paint-brush
Ryuk Ransomware: What it is and How it's Harming the Healthcare Sector by@shivramnayak
130 reads

Ryuk Ransomware: What it is and How it's Harming the Healthcare Sector

by Shivram NayakDecember 1st, 2020
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

Organizations in the healthcare sector have been valiantly fighting to save lives since the COVID-19 pandemic began, but they’ve also had to shift focus to another type of viral attack. Since March, healthcare organizations in the U.S. have been hit with multiple cyberattacks from threat actors who want to take advantage of any vulnerability in their systems. The latest to join the ranks of healthcare network threats is Ryuk, a ransomware that has victimized several medical organizations since September.

Company Mentioned

Mention Thumbnail

Coin Mentioned

Mention Thumbnail
featured image - Ryuk Ransomware: What it is and How it's Harming the Healthcare Sector
Shivram Nayak HackerNoon profile picture

Organizations in the healthcare sector have been valiantly fighting to save lives since the COVID-19 pandemic began, but they’ve also had to shift focus to another type of viral attack. Since March, healthcare organizations in the U.S. have been hit with multiple cyberattacks from threat actors who want to take advantage of any vulnerability in their systems. The latest to join the ranks of healthcare network threats is Ryuk, a ransomware that has victimized several medical organizations since September.

What Is Ryuk Ransomware?

Like most ransomware attacks, Ryuk infiltrates networks and encrypts critical files while the cybercriminals behind the deployment demand ransom from the host in exchange for a decryption key. Ryuk was first discovered in 2018, and since then it has been successfully demanding ransoms to the tune of millions from private enterprises, hospitals, and local governments. It is largely believed that Ryuk is based on an older ransomware program called Hermes and is operated by a Russian-speaking cybercriminal group.

How Does Ryuk Attack Hospitals?

Multiple threat detection agencies have found that Ryuk, like most other malware and ransomware, uses phishing emails to gain entry into the network. The emails are spoofed to make the user believe it’s from a trusted source. Opening the email attachment introduces either a Trickbot or a trojan into the host system. From there, the virus then collects admin credentials, allowing attackers to move laterally in the network to find critical assets. Once the attackers have access to high-value assets within the network, Ryuk is executed to encrypt these assets and demand a ransom payment in Bitcoin.

Cyberattacks Targeting U.S. Healthcare Are on the Rise

On October 28, 2020, officials from the U.S. Department of Health and Human Services, U.S. Department of Homeland Security, and the Federal Bureau of Investigation held a conference call with healthcare industry executives warning about an “imminent cybercrime threat to U.S. hospitals and healthcare providers.” While Ryuk is the latest and probably the most dangerous ransomware threat to the healthcare industry, it is only one of several malware attacks that have been plaguing the sector since the beginning of 2020.

In March, ransomware groups Maze and REvil targeted healthcare organizations during the early days of COVID-19.2 University of California San Francisco School of Medicine officials paid a $1.14 million ransom demand to unlock encrypted files in June. In July, biotech firm Moderna, a frontrunner in producing a COVID-19 vaccine, was targeted by cyber espionage hackers with ties to the Chinese government. And in September, Universal Health Services, one of the primary U.S. healthcare chains, experienced a major cyberattack, resulting in failure of interconnected computer systems in over 400 locations. Media later reported that this cyberattack was attributed to Ryuk. (View a  of cyberattacks on U.S. healthcare.) 

The Top 4 Ways Hospitals Can Prevent Ryuk Ransomware Attacks

As cyberattacks on hospitals and healthcare organizations increase during the COVID-19 pandemic, there is a real urgency to take proactive security measures to prevent business disruptions that can put patients’ lives in danger.

Hospitals can take these four steps to protect against Ryuk ransomware and to prevent malware from spreading if they do fall victim:

1. Cyber Hygiene Education

Cybercriminals are very aware that people are the weakest link in the security chain, which is why phishing emails are a preferred mode of entry into an otherwise secured system. Education is the first and most basic step every healthcare organization should undertake. By teaching medical employees to identify suspicious emails and telling them not to click on unknown links or open unsolicited attachments, organizations can prevent being hacked.

2. Endpoint Protection

While basic antivirus is a bare-minimum security measure that needs to be in place, it cannot prevent sophisticated malware from exploiting system vulnerabilities. Instead, it is essential to lock down endpoints by leveraging whitelisting, blacklisting, and configurable security rules. This ensures that only the known good — files and applications that are deemed safe — are allowed to execute. All other applications that are unknown or suspicious are prevented from executing, including malware, ransomware, and zero-day attacks.

3. Micro-Segmentation

Exploits like Ryuk are financially motivated. The cybercriminals trigger the ransomware attacks only if they are able to access and encrypt critical and high-value healthcare assets — like PHI, or protected health information federally protected under the HIPAA Privacy Rule. To do this, they move laterally within the network, probing for open ports and firewall vulnerabilities. With micro-segmentation, healthcare organizations can segment and isolate critical applications and assets. Once the segments have been defined, granular access controls can be implemented to allow authorized users access to only their assigned applications. Micro-segmentation prevents both lateral movement and unauthorized access from compromised systems.

4. Zero Trust Security

Zero trust security is a cybersecurity approach that works on the principle of least privilege. Any user, device, or application is granted access only after it has been verified based on preset trust parameters. If the requestor cannot be verified on even one parameter, access is denied, and the request is deemed suspicious or unauthorized. By including zero trust principles in their security strategy, healthcare organizations can ensure that cybercriminals who gain entry via phishing or other means are detected early, and are restricted from moving laterally to gain access to critical infrastructure.

As the world fights against an unprecedented health crisis, the healthcare sector is playing the biggest role on the front lines of the pandemic. Bad actors are showing that they are ruthless enough to take advantage of vulnerable medical facilities. But if healthcare organizations invest in proactive security solutions that are easy to deploy and implement, they can continue to focus on what they do best: save lives.

Also published at

바카라사이트 바카라사이트 온라인바카라