• Cyber Security
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware File Recovery
    • Ransomware Types
  • Ransomware Services
    • Ransomware Removal
    • Ransomware File Recovery
  • News
  • Tutorials
  • Ransomware TV

Ryuk Ransomware: A Case of Mistaken Identity

February 28, 2019Simeon Georgiev

Ryuk ransomware has been around for more than a year now. However, this cryptovirological strain only made it to the headlines at the end of 2018 when its operators launched a series of attack on several US news publications. Initially, it was believed that Ryuk is another assault from North Korean state actors.

The latest findings suggest that North Korean Intelligence Agency is not behind the Ryuk ransomware activity. Instead, it was a joint venture between two cybercriminal groups. It has also been asserted that the groups appear to be Russians or belong to the surrounding satellite states.

Ryuk: One of the Costliest Cryptovirological Exploit

The majority of cryptovirological strains are developed and launched to reap monetary benefits by targeting users and taking money from them to provide ransomware removal. Since Ryuk is not a part of any hybrid warfare from North Korea, therefore it’s now clear that its operators are also running it for the sole purpose of moneymaking.

According to the report furnished by McAfee, Ryuk might be the most costly cryptovirological exploit to date with respect to the extortion payments its operators have received. The report reveals that the average extortion payment of Ryuk activity is around $71,000. The targeted entities have to pay that money in cryptocurrency.

Ryuk Operators Leave Room for Bargaining

Many cryptovirological operators are quite inflexible on the amount of extortion. Ryuk operators, on the other hand, have taken a different approach. They are willing to readjust the extortion amount to provide the decryption key. It has also been reported that in many cases Ryuk operators have lowered their extortion demand for more than half. This bargaining tactic has played out well for them since many users are paying them instead of going for professional ransomware removal.

The Soviet Connection

Researchers have found several things that strongly point out that the involved organizations are from the Soviet region. For instance, they have found that Russian has been used in the encryption scripts. Moreover, the quotes from Lenin in some ransom notes also indicate that Ryuk operators have a strong connection with Russia or other post-Soviet states.

Customized Ransom Notes

Ryuk operators have also given a unique identity to their cryptovirological activity by working on customized ransom notes. Instead of using the same template in every attack, they use different language, text and the extortion amount. It shows that the operators might first do the prospecting of their targets. This is also the reason why they are so successful in collecting extraordinary amount in the name of ransom removal.

Ryuk ransomware is an active vector and professional ransomware removal experts are still trying to come up with its complete decryption solution.

Simeon Georgiev
https://www.linkedin.com/in/simeon--georgiev/
I am a Cyber Security Enthusiast from Bulgaria. I like to write about malware and ransomware and global cyber attacks. You can reach me on Twitter @sgeorgiev1995 or Email: [email protected]
Previous post Ransomware Hits Healthcare Facility in Melbourne Next post Cryptovirological Discovery: Seed Locker Ransomware

Related Articles

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

January 27, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Ransomware: 4 Types of the Latest Trend in Cybercrimes

February 1, 2018Simeon Georgiev
Ransomware: 4 Types of the Latest Trend in Cybercrimes

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

February 1, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Latest on Ransomware TV

https://vimeo.com/399908876?loop=0

Recent Posts

  • How to protect your organization against ransomware reinfections
  • AuKill Helps Ransomware Operators Disable EDR and Security Tools
  • AI-ransomware is a real threat, just not a realistic one yet
  • Rorschach is the new speed king in the ransomware space
  • The Role of Supply Chain Breaches in Ransomware Attacks

Stay Protected

Subscribe to our mailing list to get the latest cyber security and ransomware removal articles!

Thank you for subscribing.

Something went wrong.

Navigation

  • Cyber Security
    • Ransomware File Recovery
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware Types
  • News
  • Tutorials

Ransomware Attacks (Last 6M)

0

Connect & Protect

Facebook
Google+
LinkedIn
YouTube
Vimeo

More

  • BECOME A CONTRIBUTOR

MonsterCloud Reviews

© 2020 MonsterCloud.com. All Rights Reserved.