{"id":16670,"date":"2019-10-23T10:52:17","date_gmt":"2019-10-23T18:52:17","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2019\/10\/23\/news-10409\/"},"modified":"2019-10-23T10:52:17","modified_gmt":"2019-10-23T18:52:17","slug":"news-10409","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/10\/23\/news-10409\/","title":{"rendered":"VB2019 papers: Emotet and Ryuk"},"content":{"rendered":"<p>Targeted ransomware has become one of the biggest and most damaging cybercrime trends in recent years. &#8216;Targeted&#8217; is a bit of a misnomer though: the operators of the ransomware rarely choose the victim organisations. Instead, they have the organisations &#8216;chosen&#8217; through an infection with another piece of malware that is then used as a foothold for the ransomware.<\/p>\n<p>Quite often, this malware is Emotet, which made a <a title=\"New Emotet spam campaign continues to bypass email security products\" href=\"https:\/\/www.virusbulletin.com\/blog\/2019\/09\/new-emotet-spam-campaign-continues-bypass-email-security-products\/\">spectacular comeback<\/a> in September. The ransomware is deployed often through a second malware family like Trickbot. Various ransomware families are making use of this scheme to be installed on high-value networks, with <a href=\"https:\/\/thenextweb.com\/hardfork\/2019\/10\/07\/us-hospitals-pay-bitcoin-cryptocurrency-to-survive-ryuk-ransomware-attack\/\" target=\"_blank\">Ryuk<\/a> being one of the most prominent.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" style=\"display: block; margin-left: auto; margin-right: auto;\" src=\"https:\/\/www.virusbulletin.com\/files\/cache\/397bf6cd718c0bd82bae1dcd1ff9a373_f3799.png\" alt=\"f1_detected_samples.png\" width=\"400\" height=\"200\" \/><span class=\"centered-caption\">Detected Emotet samples on a daily basis in 2019.<\/span><\/p>\n<p>A good understanding of Emotet and an ability to defend against it will allow one to <a href=\"https:\/\/twitter.com\/jepayneMSFT\/status\/1080564143357231110\" target=\"_blank\">fend off<\/a> many sophisticated targeted attackers, while an understanding of Ryuk and similar ransomware families will aid an overall understanding of how such malware then spreads through an internal network.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"framed\" style=\"display: block; margin-left: auto; margin-right: auto;\" src=\"https:\/\/www.virusbulletin.com\/files\/cache\/2d253f275b84f13eb8059cc9fddd5146_f3795.png\" alt=\"Ryuk-Figure5.png\" width=\"300\" height=\"152\" \/><span class=\"centered-caption\">Ryuk ransom note.<\/span><\/p>\n<p>Today we publish two relevant papers presented at VB2019, the 29th Virus Bulletin Conference. <em>Sophos<\/em> researcher Luca Nagy presented a paper on Emotet, while <em>Deloitte<\/em> researchers Gabriela Nicolao and Luciano Martins presented one on Ryuk. In addition to the respective papers, we have also uploaded the videos of the presentations to our <em>YouTube<\/em> channel.<\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p>\u00a0<\/p>\n<p style=\"text-align: center;\" width=\"100%\" height=\"420\"><iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/OldiIbsbbIc\" frameborder=\"0\" width=\"100%\" height=\"420\" style=\"\">\u00a0<\/iframe><\/p>\n<p>\u00a0<\/p>\n<p style=\"text-align: center;\" width=\"100%\" height=\"420\"><iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/7nIHJXr8cGg\" frameborder=\"0\" width=\"100%\" height=\"420\" style=\"\"><\/iframe><\/p>\n<p>\u00a0<\/p>\n<p>outertext<br \/><a href=\"https:\/\/www.virusbulletin.com\/blog\/2019\/10\/vb2019-papers-emotet-and-ryuk\/\" target=\"bwo\" >https:\/\/www.virusbulletin.com\/rss<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.virusbulletin.com\/files\/cache\/397bf6cd718c0bd82bae1dcd1ff9a373_f3799.png\"\/><br \/>                                 Today we publish VB2019 papers by Luca Nagy (Sophos) on Emotet and Gabriela Nicolao and Luciano Martins (Deloitte) on Ryuk, as well as the corresponding videos of their presentations.                <\/p>\n<p>                 <a href=\"https:\/\/www.virusbulletin.com\/blog\/2019\/10\/vb2019-papers-emotet-and-ryuk\/\">Read more<\/a>                                <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[23177,10378,23176],"tags":[],"class_list":["post-16670","post","type-post","status-publish","format-standard","hentry","category-magazine","category-security","category-virusbulletin"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16670","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=16670"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/16670\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=16670"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=16670"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=16670"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}