Cybersecurity (opens in new tab) researchers have discovered a new strain of the Ryuk ransomware (opens in new tab) that appears to be going after web servers.
McAfee (opens in new tab) Enterprise’s Advanced Threat research team notes that Ryuk, which first took victims in an August 2018 campaign against several businesses, previously functioned like all other ransomware, encrypting its victim’s files and demanding a ransom in cryptocurrency (opens in new tab).
However, the new strain has added a couple more tricks to the ransomware’s arsenal in order to further traumatize its victims, forcing them to cough up the ranson.
- We've put together a list of the best endpoint protection (opens in new tab) software
- Here's our choice of the best malware removal (opens in new tab) software on the market
- These are the best firewall apps and services (opens in new tab)
“It is believed that this [new] functionality was added to newer versions of the malware to target web servers and deface public websites with the Ryuk ransom note. This is a tactic never seen before in the ransomware landscape and whose final purpose is to pressure victims to pay,” writes McAfee in a new technical report.
Spares index files
Earlier McAfee research has revealed similarities between Ryuk and the Hermes ransomware that’s on sale in underground forums and has been used by multiple threat actors.
McAfee believes Ryuk is used exclusively in targeted ransomware attacks, and often attacks its victims either via spear-phishing emails, or by exploiting compromised credentials for remote access systems, or piggybacking on other commodity malware (opens in new tab).
The new Ryuk sample though has shifted its attention to targeting web servers. McAfee says the new strain doesn’t encrypt the HTML (opens in new tab) index files on the machine, and instead replaces them with the ransom note.
Since all visitors to the website will now be shown the ransomware note, the new tactic helps Ryuk put additional stress on the victims to force them to the negotiation table.
Furthermore, once it’s done encrypting the files, the ransomware will inundate the victim by printing fifty copies of the ransom note on the user’s default printer (opens in new tab), further pressuring them to bow to the demands of the threat actors.
The new ransom note prompts victims to install the Tor browser (opens in new tab) in order to facilitate contact with the ransomware operators.
- Protect your devices with these best antivirus software (opens in new tab)