{"id":17180,"date":"2019-12-12T15:10:02","date_gmt":"2019-12-12T23:10:02","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2019\/12\/12\/news-10916\/"},"modified":"2019-12-12T15:10:02","modified_gmt":"2019-12-12T23:10:02","slug":"news-10916","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2019\/12\/12\/news-10916\/","title":{"rendered":"Threat spotlight: The curious case of Ryuk ransomware"},"content":{"rendered":"<p><strong>Credit to Author: Jovi Umawing| Date: Thu, 12 Dec 2019 22:33:53 +0000<\/strong><\/p>\n<p><em>Ryuk<\/em>. A name once unique to a fictional character in a popular Japanese comic book and cartoon series is now a name that appears in several rosters of the nastiest ransomware to ever grace the wild web. <\/p>\n<p>For an incredibly young strain\u2014only 15 months old\u2014Ryuk ransomware gaining such notoriety is quite a feat to achieve. Unless the threat actors behind its campaigns call it quits, too\u2014<a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/threat-spotlight\/2019\/07\/threat-spotlight-sodinokibi-ransomware-attempts-to-fill-gandcrab-void\/\" target=\"_blank\">Remember GandCrab?<\/a>\u2014or law enforcement collars them for good, we can only expect the threat of Ryuk to loom large over organizations.<\/p>\n<p>First discovered in mid-August 2018, Ryuk immediately turned heads after <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/malware\/2019\/01\/ryuk-ransomware-attacks-businesses-over-the-holidays\/\" target=\"_blank\">disrupting operations of all Tribune Publishing newspapers<\/a> over the Christmas holiday that year. What was initially thought of as a server outage soon became clear to those affected that it was actually a malware attack. It was quarantined eventually; however, Ryuk <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.latimes.com\/local\/lanow\/la-me-ln-times-delivery-disruption-20181229-story.html\" target=\"_blank\">re-infected and spread onto connected systems<\/a> in the network because the security patches failed to hold when tech teams brought the servers back.<\/p>\n<h3>Big game hunting with Ryuk ransomware<\/h3>\n<p>Before the holiday attack on Tribune Publishing, Ryuk had been seen targeting various enterprise organizations worldwide, asking ransom payments ranging from 15 to 50 Bitcoins (BTC). That translates to between US$97,000 and $320,000 at time of valuation.<\/p>\n<p>This method of exclusively targeting large organizations with critical assets that almost always guarantees a high ROI for criminals is called &#8220;big game hunting.&#8221; It\u2019s not easy to pull off, as such targeted attacks also involve the customization of campaigns to best suit targets and, in turn, increase the likelihood of their effectiveness. This requires much more work than a simple &#8220;spray-and-pray&#8221; approach that can capture numerous targets but may not net such lucrative results.<\/p>\n<p>For threat actors engaged in big game hunting, malicious campaigns are launched in phases. For example, they may start with a phishing attack to gather key credentials or drop malware within an organization&#8217;s network to do extensive mapping, identifying crucial assets to target. Then they might deploy second and third phases of attacks for extended espionage, extortion, and eventual ransom.<\/p>\n<p>To date, Ryuk ransomware is hailed as the costliest among its peers.  According to a report by Coveware, a first-of-its-kind incident response company specializing in ransomware, <a rel=\"noreferrer noopener\" aria-label=\"Ryuk\u2019s asking price is TEN times the average (opens in a new tab)\" href=\"https:\/\/www.coveware.com\/blog\/2019\/2\/19\/ryuk-ransomware-exploring-the-technical-and-human-connections\" target=\"_blank\">Ryuk\u2019s asking price is 10 times the average<\/a>, yet they also claim that ransoms are highly negotiable. The varying ways adversaries work out ransom payments suggests that there may be more than one criminal group who have access to and are operating Ryuk ransomware. <\/p>\n<h3>The who behind Ryuk<\/h3>\n<p>Accurately pinpointing the origin of an attack or malware strain is crucial, as it reveals as much about the threat actors behind attack campaigns as it does the payload itself. The name \u201cRyuk,\u201d which has obvious Japanese ties, is not a factor to consider when trying to discover who developed this ransomware. After all, it&#8217;s common practice for cybercriminals to use handles based on favorite anime and manga characters. These days, a malware strain is more than its name.<\/p>\n<p>Instead, similarities in code base, structure, attack vectors, and languages can point to relations between criminal groups and their malware families. Security researchers from Check Point found <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/research.checkpoint.com\/2018\/ryuk-ransomware-targeted-campaign-break\/\" target=\"_blank\">a connection between the Ryuk and Hermes ransomware strains<\/a> early on due to similarities in their code and structure, an association that persists up to this day. Because of this, many have assumed that Ryuk may also have ties with the <a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2019\/03\/the-advanced-persistent-threat-files-lazarus-group\/\">Lazarus Group<\/a>, the same North Korean <a href=\"https:\/\/blog.malwarebytes.com\/glossary\/advanced-persistent-threat-apt\/\">APT<\/a> group that operated the Hermes ransomware in the past.<\/p>\n<hr class=\"wp-block-separator is-style-wide\"\/>\n<p style=\"text-align:center\"><em>Recommended read: <\/em><a href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/hermes-ransomware-distributed-to-south-koreans-via-recent-flash-zero-day\/\"><em>Hermes ransomware distributed to South Koreans via recent Flash zero-day<\/em><\/a><\/p>\n<hr class=\"wp-block-separator is-style-wide\"\/>\n<p>However, code likeness alone is insufficient basis to support the Ryuk\/North Korean ties narrative. Hermes is a ransomware kit that is frequently peddled on the underground market, making it available for other cybercriminals to use in their attack campaigns. Furthermore, separate research from cybersecurity experts at <a rel=\"noreferrer noopener\" aria-label=\"Crowdstrike (opens in a new tab)\" href=\"https:\/\/www.crowdstrike.com\/blog\/big-game-hunting-with-ryuk-another-lucrative-targeted-ransomware\/\" target=\"_blank\">CrowdStrike<\/a>, <a rel=\"noreferrer noopener\" aria-label=\"FireEye (opens in a new tab)\" href=\"https:\/\/www.fireeye.com\/blog\/threat-research\/2019\/01\/a-nasty-trick-from-credential-theft-malware-to-business-disruption.html\" target=\"_blank\">FireEye<\/a>, <a rel=\"noreferrer noopener\" aria-label=\"Kryptos Logic (opens in a new tab)\" href=\"https:\/\/www.kryptoslogic.com\/blog\/2019\/01\/north-korean-apt-and-recent-ryuk-ransomware-attacks\/\" target=\"_blank\">Kryptos Logic<\/a>, and <a rel=\"noreferrer noopener\" aria-label=\"McAfee (opens in a new tab)\" href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ryuk-ransomware-attack-rush-to-attribution-misses-the-point\/\" target=\"_blank\">McAfee<\/a> has indicated that the gang behind Ryuk may actually be of Russian origin\u2014and not necessarily nation-state sponsored.<\/p>\n<p>As of this writing, the origins of Ryuk ransomware can be attributed (with high confidence, per some of our cybersecurity peers) to two criminal entities: <a rel=\"noreferrer noopener\" href=\"https:\/\/www.crowdstrike.com\/blog\/big-game-hunting-with-ryuk-another-lucrative-targeted-ransomware\/\" target=\"_blank\">Wizard Spider<\/a> and <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ryuk-ransomware-attack-rush-to-attribution-misses-the-point\/\" target=\"_blank\">CryptoTech<\/a>. <\/p>\n<p>The former is the well-known Russian cybercriminal group and operator of <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/detections\/trojan-trickbot\/\" target=\"_blank\">TrickBot<\/a>; the latter is a Russian-speaking organization found selling <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/taiwan-bank-heist-role-pseudo-ransomware\/\" target=\"_blank\">Hermes 2.1<\/a> two months before <a rel=\"noreferrer noopener\" aria-label=\"the $58.5 million US cyber heist (opens in a new tab)\" href=\"https:\/\/www.taiwannews.com.tw\/en\/news\/3544541\" target=\"_blank\">the $58.5 million cyber heist<\/a> that victimized the Far Eastern International Bank (FEIB) in Taiwan. According to reports, this version of <a rel=\"noreferrer noopener\" aria-label=\"Hermes was used as a decoy or &quot;pseudo-ransomware&quot; (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/threat-analysis\/2018\/03\/hermes-ransomware-distributed-to-south-koreans-via-recent-flash-zero-day\/\" target=\"_blank\">Hermes was used as a decoy or &#8220;pseudo-ransomware,&#8221;<\/a> a mere distraction from the real goal of the attack.<\/p>\n<h4>Wizard Spider <\/h4>\n<p>Recent findings have revealed that Wizard Spider upgraded Ryuk to include a Wake-on-LAN (WoL) utility and an ARP ping scanner in its arsenal. WoL is a network standard that allows computing devices connected to a network\u2014regardless of which operating system they run\u2014to be turned on remotely whenever they&#8217;re turned off, in sleep mode, or hibernating. <\/p>\n<p>ARP pinging, on the other hand, is a way of discovering endpoints in a <a rel=\"noreferrer noopener\" aria-label=\"LAN (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/glossary\/local-area-network\/\" target=\"_blank\">LAN<\/a> network that are online. According to CrowdStrike, these new additions reveal Wizard Spider&#8217;s attempts to reach and infect as many of their target&#8217;s endpoints as they can, demonstrating a persistent focus and motivation to increasingly monetize their victims\u2019 encrypted data.<\/p>\n<h4>CryptoTech<\/h4>\n<p>Two months ago, Gabriela Nicolao (<a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/twitter.com\/rove4ever\" target=\"_blank\">@rove4ever<\/a>) and Luciano Martins (<a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/twitter.com\/clucianomartins\" target=\"_blank\">@clucianomartins<\/a>), both researchers at Deloitte Argentina, attributed Ryuk ransomware to CryptoTech, a little-known cybercriminal group that was observed touting Hermes 2.1 in an underground forum back in August 2017. Hermes 2.1, the researchers say, is Ryuk ransomware.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" data-attachment-id=\"41455\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-spotlight\/2019\/12\/threat-spotlight-the-curious-case-of-ryuk-ransomware\/attachment\/cryptotech-mcafee\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/cryptotech-mcafee.png\" data-orig-size=\"1139,895\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"cryptotech-mcafee\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/cryptotech-mcafee-300x236.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/cryptotech-mcafee-600x471.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/cryptotech-mcafee-600x471.png\" alt=\"\" class=\"wp-image-41455\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/cryptotech-mcafee-600x471.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/cryptotech-mcafee-300x236.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/cryptotech-mcafee.png 1139w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><figcaption>The CryptoTech post about Hermes version 2.1 on the dark web in August 2017 (Courtesy of McAfee)<\/figcaption><\/figure>\n<\/div>\n<p>In a Virus Bulletin <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.virusbulletin.com\/virusbulletin\/2019\/10\/vb2019-paper-shinigamis-revenge-long-tail-ryuk-malware\/\" target=\"_blank\">conference paper<\/a> and <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.virusbulletin.com\/conference\/vb2019\/abstracts\/shinigamis-revenge-long-tail-ryuk-malware\/\" target=\"_blank\">presentation<\/a> entitled <em>Shinigami\u2019s revenge: the long tail of the Ryuk ransomware<\/em>, Nicolao and Martins presented evidence to this claim: In June 2018, a couple of months before Ryuk made its first public appearance, an underground forum poster expressed doubt on CryptoTech being the author of Hermes 2.1, the ransomware toolkit they were peddling almost a year ago that time. CryptoTech\u2019s response was interesting, which Nicolao and Martins captured and annotated in the screenshot below.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" data-attachment-id=\"41456\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-spotlight\/2019\/12\/threat-spotlight-the-curious-case-of-ryuk-ransomware\/attachment\/cryptotech-nicolao-martins\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/cryptotech-nicolao-martins.png\" data-orig-size=\"727,365\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"cryptotech-nicolao-martins\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/cryptotech-nicolao-martins-300x151.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/cryptotech-nicolao-martins-600x301.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/cryptotech-nicolao-martins-600x301.png\" alt=\"\" class=\"wp-image-41456\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/cryptotech-nicolao-martins-600x301.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/cryptotech-nicolao-martins-300x151.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/cryptotech-nicolao-martins.png 727w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><figcaption>CryptoTech: Yes, we developed Hermes from scratch.<\/figcaption><\/figure>\n<\/div>\n<p>The Deloitte researchers also noted that after Ryuk emerged, CryptoTech went quiet.<\/p>\n<p>CrowdStrike has estimated that from the time Ryuk was deployed until January of this year, their operators have netted a total of 705.80 BTC, which is equivalent to US$5 million as of press time.<\/p>\n<h3>Ryuk ransomware infection vectors<\/h3>\n<p>There was a time when Ryuk ransomware arrived on clean systems to wreak havoc. But new strains observed in the wild now belong to a multi-attack campaign that involves <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/detections\/trojan-emotet\/\" target=\"_blank\">Emotet<\/a> and <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/detections\/trojan-trickbot\/\" target=\"_blank\">TrickBot<\/a>. As such, Ryuk variants arrive on systems pre-infected with other malware\u2014a &#8220;triple threat&#8221; attack methodology. <\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" data-attachment-id=\"41457\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-spotlight\/2019\/12\/threat-spotlight-the-curious-case-of-ryuk-ransomware\/attachment\/triple-threat\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/triple-threat.png\" data-orig-size=\"1600,593\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"triple-threat\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/triple-threat-300x111.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/triple-threat-600x222.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/triple-threat-600x222.png\" alt=\"\" class=\"wp-image-41457\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/triple-threat-600x222.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/triple-threat-300x111.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/triple-threat.png 1600w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><figcaption>How the Emotet, TrickBot, and Ryuk triple threat attack works (Courtesy of Cybereason)<\/figcaption><\/figure>\n<\/div>\n<p>The first stage of the attack starts with a weaponized Microsoft Office document file\u2014meaning, it contains malicious macro code\u2014attached to a <a rel=\"noreferrer noopener\" aria-label=\"phishing email (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/06\/somethings-phishy-how-to-detect-phishing-attempts\/\" target=\"_blank\">phishing email<\/a>. Once the user opens it, the malicious macro will run <code>cmd<\/code> and execute a PowerShell command. This command attempts to download <a href=\"https:\/\/blog.malwarebytes.com\/botnets\/2019\/09\/emotet-is-back-botnet-springs-back-to-life-with-new-spam-campaign\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"Emotet (opens in a new tab)\">Emotet<\/a>.<\/p>\n<p>Once Emotet executes, it retrieves and executes another malicious payload\u2014usually <a href=\"https:\/\/blog.malwarebytes.com\/101\/2018\/11\/trickbot-takes-top-business-threat\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"TrickBot (opens in a new tab)\">TrickBot<\/a>\u2014and collects information on affected systems. It initiates the download and execution of TrickBot by reaching out to and downloading from a pre-configured remote malicious host.<\/p>\n<p>Once infected with TrickBot, the threat actors then check if the system is part of a sector they are targeting. If so, they download an additional payload and use the admin credentials stolen using TrickBot to perform lateral movement to reach the assets they wish to infect.<\/p>\n<p>The threat actors then check for and establish a connection with the target\u2019s live servers via a <a href=\"https:\/\/blog.malwarebytes.com\/glossary\/remote-desktop-protocol-rdp\/\">remote desktop protocol (RDP)<\/a>. From there, they drop Ryuk.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" data-attachment-id=\"41458\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-spotlight\/2019\/12\/threat-spotlight-the-curious-case-of-ryuk-ransomware\/attachment\/ryuk-ransom-notes\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/ryuk-ransom-notes.png\" data-orig-size=\"1529,895\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"ryuk-ransom-notes\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/ryuk-ransom-notes-300x176.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/ryuk-ransom-notes-600x351.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/ryuk-ransom-notes-600x351.png\" alt=\"\" class=\"wp-image-41458\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/ryuk-ransom-notes-600x351.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/ryuk-ransom-notes-300x176.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/ryuk-ransom-notes.png 1529w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n<\/div>\n<p>Systems infected with the Ryuk ransomware displays the following symptoms:<\/p>\n<p><strong>Presence of ransomware notes.<\/strong> Ryuk drops the ransom note, <em>RyukReadMe.html <\/em>or<em> RyukReadMe.txt<\/em>, in every folder where it has encrypted files.<\/p>\n<p>The HTML file, as you can see from the screenshot above, contains two private email addresses that affected parties can use to contact the threat actors, either to find out how much they need to pay to get access back to their encrypted files or to start the negotiation process.<\/p>\n<p>On the other hand, the TXT ransom note contains (1) explicit instructions laid out for affected parties to read and comply, (2) two private email addresses affected parties can contact, and (3) a Bitcoin wallet address. Although email addresses may vary, it was noted that they are all accounts served at Protonmail or Tutanota. It was also <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.crowdstrike.com\/blog\/big-game-hunting-with-ryuk-another-lucrative-targeted-ransomware\/\" target=\"_blank\">noted<\/a> that a day after the unsealing of <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.justice.gov\/opa\/pr\/two-iranian-men-indicted-deploying-ransomware-extort-hospitals-municipalities-and-public\" target=\"_blank\">the indictment of two ransomware operators<\/a>, Ryuk operators removed the Bitcoin address from their ransom notes, stating that it will be given to those affected once they are contacted via email.<\/p>\n<p>There are usually two versions of the text ransom note: a polite version, which past research claims is comparable to BitPaymer\u2019s due to certain similar phrasings; and a not-so-polite version.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" data-attachment-id=\"41459\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-spotlight\/2019\/12\/threat-spotlight-the-curious-case-of-ryuk-ransomware\/attachment\/ryuk-ransom-note-versions\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/ryuk-ransom-note-versions.png\" data-orig-size=\"1975,1366\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"ryuk-ransom-note-versions\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/ryuk-ransom-note-versions-300x207.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/ryuk-ransom-note-versions-600x415.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/ryuk-ransom-note-versions-600x415.png\" alt=\"\" class=\"wp-image-41459\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/ryuk-ransom-note-versions-600x415.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/ryuk-ransom-note-versions-300x207.png 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><figcaption>Ryuk ransom notes. Left: polite version; Right: not-so-polite version<\/figcaption><\/figure>\n<\/div>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" data-attachment-id=\"41460\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-spotlight\/2019\/12\/threat-spotlight-the-curious-case-of-ryuk-ransomware\/attachment\/bitpaymer-polite-coveware\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/bitpaymer-polite-coveware.png\" data-orig-size=\"611,525\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"bitpaymer-polite-coveware\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/bitpaymer-polite-coveware-300x258.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/bitpaymer-polite-coveware-600x516.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/bitpaymer-polite-coveware-600x516.png\" alt=\"\" class=\"wp-image-41460\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/bitpaymer-polite-coveware-600x516.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/bitpaymer-polite-coveware-300x258.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/bitpaymer-polite-coveware.png 611w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><figcaption>BitPaymer ransom note: polite version (Courtesy of Coveware)<br \/><\/figcaption><\/figure>\n<\/div>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" data-attachment-id=\"41461\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-spotlight\/2019\/12\/threat-spotlight-the-curious-case-of-ryuk-ransomware\/attachment\/bitpaymer-not-so-polite-symantec\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/bitpaymer-not-so-polite-symantec.png\" data-orig-size=\"604,351\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"bitpaymer-not-so-polite-symantec\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/bitpaymer-not-so-polite-symantec-300x174.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/bitpaymer-not-so-polite-symantec-600x349.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/bitpaymer-not-so-polite-symantec-600x349.png\" alt=\"\" class=\"wp-image-41461\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/bitpaymer-not-so-polite-symantec-600x349.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/bitpaymer-not-so-polite-symantec-300x174.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/bitpaymer-not-so-polite-symantec.png 604w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><figcaption>BitPaymer ransom note: not-so-polite version (Courtesy of Symantec)<\/figcaption><\/figure>\n<\/div>\n<p><strong>Encrypted files with the RYK string attached to extension names.<\/strong> Ryuk uses a combination of symmetric (via the use of <a href=\"https:\/\/searchsecurity.techtarget.com\/definition\/Advanced-Encryption-Standard\">AES<\/a>) and asymmetric (via the use of <a href=\"https:\/\/searchsecurity.techtarget.com\/definition\/RSA\">RSA<\/a>) encryption to encode files. A private key, which only the threat actor can supply, is needed to properly decrypt files.<\/p>\n<p>Encrypted files will have the .ryk file extension appended to the file names. For example, an encrypted <em>sample.pdf<\/em> and <em>sample.mp4<\/em> files will have the <em>sample.pdf.ryk<\/em> and <em>sample.mp4.ryk<\/em> file names, respectively.<\/p>\n<p>This scheme is effective, assuming that each Ryuk strain was tailor-made for their target organization.<\/p>\n<p>While Ryuk encrypts files on affected systems, it avoids files with the extension .exe, .dll, and .hrmlog (a file type associated with Hermes). Ryuk also avoids encrypting files in the following folders:<\/p>\n<ul>\n<li>AhnLab <\/li>\n<li>Chrome<\/li>\n<li>Microsoft<\/li>\n<li>Mozilla<\/li>\n<li>Recycle.bin<\/li>\n<li>Windows<\/li>\n<\/ul>\n<h2>Protect your system from Ryuk<\/h2>\n<p>Malwarebytes continues to track Ryuk ransomware campaigns, protecting our business users with real-time anti-malware and anti-ransomware technology, as well as <a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.malwarebytes.com\/business\/endpointprotectionandresponse\/\" target=\"_blank\">signature-less detection<\/a>, which stops the attack earlier on in the chain. In addition, we protect against triple threat attacks aimed at delivering Ryuk as a final payload by blocking downloads of Emotet or TrickBot.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter\"><img decoding=\"async\" data-attachment-id=\"41462\" data-permalink=\"https:\/\/blog.malwarebytes.com\/threat-spotlight\/2019\/12\/threat-spotlight-the-curious-case-of-ryuk-ransomware\/attachment\/mwb-ryuk-detection\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/mwb-ryuk-detection.png\" data-orig-size=\"626,444\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"mwb-ryuk-detection\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/mwb-ryuk-detection-300x213.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/mwb-ryuk-detection-600x426.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/mwb-ryuk-detection-600x426.png\" alt=\"\" class=\"wp-image-41462\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/mwb-ryuk-detection-600x426.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/mwb-ryuk-detection-300x213.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/mwb-ryuk-detection.png 626w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/figure>\n<\/div>\n<p>We recommend IT administrators take the following actions to secure and mitigate against Ryuk ransomware attacks:<\/p>\n<ul>\n<li>Educate every employee in the organization, including executives, on how to correctly handle <a rel=\"noreferrer noopener\" aria-label=\"suspicious emails (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/101\/2018\/06\/five-easy-ways-to-recognize-and-dispose-of-malicious-emails\/\" target=\"_blank\">suspicious emails<\/a>.<\/li>\n<li>Limit the use of privilege accounts to only a select few in the organization.<\/li>\n<li>Avoid using <a rel=\"noreferrer noopener\" aria-label=\"RDPs (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/business-security-world\/2018\/08\/protect-rdp-access-ransomware-attacks\/\" target=\"_blank\">RDPs<\/a> without properly terminating the session.<\/li>\n<li>Implement the use of a <a rel=\"noreferrer noopener\" aria-label=\"password manager (opens in a new tab)\" href=\"https:\/\/blog.malwarebytes.com\/awareness\/2019\/10\/when-can-we-get-rid-of-passwords-for-good\/\" target=\"_blank\">password manager<\/a> and single sign-on services for company-related accounts. Do away with other insecure password management practices.<\/li>\n<li>Deploy an authentication process that works for the company.<\/li>\n<li>Disable unnecessary share folders, so that in the event of a Ryuk ransomware attack, the malware is prevented from moving laterally in the network.<\/li>\n<li>Make sure that all software installed on endpoints and servers is up to date and <a href=\"https:\/\/blog.malwarebytes.com\/101\/2018\/12\/how-threat-actors-are-using-smb-vulnerabilities\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"all vulnerabilities are patched (opens in a new tab)\">all vulnerabilities are patched<\/a>. Pay particular attention to patching CVE-2017-0144, a remote code-execution vulnerability. This will prevent TrickBot and other malware exploiting this weakness from spreading.<\/li>\n<li>Apply attachment filtering to email messages.<\/li>\n<li> Disable macros across the environment.<\/li>\n<\/ul>\n<p>For a list of technologies and operations that have been found to be effective against Ryuk ransomware attacks, you can go <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/malware\/2019\/01\/ryuk-ransomware-attacks-businesses-over-the-holidays\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"here (opens in a new tab)\">here<\/a>.<\/p>\n<h2>Indicators of Compromise (IOCs)<\/h2>\n<p>Take note that professional cybercriminals sell Ryuk to other criminals on the black market as a toolkit for threat actors to build their own strain of the ransomware. As such, one shouldn\u2019t be surprised by the number of Ryuk variants that are wreaking havoc in the wild. Below is a list of file hashes that we have seen so far:<\/p>\n<ul>\n<li>cb0c1248d3899358a375888bb4e8f3fe<\/li>\n<li>d4a7c85f23438de8ebb5f8d6e04e55fc<\/li>\n<li>3895a370b0c69c7e23ebb5ca1598525d<\/li>\n<li>567407d941d99abeff20a1b836570d30<\/li>\n<li> c0d6a263181a04e9039df3372afb8016 <\/li>\n<\/ul>\n<p>As always\u2014stay safe, everyone! <\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-spotlight\/2019\/12\/threat-spotlight-the-curious-case-of-ryuk-ransomware\/\">Threat spotlight: The curious case of Ryuk ransomware<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/threat-spotlight\/2019\/12\/threat-spotlight-the-curious-case-of-ryuk-ransomware\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Jovi Umawing| Date: Thu, 12 Dec 2019 22:33:53 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/threat-spotlight\/2019\/12\/threat-spotlight-the-curious-case-of-ryuk-ransomware\/' title='Threat spotlight: The curious case of Ryuk ransomware'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/ryuk-on-red2.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>From comic book death god to ransomware baddie, Ryuk ransomware remains a mainstay when organizations find themselves in a crippling malware pinch. We look at Ryuk&#8217;s origins, attack methods, and how to protect against this ever-present threat.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/threat-spotlight\/\" rel=\"category tag\">Threat spotlight<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/aes\/\" rel=\"tag\">AES<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/average-ransom-amount\/\" rel=\"tag\">average ransom amount<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/bitpaymer\/\" rel=\"tag\">BitPaymer<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/bitpaymer-ransomware\/\" rel=\"tag\">BitPaymer ransomware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/cryptotech\/\" rel=\"tag\">CryptoTech<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/death-note\/\" rel=\"tag\">Death Note<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/emotet\/\" rel=\"tag\">emotet<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/far-eastern-international-bank\/\" rel=\"tag\">Far Eastern International Bank<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/feib\/\" rel=\"tag\">FEIB<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/gabriela-nicolao\/\" rel=\"tag\">Gabriela Nicolao<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/gandcrab\/\" rel=\"tag\">gandcrab<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/hermes\/\" rel=\"tag\">Hermes<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/hermes-2-1\/\" rel=\"tag\">Hermes 2.1<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/luciano-martins\/\" rel=\"tag\">Luciano Martins<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/pseudo-ransomware\/\" rel=\"tag\">pseudo-ransomware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ransom-ryuk\/\" rel=\"tag\">Ransom.Ryuk<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/rdp\/\" rel=\"tag\">rdp<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/remote-desktop-protocol\/\" rel=\"tag\">remote desktop protocol<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/rsa\/\" rel=\"tag\">RSA<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/russian-threat-actors\/\" rel=\"tag\">Russian threat actors<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ryuk\/\" rel=\"tag\">ryuk<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ryuk-ransomware\/\" rel=\"tag\">Ryuk ransomware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/shinigamis-revenge-the-long-tail-of-the-ryuk-ransomware\/\" rel=\"tag\">Shinigami\u2019s revenge: the long tail of the Ryuk ransomware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/tribune-publishing\/\" rel=\"tag\">tribune publishing<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/trickbot\/\" rel=\"tag\">trickbot<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/wake-on-lan\/\" rel=\"tag\">Wake-on-LAN<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/wizard-spider\/\" rel=\"tag\">Wizard Spider<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/wol\/\" rel=\"tag\">WoL<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/threat-spotlight\/2019\/12\/threat-spotlight-the-curious-case-of-ryuk-ransomware\/' title='Threat spotlight: The curious case of Ryuk ransomware'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/threat-spotlight\/2019\/12\/threat-spotlight-the-curious-case-of-ryuk-ransomware\/\">Threat spotlight: The curious case of Ryuk ransomware<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[20300,23717,23600,20613,23718,23719,15715,23720,23721,23722,17363,17782,23723,23724,23725,23726,18324,18285,11315,23727,19317,20562,23728,21161,20622,13256,23729,23730,23731],"class_list":["post-17180","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-aes","tag-average-ransom-amount","tag-bitpaymer","tag-bitpaymer-ransomware","tag-cryptotech","tag-death-note","tag-emotet","tag-far-eastern-international-bank","tag-feib","tag-gabriela-nicolao","tag-gandcrab","tag-hermes","tag-hermes-2-1","tag-luciano-martins","tag-pseudo-ransomware","tag-ransom-ryuk","tag-rdp","tag-remote-desktop-protocol","tag-rsa","tag-russian-threat-actors","tag-ryuk","tag-ryuk-ransomware","tag-shinigamis-revenge-the-long-tail-of-the-ryuk-ransomware","tag-threat-spotlight","tag-tribune-publishing","tag-trickbot","tag-wake-on-lan","tag-wizard-spider","tag-wol"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17180","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=17180"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17180\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=17180"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=17180"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=17180"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}