPN subscriptions.

>> Click here to start the survey in a new window <<

“It is believed that this [new] functionality was added to newer versions of the malware to target web servers and deface public websites with the Ryuk ransom note. This is a tactic never seen before in the ransomware landscape and whose final purpose is to pressure victims to pay,” writes McAfee in a new technical report.

Spares index files

Earlier McAfee research has revealed similarities between Ryuk and the Hermes ransomware that’s on sale in underground forums and has been used by multiple threat actors. 

McAfee believes Ryuk is used exclusively in targeted ransomware attacks, and often attacks its victims either via spear-phishing emails, or by exploiting compromised credentials for remote access systems, or piggybacking on other commodity malware.  

The new Ryuk sample though has shifted its attention to targeting web servers. McAfee says the new strain doesn’t encrypt the HTML index files on the machine, and instead replaces them with the ransom note. 

Since all visitors to the website will now be shown the ransomware note, the new tactic helps Ryuk put additional stress on the victims to force them to the negotiation table.

Furthermore, once it’s done encrypting the files, the ransomware will inundate the victim by printing fifty copies of the ransom note on the user’s default printer, further pressuring them to bow to the demands of the threat actors.

The new ransom note prompts victims to install the Tor browser in order to facilitate contact with the ransomware operators.

Date

07 Jul 2021

Sources


Share


Other Blog

  • Amazon India enters ed-tech with Amazon Academy

    Amazon Academy will offer students a range of JEE preparatory resources at launch, including specially crafted mock tests with over 15,000 handpicked questions.

    Read More
  • RedmiBook Pro to launch alongside the Redmi K40 series

    RedmiBook Pro series laptops will launch in China on February 25. The laptop is confirmed to feature 11th Gen Tiger Lake H35 processor. We could also see AMD Ryzen 5 and Ryzen 7 models at the launch.

    Read More
  • Criminals target Kaseya victims with fake Microsoft update

    A new malspam campaign delivers malware in the guise of a fix to the Kaseya-REvil ransomware.

    Read More
  • Here's what you're losing if you upgrade to Windows 11

    Windows 11 being free to upgrade is tempting, but here's what will vanish if you decide to move on from Windows 10.

    Read More

Find Out More About Us

Want to hire best people for your project? Look no further you came to the right place!

Contact Us