Showing posts with label Cyber Hackers. Show all posts
Showing posts with label Cyber Hackers. Show all posts

Tuesday 28 August 2018

RYUK Ransomware - Detailed Information and Updates

What is RYUK Ransomware?

RYUK is dangerous ransomware which takes the help of a nasty virus to infiltrates the system and encrypts most of the saved data has its root when it first appeared in South Korea, in so doing making it unusable. 



As it is similar to Hermes ransomware, there is a high possibility that these two viruses have the same creator. Unlike most other viruses, this malware does not rename or append any extension to encrypted files. 

After entering into the computer it however, create a text file ("RyukReadMe.txt"), by placing a copy of the ransom note in every existing folder.

Like most ransomware cases, a text file is delivered with a ransom note that informs the victims of the encryption and demands them to pay certain amount to get back their data. RYUK works on RSA-4096 and AES-256 encryption algorithms. 

Consequently, each individual hit by this ransomware gets numerous unique keys that are required to get back the locked data. 

To maintain their confidentially cyber hackers hide all keys on a remote server. It is a myth that once you pay the money the data restored, this is not possible without these keys, and each victim is forced to pay a ransom in exchange for their release. 

The cost of this ransomware is not definite - all information is passed on via email; however, the amount of payments varies with each victim. It is also warned that, for each day there is a delay in payment, the victim must pay an added .5 Bitcoin (currently equivalent to ~$3200).

Compared to other similar ransomware-type viruses, cost of this ransomware is high - it usually fluctuates between $500 and $1500. 

Note that RYUK is intended to aim at large businesses and infect computers in bulk at once. Although paying thousands of dollars by an everyday users might seem too much, simultaneously larger companies often agree to pay, as their encrypted data is more precious. 

Despite all threat by these criminal crooks and at any cost, it is advised not to pay. Ransomware designers ignore the victims once payments are gained by them. 

Paying the ransomware provides no positive result and users are often left cheated and scammed. Therefore, it is advised to ignore all such demands to contact developers or pay any ransom. Sadly, there are no tools which are developed until day to crack RSA/AES encryption and restoring data free of charge. 

The only solution is to rebuild everything from a backup.

Causes of RYUK ransomware virus attack

It is commonly being seen these days that RYUK ransomware is targeting Windows computer to execute its malicious activities through the Internet. 

Many users have become victim to this threat because they think of it as a legitimate program, but in reality, it is designed by cyber criminals to spoof unaware users. 

It can silently enter into your PC using its sly technique via several methods, some of the common ways of infiltrating RYUK ransomware in your computer are given below

  1. Visiting unsafe website – Many users get redirected towards some unknown site while surfing the Internet. Sometimes it is ok, but it is always not safe because these types of threats are usually hidden in that website.
  2. Via Freeware – It can make its way into your system when you download some free of cost software. It carries bundles of malicious codes and processes.
  3. Spam email attachments – It can sneak into your computer via Spam email attachments. So always beware before opening any unknown email attachments in Spam.
  4. Infected External Device – For the exchange of data, users insert the infected removal device in their PC which might contain infected files, and RYUK ransomware can easily get installed in the PC without any permission.
  5. Peer-to-Peer Sharing: If you are using a shared network to work then it is strongly suggested to be alert, as malicious file and process of RYUK ransomware can make it way into the system via peer-to-peer sharing.

Suggestions and Solution

  • If you suspect that your computer has been hijacked by such infectious emoji’s, we would like to advise you to shut it down immediately.
  • Install malware crusher and do a full system scan with your antivirus software, which should be able to remove the hijacker software.
  • After the scan is done and the malware is deleted and removed, go in for a reinstall of your browser software so to erase any changes that the hijacker has made.
  • It is advisable to go through the terms and condition before installing any new application, and if it is time-consuming, always opt for freeware option in the “custom and automatic installation,” it is always recommended that you go with this option as this would close the other unwanted programs that might get installed along with it . Here we would like to recommend the best antivirus software in India which is ITL Antivirus, to take care of all these issues and protect your computer.