• Cyber Security
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware File Recovery
    • Ransomware Types
  • Ransomware Services
    • Ransomware Removal
    • Ransomware File Recovery
  • News
  • Tutorials
  • Ransomware TV

HCCIC warns of rising Ryuk ransomware activity

September 14, 2018Simeon Georgiev

Healthcare Cybersecurity Communications and Integration Center (HCCIC) of the US Department of Health and Human Services (HHS) has recently issued an alert regarding a mounting activity of a new ransomware. The cryptovirological strain in question is Ryuk ransomware, which is pretty similar to SamSam in its distribution and encryption activity.

It is important to mention that Ryuk is not built on an advanced technological platform. However, it has gotten all the notoriety because of its pinpoint targeting and planning that ensures that the targeted users are hit badly. For instance, after completing the encryption of stored files in the affected device, the strain automatically deletes its encryption key so that ransomware removal experts can’t use reverse engineering to develop a decrypter. In addition, the ransomware also writes and execute a script that deletes every shadow volume that can be used to restore the locked down data.

According to cybersecurity experts, Ryuk ransomware operators mostly devise tailored attacks. Therefore, they usually do network mapping and collect user credentials before launching the attack. These prerequisites, which are not followed in any regular ransomware activity, have made Ryuk more effective or rather deadly.

As per one estimate, Ryuk operators have inflicted losses of $640,000 in the form of ransomware removal and recovery costs in a very short span of time. In a recent ransomware attack, Ryuk operators demanded 50 Bitcoins ($320,000!!) for ransomware removal.

As mentioned earlier, due to the non-availability of the encryption key, digital security experts are still struggling to develop the decrypter for Ryuk. For that matter, stopping the attack in the first place is the only way to protect the systems. According to the recommendation of HCCIC, healthcare facilities must put firewall off SMB 445 in place for the protection of an internal network of devices and the access must only be provided to authorized IPs.

Simeon Georgiev
https://www.linkedin.com/in/simeon--georgiev/
I am a Cyber Security Enthusiast from Bulgaria. I like to write about malware and ransomware and global cyber attacks. You can reach me on Twitter @sgeorgiev1995 or Email: [email protected]
Previous post Reveton: A Locker Ransomware that Works on a Scare Tactic Next post Mounting ransomware activity in Canada

Related Articles

Cybercriminals are Moving from Data Breaches to Ransomware Attacks

April 9, 2018Simeon Georgiev

Scare Techniques of Cybercriminals in Ransomware Removal

June 30, 2018Simeon Georgiev
scare

First Ransomware Attack – Where Did It All Begun?

July 19, 2018Simeon Georgiev
first ransomware attack

Latest on Ransomware TV

https://vimeo.com/399908876?loop=0

Recent Posts

  • How to protect your organization against ransomware reinfections
  • AuKill Helps Ransomware Operators Disable EDR and Security Tools
  • AI-ransomware is a real threat, just not a realistic one yet
  • Rorschach is the new speed king in the ransomware space
  • The Role of Supply Chain Breaches in Ransomware Attacks

Stay Protected

Subscribe to our mailing list to get the latest cyber security and ransomware removal articles!

Thank you for subscribing.

Something went wrong.

Navigation

  • Cyber Security
    • Ransomware File Recovery
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware Types
  • News
  • Tutorials

Ransomware Attacks (Last 6M)

0

Connect & Protect

Facebook
Google+
LinkedIn
YouTube
Vimeo

More

  • BECOME A CONTRIBUTOR

MonsterCloud Reviews

© 2020 MonsterCloud.com. All Rights Reserved.