On the rebound of increased ransomware activities, Ryuk ransomware holds the top spot having victimized internationally renowned companies. Over the last several weeks, researchers are reporting a number of successful ransomware attacks that hit entire networks. The world’s largest office furniture company Steelcase was forced to shut down their systems after the attack, but they report to their shareholders about no known data loss caused by the attack. Ryuk ransomware put out of action the facilities operations within the Universal Health Services and made the infected hospitals shut down their systems and redirect their patients to other healthcare facilities, which shows that healthcare still attracts Ryuk operators after their violent activity at the beginning of the pandemic. Also, an IT services company Sopra Steria informed about the detected attack. According to FBI information, the hackers’ gainings from Ryuk ransomware attacks have exceeded $61M.
It became known this week that Ryuk affiliates are preparing a massive campaign targeting the US Healthcare sector. Federal agencies released a Security Alert, which warns of the campaign, reveals tactics used by cybercriminals and some indicators of compromise. More than 400 healthcare facilities could be targeted, and according to unverified information, adversaries have already infected 30 of them.
Cybercriminals plan to cause panic and force a large number of organizations to pay a ransom to decrypt the data. It is also worth noting that Ryuk affiliates often steal sensitive data before encrypting files to have additional leverage on victims. Now the situation is also aggravated by the upcoming elections.
For their recent attacks, fraudsters behind Ryuk attacks adopted the flaw of Zerologon and capabilities of malware frameworks to gain privilege escalation. The exploitation of the vulnerability allowed cybercriminals to hijack domain controllers within hours after a single system in the organization’s network was infected via a phishing email with the BazarLoader and encrypt data both on servers, including backup servers, and on workstations. You can learn more about this vulnerability and the content available at Threat Detection Marketplace to detect its exploitation here.
The new Ryuk strains leverage different techniques to escape detection, then call a function that makes changes to execution permissions. Compared to the earlier ransomware strains, the recent Ryuk attacks show significantly reduced time to encryption, thus considerably decreasing chances for targeted companies to timely detect the attack.
In almost every case, attacks proceed differently and for each attack, attackers create a unique ransomware sample, so IOCs-based content is unlikely to help detect and stop an attack in time. Our team and Threat Bounty program participants publish threat hunting rules to help identify techniques and procedures leveraged by BazarLoader and Ryuk ransomware.
SINGLEMALT / KEGTAP / Ryuk Techniques and Procedures rule by Roman Ranskyi: https://tdm.socprime.com/tdm/info/lf753JGo35D4/4Y32c3UBmo5uvpkjQZWE/
Osman Demir, active Threat Bounty developer of actionable detection content for Threat Detection Marketplace, published a Sigma rule that enables detection of the ransomware strain used in the recent attacks – Ryuk Encryption and Evasion Techniques
We also recommend that you pay attention to the following rules available at the Threat Detection Marketplace:
Persistence Of Ryuk Ransomware rule by Emir Erdogan: https://tdm.socprime.com/tdm/info/eWyQLgWZwv3v/EGzmQHUBmo5uvpkju9HX/
Team9/Bazar batch filename pattern (via cmdline) rule by SOC Prime Team: https://tdm.socprime.com/tdm/info/51onXdAhOkLs/sE9tvHIBSh4W_EKGAAjz/
Team9/Bazar scheduled task name (via audit) rule by SOC Prime Team: https://tdm.socprime.com/tdm/info/efOdljfHf6Qk/3KjlQHUBTwmKwLA94W5a/
Bazar Loader Detection (Sysmon detection) rule by Ariel Millahuel: https://tdm.socprime.com/tdm/info/QDvyH85txiBA/w6jmQHUBTwmKwLA9cm-b/
Ryuk detection is available for Chronicle Security and Apache Kafka ksqlDB. The rules have translations for the following platforms:
SIEM: Azure Sentinel, ArcSight, QRadar, Splunk, Graylog, Sumo Logic, ELK Stack, RSA NetWitness, LogPoint, Humio
EDR: Microsoft Defender ATP, Carbon Black, Elastic Endpoint
Tactics: Impact, Execution, Defense Evasion, Persistence, Discovery, Privilege Escalation, Lateral Movement, Command And Control
Techniques: Data Encrypted for Impact (T1486), User Execution (1204), BITS Jobs (T1197), Domain Trust Discovery (T1482), Remote File Copy (T1544), Remote Services (T1021), Signed Binary Proxy Execution (T1218), Windows Management Instrumentation (T1047), Modify Registry (T1112), Process Injection (T1055), Query Registry (T1012), Registry Run Keys / Startup Folder (T1060), Scripting (T1064)
WMIC LOLBAS Usage:
Execution from non-execution folder: