Larue jumped in his car and 20 minutes later entered the data center at the company’s Evanston, Illinois, campus, which is also home to its headquarters and generator manufacturing facility. In an attempt to prevent more damaging attacks, the three-person IT team even shut down the power to the network, but it was too late. “By that time, the attacker had done so much damage to our network that we were no longer able to prevent the malware from spreading and encrypting files on every workstation and server that only he had access to,” Larue said.
the team to believe that it was none other than Ryuk, which is a type of highly dangerous ransomware that locks files on infected devices. Ryuk is a new generation of malware that is used for custom and targeted attacks on large and potentially highly profitable targets. Its encryption algorithm scheme targets india whatsapp data resources and assets on the victim’s network; notably, the hackers use manual control to achieve maximum effect in a targeted attack. They may monitor the network for a period of time to see if a particular infected machine or network is of interest.
Larue believes that the malicious URL in the phishing email that led to the Trickbot infection was the first phase of a targeted attack on CE Niehoff, which involved information gathering and credential theft. As the investigation showed, other victims of the attacks were infected using the Emotet bot, while Trickbot performed reconnaissance and assessment of the data stored on the victim’s device (rather than simply copying it). Then, if they complied with the criminals’ requests, Ryuk would kick in and lock down the victims’ machines. “Trickbot was working behind the scenes, installing and configuring the command and control point, but we didn’t realize that right away. The hackers would extract the credentials, configure the C2, and only then would they activate Ryuk,” Larue explained.
The behavior of the malware led
-
- Posts: 537
- Joined: Mon Dec 23, 2024 3:13 am