Ryuk Variants
Ryuk Variants
04/08/2021
• What is Ryuk?
• A New Ryuk Variant Emerges in 2021
• Progression of a Ryuk Infection
• Infection Chains
• Incident: Late September Attack on a Major US
Hospital Network
• Incident: Late October Attack on US Hospitals
• UNC1878 – WIZARD SPIDER
• Danger to the HPH Sector
• Mitigations and Best Practices
• References
Slides Key:
Non-Technical: Managerial, strategic and high-
level (general audience)
2
What is Ryuk?
3
A New Ryuk Variant Emerges in 2021
4
Progression of a Ryuk Infection
• The French National Agency for the Security of Information Systems (ANSSI) identified the initial infection
point as a privileged domain account
• As the new variant moves through the network, it scans for network shares and copies a unique version of
the ransomware executable to each of them as they are found
o Uses Wake-on-LAN feature to automatically remotely turn on other machines on the same network
• Uses the filename lan.exe or rep.exe
• Encrypts files with the AES256 algorithm of Microsoft’s CryptoAPI, and a unique AES key wrapped with an
RSA public key stored in the binary code for each file
• Files will be encrypted and appended with .RYK
• Files RyukReadMe.txt and RyukReadMe.html will appear in affected directories
o These ransom notes direct victims to contact the ransomware operators at two specific email
addresses and provide a Bitcoin wallet for ransom payment
• No ransomware site
o Victims are identified from press releases, press coverage, and cryptocurrency transactions with
known Ryuk-affiliated wallets
5
Infection Chains
6
Infection Chains (Cont.)
7
Incident: Late September Attack on a Major US Hospital Network
8
Incident: Late October Attack on US Hospitals
• CISA, FBI, and HHS released alert based on “credible information of an increased and imminent
cybercrime threat to US hospitals and healthcare providers”
• Multiple confirmed hits across the US, including in:
o California
o Minnesota
o Oregon
o New York
• A doctor at an affected facility told Reuters that the “facility was functioning on paper after an attack and
unable to transfer patients because the nearest alternative was an hour away”
• Deemed “a coordinated attack designed to disrupt hospitals specifically all around the country”
• “While multiple ransomware attacks against healthcare providers each week have been commonplace, this
is the first time we have seen six hospitals targeted in the same day by the same ransomware actor.” –
Recorded Future
• Based on early alerts, hospitals took strong measures to minimize Ryuk exposure
• Even with these measures, Ryuk was reportedly responsible for 75% of attacks on the American
healthcare sector in October 2020
9
UNC1878 - WIZARDSPIDER
10
Danger to the HPH Sector
• High stakes: Threat actors know the costs of a ransomware or malware attack to a hospital’s operations
o Research by Coveware claims “ransomware attacks spur 15 days of EHR downtime, on average”
• Valuable Data: Medical data is easy to sell and commands a high price
o Organizations engaged in coronavirus response may have information related to vaccine research or
other intellectual property
• Groups using Ryuk, including UNC1878, have previously targeted US HPH organizations
11
Mitigations and Best Practices
Due to the tenacity of the new Ryuk variant, prevention is a more effective tool than mitigation or
remediation once Ryuk takes hold in a system
• The new variant also lacks any exclusion mechanisms, such as a Mutual Exclusion Objection (MUTEX), to
prevent multiple Ryuk processes from running on a single machine
o Reinfection of the same device is possible once the initial infection is cleared
Because Ryuk infections most commonly begin with the deployment of a form of “dropper” malware as a
foothold in the victim’s machine, we include these mitigations from CISA’s Alert (AA20-302A) on
Ransomware Activity Targeting the Healthcare and Public Health Sector:
• Patch operating systems, software, and firmware as soon as manufacturers release updates
• Check configurations for every operating system version for HPH organization-owned assets to prevent
issues from arising that local users are unable to fix due to having local administration disabled
• Regularly change passwords to network systems and accounts, and avoid reusing passwords for different
accounts
• Use multi-factor authentication where possible
• Disable unused remote access/Remote Desktop Protocol (RDP) ports and monitor remote access/RDP
logs
• Implement application and remote access to only allow systems to execute programs known and permitted
by the established security policy
• Audit user accounts with administrative privileges and configure access controls with least privilege in mind
12
Mitigations and Best Practices (Cont.)
13
Reference Materials
Key References
• “Alert (AA20-302A),” Cybersecurity and Infrastructure Security Agency. October 28, 2020. https://us-
cert.cisa.gov/ncas/alerts/aa20-302a
• “Ransomware: What It Is & What To Do About It,” The National Cyber Investigative Joint Task Force
(NCIJTF). February 4, 2021. https://www.ic3.gov/Content/PDF/Ransomware_Fact_Sheet.pdf
• “The Ryuk Ransomware,” French National Agency for the Security of Information Systems. March 1, 2021.
https://www.cert.ssi.gouv.fr/cti/CERTFR-2021-CTI-006/
15
References
• “A Bazar start: How one hospital thwarted a Ryuk ransomware outbreak,” Red Canary, October 29, 2020.
https://redcanary.com/blog/how-one-hospital-thwarted-a-Ryuk-ransomware-outbreak/
• Abrams, Lawrence. “BazarLoader used to deploy Ryuk ransomware on high-value targets,”
BleepingComputer, October 12, 2020. https://www.bleepingcomputer.com/news/security/bazarloader-used-
to-deploy-ryuk-ransomware-on-high-value-targets/
• “Alert (AA20-302A),” Cybersecurity and Infrastructure Security Agency. October 28, 2020. https://us-
cert.cisa.gov/ncas/alerts/aa20-302a
• Associated Press. “German Hospital Hacked, Patient Taken to Another City Dies,” Security Week,
September 17, 2020. https://www.securityweek.com/german-hospital-hacked-patient-taken-another-city-
dies
• Artnz, Peter. “Ryuk ransomware develops worm-like capability,” MalwareBytes. March 2, 2021.
https://blog.malwarebytes.com/malwarebytes-news/2021/03/ryuk-ransomware-develops-worm-like-
capability/
• “A Tsunami of Ryuk Ransomware Attacks Hits U.S. Hospitals,” CISOMAG. October 29, 2020.
https://cisomag.eccouncil.org/ryuk-ransomware-targeting-us-hospitals/
• Bing, Christopher and Joseph Menn. “Building wave of ransomware attacks strike U.S. hospitals,” Reuters,
October 28, 2020. https://www.reuters.com/article/uk-usa-healthcare-cyber/fbi-probes-string-of-recent-
ransomware-attacks-on-u-s-hospitals-idUKKBN27D36P
• Davis, Jessica. “Update to Ryuk Ransomware Variant Adds Network Worming Capability,” HealthITSecurity.
March 2, 2021. https://healthitsecurity.com/news/update-to-ryuk-ransomware-variant-adds-network-
worming-capability
16
References II
• Davis, Jessica. “UPDATE: UHS Health System Confirms All US Sites Affected by Ransomware Attack,”
Health IT Security, October 3, 2020. https://healthitsecurity.com/news/uhs-health-system-confirms-all-us-
sites-affected-by-ransomware-attack
• Felegy, Amy. “'Unusual network activity' at Ridgeview Medical Center,” SW News Media, October 27, 2020.
https://www.swnewsmedia.com/chanhassen_villager/news/local/unusual-network-activity-at-ridgeview-
medical-center/article_5fc12f6e-c320-59d4-9ad4-24f5cb985a36.html
• Jercich, Katie. “UHS says all U.S. facilities affected by apparent ransomware attack,” Healthcare IT News,
October 2, 2020. https://www.healthcareitnews.com/news/uhs-says-all-us-facilities-affected-apparent-
ransomware-attack
• Krebs, Brian. “FBI, DHS, HHS Warn of Imminent, Credible Ransomware Threat Against U.S. Hospitals,”
Krebs On Security, October 28, 2020. https://krebsonsecurity.com/2020/10/fbi-dhs-hhs-warn-of-imminent-
credible-ransomware-threat-against-u-s-hospitals/
• Lemos, Robert. “Trickbot Tenacity Shows Infrastructure Resistant to Takedowns,” DarkReading, October 20,
2020. https://www.darkreading.com/threat-intelligence/trickbot-tenacity-shows-infrastructure-resistant-to-
takedowns/d/d-id/1339217
• Muncaster, Phil. “Red Alert as US Hospitals Are Flooded with Ryuk Ransomware,” Information Security
Magazine, October 29, 2020. https://www.infosecurity-magazine.com/news/red-alert-us-hospitals-flooded
• Palmer, Danny. “This new Trickbot malware update makes it even harder to detect,” ZDNet, May 29, 2020.
https://www.zdnet.com/article/this-new-trickbot-malware-update-makes-it-even-harder-to-detect/
• Seals, Tara. “Ryuk Ransomware: Now with Worming Self-Propagation,” ThreatPost. March 2, 2021.
https://threatpost.com/ryuk-ransomware-worming-self-propagation/164412/
17
References III
• Swindell, Bill. “Sonoma Valley Hospital Hit by Cybercriminals with Ransomware,” Press Democrat, October
30, 2020. https://www.pressdemocrat.com/article/news/sonoma-valley-hospital-hit-by-cybercriminals-with-
ransomware-attack/?sba=AAS
• Ta, Van and Aaron Stephens. “Spooky Ryuky: The Return of UNC1878,” SANS, October 28, 2020.
https://www.youtube.com/watch?v=BhjQ6zsCVSc
• Umawing, Joel. “Threat spotlight: the curious case of Ryuk ransomware,” MalwareBytes. December 12,
2019. https://blog.malwarebytes.com/threat-spotlight/2019/12/threat-spotlight-the-curious-case-of-ryuk-
ransomware/
• “What is a computer worm, and how does it work?,” Norton LifeLock. August 28, 2019.
https://us.norton.com/internetsecurity-malware-what-is-a-computer-worm.html
• “WIZARD SPIDER Update: Resilient, Reactive and Resolute,” CrowdStrike, October 16, 2020.
https://www.crowdstrike.com/blog/wizard-spider-adversary-update/
18
? Questions
Questions
Recipients of this and other Healthcare Sector These recommendations are advisory and are
Cybersecurity Coordination Center (HC3) Threat not to be considered as Federal directives or
Intelligence products are highly encouraged to standards. Representatives should review and
provide feedback. If you wish to provide feedback apply the guidance based on their own
please complete the HC3 Customer Feedback requirements and discretion. HHS does not
Survey. endorse any specific person, entity, product,
service, or enterprise.
20
About Us
HC3 works with private and public sector partners to improve cybersecurity
throughout the Healthcare and Public Health (HPH) Sector
Products
Sector & Victim Notifications White Papers Threat Briefings & Webinar
Direct communications to victims or Document that provides in-depth Briefing presentations that provide
potential victims of compromises, information on a cybersecurity topic to actionable information on health sector
vulnerable equipment or PII/PHI theft, increase comprehensive situational cybersecurity threats and mitigations.
as well as general notifications to the awareness and provide risk Analysts present current cybersecurity
HPH about current impacting threats recommendations to a wide audience. topics, engage in discussions with
via the HHS OIG. participants on current threats, and
highlight best practices and mitigation
tactics.
Need information on a specific cybersecurity topic, or want to join our Listserv? Send your request for information (RFI) to
HC3@HHS.GOV,or call us Monday-Friday between 9am-5pm (EST), at (202) 691-2110.
Visit us at: www.HHS.Gov/HC3
21
Contact