{"id":17542,"date":"2020-01-24T13:10:06","date_gmt":"2020-01-24T21:10:06","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2020\/01\/24\/news-11277\/"},"modified":"2020-01-24T13:10:06","modified_gmt":"2020-01-24T21:10:06","slug":"news-11277","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2020\/01\/24\/news-11277\/","title":{"rendered":"Tampa Bay Times hit with Ryuk ransomware attack"},"content":{"rendered":"<p><strong>Credit to Author: David Ruiz| Date: Fri, 24 Jan 2020 20:11:10 +0000<\/strong><\/p>\n<p>Florida newspaper <em>The Tampa Bay Times <\/em>suffered a Ryuk ransomware attack Thursday, making it the latest major victim of the notorious ransomware family that continues to rise in popularity.<\/p>\n<p>Curiously, the paper is at least the third Florida-based Ryuk victim in the past year. <\/p>\n<p>The attack, <a href=\"https:\/\/www.tampabay.com\/news\/business\/2020\/01\/23\/tampa-bay-times-hit-by-ransomware-attack\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">which <\/a><em><a href=\"https:\/\/www.tampabay.com\/news\/business\/2020\/01\/23\/tampa-bay-times-hit-by-ransomware-attack\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">The Tampa Bay Times<\/a><\/em><a href=\"https:\/\/www.tampabay.com\/news\/business\/2020\/01\/23\/tampa-bay-times-hit-by-ransomware-attack\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\"> reported on itself<\/a>, did not result in any breached data. Sensitive customer information, such as subscriber addresses and credit card details, was not disclosed in the breach, the newspaper said. <\/p>\n<p><em>The Tampa Bay Times<\/em> chief digital officer Conan Gallaty said the paper had \u201ca lot of plans for systems that go down,\u201d and that its priority was in restoring and securing operations. <\/p>\n<p>\u201cThe focus for us is to fully recover and then work on further preventative measures,\u201d Gallaty said. <\/p>\n<p>The newspaper did not respond to the threat actors, and Gallaty said the paper would have refused any ransom payment demanded. This stalwart opposition is becoming less common today, as increasingly companies are forced to choose between the loss of several hundred thousand dollars in ransom payments, or several hundred thousand dollars in database and operations recovery.<\/p>\n<p>Further, when some companies hire the help of outside malware recovery firms, they may be signing up, quietly, for ransomware negotiations. A ProPublica investigation last year found that at least two cybersecurity firms that touted allegedly advanced technology solutions would, in fact, <a href=\"https:\/\/features.propublica.org\/ransomware\/ransomware-attack-data-recovery-firms-paying-hackers\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">pay off the ransoms demanded by the threat actors who breached their clients<\/a>. <\/p>\n<p>The investigation of two firms found that:<\/p>\n<p>\u201cThe [cybersecurity] firms are alike in other ways. Both charge victims substantial fees on top of the ransom amounts. They also offer other services, such as sealing breaches to protect against future attacks. Both firms have used aliases for their workers, rather than real names, in communicating with victims.\u201d<\/p>\n<p>Though <em>The Tampa Bay Times<\/em> did not disclose the Ryuk ransomware attack vector, Gallaty said he believed the paper was unlikely to be a specific target for the threat actors. That\u2019s hard to reconcile with Ryuk\u2019s history\u2014already it has been responsible for <a href=\"https:\/\/www.latimes.com\/local\/lanow\/la-me-ln-times-delivery-disruption-20181229-story.html\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">crippling the delivery operations for at least four major US newspapers<\/a>, including <em>The Chicago Tribune<\/em> and <em>The Los Angeles Times<\/em>. <\/p>\n<p>In speaking with <em>The Tampa Bay Times<\/em>, Malwarebytes senior security researcher JP Taggart explained the calculus behind potential Ryuk ransomware targets: <\/p>\n<blockquote class=\"wp-block-quote\">\n<p>\u201cThey\u2019re looking at the people that have the most to lose.\u201d<\/p>\n<\/blockquote>\n<p>That bears true when looking at recent Ryuk victims. <\/p>\n<p>In June 2019, the government of Lake City, Florida, crawled to a halt, with phones and computer systems stalled after threat actors successfully implanted a Ryuk variant into the city\u2019s network. Unable to work themselves out of the problem, even with the help of the FBI, the city had to make a choice. <a href=\"\/\/\/Users\/druiz\/Desktop\/DCH%20Health%20System%20partially%20shut%20down%20three%20of%20its%20hospitals%20after%20being%20hit%20with%20the%20same%20ransomware\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">It chose to pay $460,000<\/a>. A similar situation happened months later, in October, when the Alabama-based DCH Health System was forced to partially shut down three of its hospitals after a Ryuk attack. Again, unable to solve the problem, and unable to continue to turn away all but the most critical patients, the hospital operator decided to prioritize patient care, paying an undisclosed amount to the threat actors. <\/p>\n<p>Those payments add up. According to CrowdStrike, Ryuk\u2019s deployment teams have <a href=\"https:\/\/www.crowdstrike.com\/blog\/big-game-hunting-with-ryuk-another-lucrative-targeted-ransomware\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">amassed more than $3.7 million in paid ransoms<\/a>. <\/p>\n<p>When Ryuk\u2019s threat actors haven\u2019t successfully scored a big pay day, though, they\u2019ve still managed to do enormous damage. In April 2019, Imperial County, California, refused to pay an enormous $1.3 million ransom from a Ryuk attack, but, <em><a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.wsj.com\/articles\/u-s-cities-strain-to-fight-hackers-11559899800\" target=\"_blank\">according to The Wall Street Journal<\/a><\/em><a rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\" href=\"https:\/\/www.wsj.com\/articles\/u-s-cities-strain-to-fight-hackers-11559899800\" target=\"_blank\">, the city has spent $1.6 million in recovery efforts<\/a>. In late December, the US Coast Guard publicly announced that it <a href=\"https:\/\/www.zdnet.com\/article\/us-coast-guard-discloses-ryuk-ransomware-infection-at-maritime-facility\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">suffered a Ryuk attack that shut down a maritime facility for 30 hours<\/a>. <\/p>\n<p>The ransomware campaigns became so common that the FBI <a href=\"https:\/\/content.govdelivery.com\/attachments\/USDHSFACIR\/2019\/05\/08\/file_attachments\/1207473\/FLASH-MC-000103-MW-Ryuk.pdf\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">warned the public<\/a> that threat actors had used Ryuk to target more than 100 US and international businesses since its emergence in August 2018. <\/p>\n<p>According to new Malwarebytes data, those attacks have continued. From January 1\u201323, 2020, Malwarebytes recorded a cumulative 724 Ryuk detections. The daily detections fluctuated, with the lowest detection count at 18 on January 6, and the highest detection count at 47 on January 14. <\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-attachment-id=\"42230\" data-permalink=\"https:\/\/blog.malwarebytes.com\/ransomware\/2020\/01\/tampa-bay-times-hit-with-ryuk-ransomware-attack\/attachment\/ryukjan1-23\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/RyukJan1-23.png\" data-orig-size=\"1509,105\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"RyukJan1-23\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/RyukJan1-23-300x21.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/RyukJan1-23-600x42.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/RyukJan1-23-600x42.png\" alt=\"\" class=\"wp-image-42230\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/RyukJan1-23-600x42.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/RyukJan1-23-300x21.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/RyukJan1-23.png 1509w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><figcaption>Ryuk detections reported by Malwarebytes from January 1\u201323, 2020<\/figcaption><\/figure>\n<p>The ransomware frequently works in conjunction with Emotet and TrickBot in multi-stage attacks. Those separate malware families have also been active in the new year, with small spikes into the thousands of detections. Emotet, particularly, <a href=\"https:\/\/twitter.com\/MBThreatIntel\/status\/1216896800960827392\">kicked itself into high gear again starting on January 13<\/a>. <\/p>\n<figure class=\"wp-block-image\"><img decoding=\"async\" data-attachment-id=\"42231\" data-permalink=\"https:\/\/blog.malwarebytes.com\/ransomware\/2020\/01\/tampa-bay-times-hit-with-ryuk-ransomware-attack\/attachment\/emotet-trickbot-ryuk-jan1-23\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Emotet-Trickbot-Ryuk-Jan1-23.png\" data-orig-size=\"1360,798\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Emotet Trickbot Ryuk Jan1-23\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Emotet-Trickbot-Ryuk-Jan1-23-300x176.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Emotet-Trickbot-Ryuk-Jan1-23-600x352.png\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Emotet-Trickbot-Ryuk-Jan1-23-600x352.png\" alt=\"\" class=\"wp-image-42231\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Emotet-Trickbot-Ryuk-Jan1-23-600x352.png 600w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Emotet-Trickbot-Ryuk-Jan1-23-300x176.png 300w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2020\/01\/Emotet-Trickbot-Ryuk-Jan1-23.png 1360w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><figcaption>Recent daily detection activity for Emotet, Trickbot, and Ryuk, reported by Malwarebytes<\/figcaption><\/figure>\n<p>As we explained before in our <a href=\"https:\/\/blog.malwarebytes.com\/threat-spotlight\/2019\/12\/threat-spotlight-the-curious-case-of-ryuk-ransomware\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\" (opens in a new tab)\">threat spotlight on Ryuk<\/a>:<\/p>\n<p>\u201cThe first stage of the attack starts with a weaponized Microsoft Office document file\u2014meaning, it contains malicious macro code\u2014attached to a&nbsp;<a href=\"https:\/\/blog.malwarebytes.com\/101\/2017\/06\/somethings-phishy-how-to-detect-phishing-attempts\/\" target=\"_blank\" rel=\"noreferrer noopener\">phishing email<\/a>. Once the user opens it, the malicious macro will run&nbsp;<code>cmd<\/code>&nbsp;and execute a PowerShell command. This command attempts to download&nbsp;<a href=\"https:\/\/blog.malwarebytes.com\/botnets\/2019\/09\/emotet-is-back-botnet-springs-back-to-life-with-new-spam-campaign\/\" target=\"_blank\" rel=\"noreferrer noopener\">Emotet<\/a>.<\/p>\n<p>Once Emotet executes, it retrieves and executes another malicious payload\u2014usually&nbsp;<a href=\"https:\/\/blog.malwarebytes.com\/101\/2018\/11\/trickbot-takes-top-business-threat\/\" target=\"_blank\" rel=\"noreferrer noopener\">TrickBot<\/a>\u2014and collects information on affected systems. It initiates the download and execution of TrickBot by reaching out to and downloading from a pre-configured remote malicious host.<\/p>\n<p>Once infected with TrickBot, the threat actors then check if the system is part of a sector they are targeting. If so, they download an additional payload and use the admin credentials stolen using TrickBot to perform lateral movement to reach the assets they wish to infect.<\/p>\n<p>The threat actors then check for and establish a connection with the target\u2019s live servers via a&nbsp;<a href=\"https:\/\/blog.malwarebytes.com\/glossary\/remote-desktop-protocol-rdp\/\">remote desktop protocol (RDP)<\/a>. From there, they drop Ryuk.\u201d<\/p>\n<p><em>The Tampa Bay Times<\/em> did not specify which systems, or how many computers, were disrupted in Thursday\u2019s attack. Instead, the only hint of inconvenience in the newspaper\u2019s routine was the acknowledgement that Friday\u2019s newspaper would be published with an earlier deadline. <\/p>\n<p>The show must go on. <\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/ransomware\/2020\/01\/tampa-bay-times-hit-with-ryuk-ransomware-attack\/\">Tampa Bay Times hit with Ryuk ransomware attack<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/ransomware\/2020\/01\/tampa-bay-times-hit-with-ryuk-ransomware-attack\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: David Ruiz| Date: Fri, 24 Jan 2020 20:11:10 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/ransomware\/2020\/01\/tampa-bay-times-hit-with-ryuk-ransomware-attack\/' title='Tampa Bay Times hit with Ryuk ransomware attack'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2019\/12\/ryuk-on-red2.jpg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Florida newspaper The Tampa Bay Times suffered a Ryuk ransomware attack Thursday, making it the latest major victim of the notorious ransomware family that continues to rise in popularity.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/ransomware\/\" rel=\"category tag\">Ransomware<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/chicago-tribune\/\" rel=\"tag\">Chicago Tribune<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/crowdstrike\/\" rel=\"tag\">CrowdStrike<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/dch-health-system\/\" rel=\"tag\">DCH Health System<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/emotet\/\" rel=\"tag\">emotet<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/imperial-county\/\" rel=\"tag\">Imperial County<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/imperial-county-california\/\" rel=\"tag\">Imperial County California<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/lake-city\/\" rel=\"tag\">Lake City<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/lake-city-florida\/\" rel=\"tag\">Lake City Florida<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/los-angeles-times\/\" rel=\"tag\">Los Angeles Times<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/propublica\/\" rel=\"tag\">ProPublica<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ransom\/\" rel=\"tag\">ransom<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ransom-ryuk\/\" rel=\"tag\">Ransom.Ryuk<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ransomware\/\" rel=\"tag\">ransomware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ryuk\/\" rel=\"tag\">ryuk<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/ryuk-ransomware\/\" rel=\"tag\">Ryuk ransomware<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/tampa-bay-times\/\" rel=\"tag\">Tampa Bay Times<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/tribune-publishing\/\" rel=\"tag\">tribune publishing<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/trickbot\/\" rel=\"tag\">trickbot<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/trojan-trickbot\/\" rel=\"tag\">Trojan.TrickBot<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/us-coast-guard\/\" rel=\"tag\">US Coast Guard<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/ransomware\/2020\/01\/tampa-bay-times-hit-with-ryuk-ransomware-attack\/' title='Tampa Bay Times hit with Ryuk ransomware attack'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/ransomware\/2020\/01\/tampa-bay-times-hit-with-ryuk-ransomware-attack\/\">Tampa Bay Times hit with Ryuk ransomware attack<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[24030,10679,24031,15715,24032,24033,24034,24035,10688,14289,18276,23726,3765,19317,20562,24036,20622,13256,20126,23839],"class_list":["post-17542","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-chicago-tribune","tag-crowdstrike","tag-dch-health-system","tag-emotet","tag-imperial-county","tag-imperial-county-california","tag-lake-city","tag-lake-city-florida","tag-los-angeles-times","tag-propublica","tag-ransom","tag-ransom-ryuk","tag-ransomware","tag-ryuk","tag-ryuk-ransomware","tag-tampa-bay-times","tag-tribune-publishing","tag-trickbot","tag-trojan-trickbot","tag-us-coast-guard"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17542","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=17542"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/17542\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=17542"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=17542"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=17542"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}