Rewterz Threat Advisory – Multiple Cisco Identity Services Engine Cross-Site Scripting Vulnerabilities
July 8, 2021Rewterz Threat Advisory – CVE-2021-26115 – FortiWAN OS command injection leads to Privilege Escalation
July 8, 2021Rewterz Threat Advisory – Multiple Cisco Identity Services Engine Cross-Site Scripting Vulnerabilities
July 8, 2021Rewterz Threat Advisory – CVE-2021-26115 – FortiWAN OS command injection leads to Privilege Escalation
July 8, 2021Severity
High
Analysis Summary
Ryuk is the name of a ransomware family, first discovered in the wild in August 2018. It is one of the nastiest ransomware going around. Ryuk will lock your files or systems and holds them hostage for ransom. Ryuk is a type of ransomware used in targeted attacks, where the threat actors make sure that essential files are encrypted so they can ask for large ransom amounts. A typical Ryuk ransom demand can amount to a few hundred thousand dollars. Ryuk is one of the first ransomware families to include the ability to identify and encrypt network drives and resources, as well as delete shadow copies on the endpoint. This means the attackers can then disable Windows System Restore for users, making it impossible to recover from an attack without external backups.
Ryuk’s delivery method is spam emails. These emails are often sent from a spoofed address, so the sender’s name does not raise suspicion.
Impact
- File encryption
- Privilege Escalation
- Information Theft
- Data Exfiltration
- Network Compromise
Indicators of Compromise
MD5
- c0f972c5e033c0b4dc268a805cfa16a2
- 2cc630e080bb8de5faf9f5ae87f43f8b
- 6c0bb20e1158593211a7cbcbacb3dd83
- 89895cf4c88f13e5797aab63dddf1078
- 2a380d0c2aa2234c0a37bdaaaa9489ef
- 45295780f2ba837be42ccf50710bd2b5
- 5c6273b024c93c5bdf557813868f9337
- b1ad9afd96168db991f79eb546d6b79a
- 7364f6222ac58896e8920f32e4d30aac
- 5c6273b024c93c5bdf557813868f9337
- 31db87c5d3b970b42cb577611f851c7a
- 2cc630e080bb8de5faf9f5ae87f43f8b
- 6c0bb20e1158593211a7cbcbacb3dd83
- 89895cf4c88f13e5797aab63dddf1078
- 89895cf4c88f13e5797aab63dddf1078
- 6c0bb20e1158593211a7cbcbacb3dd83
- 5c6273b024c93c5bdf557813868f9337
- 31db87c5d3b970b42cb577611f851c7a
- 2cc630e080bb8de5faf9f5ae87f43f8b
- a5e03a5150537126dffcf2391dfab934
- a5e03a5150537126dffcf2391dfab934
SHA-256
- d8a0d25776c28e17e724da2b1c8fdae28d7c6b32cfa9d3d2a20f3f57ff370488
- d6b7b27e13700aaa7f108bf9e76473717a7a1665198e9aafcc2d2227ca11bba9
- b42d07f0b72879bf21e99f39a21edae1a38c3fd62393bd4e88f1032f561855f9
- 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a
- 63b44f7fe68cb8a05fa98c5acc59851d4b73f5bbd76e9910c94042c523da8d5b
- 60c16e45c5cbe88a38911f1e3176d90444e4884261d8481d4d719acec1bc5025
- 473bcbcba12296b08b765b4f7c2beea5f56f263d5e6c0d15c1006af28f6172e8
- 307a8158e698680c7186e3c1481b29186d8b265bb83662397a54f235b0c9a3d1
- 23e95ba67603234352ff2864dc7fa54742f501e5922f01f8c182dbefc116f97f
- 473bcbcba12296b08b765b4f7c2beea5f56f263d5e6c0d15c1006af28f6172e8
- 703ee3222eccd0e355b9ef414be9153fa3a2ad8efb8176fee887d7744a9f632f
- d6b7b27e13700aaa7f108bf9e76473717a7a1665198e9aafcc2d2227ca11bba9
- b42d07f0b72879bf21e99f39a21edae1a38c3fd62393bd4e88f1032f561855f9
- 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a
- 8f368b029a3a5517cb133529274834585d087a2d3a5875d03ea38e5774019c8a
- b42d07f0b72879bf21e99f39a21edae1a38c3fd62393bd4e88f1032f561855f9
- 473bcbcba12296b08b765b4f7c2beea5f56f263d5e6c0d15c1006af28f6172e8
- 703ee3222eccd0e355b9ef414be9153fa3a2ad8efb8176fee887d7744a9f632f
- d6b7b27e13700aaa7f108bf9e76473717a7a1665198e9aafcc2d2227ca11bba9
- 09a0e87008e34a7a434c5d853600f693ab9de181e1f863ef6a90edf8c3fccd54
SHA1
- a3f38579feb14d3b20289e453b41d88232145f68
- 5a385b8b4b88b6eb93b771b7fbbe190789ef396a
- 3a74a3aafde31b4f129e515baabe9833bf359f8e
- 1efc175983a17bd6c562fe7b054045d6dcb341e5
- 521af7bca33cbbc51892191df09e8fb2fd92c872
- CONFIDENTIAL 4
- f937b1b7b3593a38702f870077658a891974edda
- eafe0287e6ae983c6f1ff68f6c7780cc3a037783
- 9fbfbe72774b9cc3d174daa7b8be76bf8cb57ecf
- 915fd6fb4e20909025f876f3bb453ec52e21b7be
- eafe0287e6ae983c6f1ff68f6c7780cc3a037783
- 8cc6a1f94514033ad8b15c3c4c720fb0eac249f1
- 5a385b8b4b88b6eb93b771b7fbbe190789ef396a
- 3a74a3aafde31b4f129e515baabe9833bf359f8e
- 1efc175983a17bd6c562fe7b054045d6dcb341e5
- 1efc175983a17bd6c562fe7b054045d6dcb341e5
- 3a74a3aafde31b4f129e515baabe9833bf359f8e
- eafe0287e6ae983c6f1ff68f6c7780cc3a037783
- 8cc6a1f94514033ad8b15c3c4c720fb0eac249f1
- 5a385b8b4b88b6eb93b771b7fbbe190789ef396a
- 9a2155e3b5471ca8321e8c74edb277c9a8e756e0
Remediation
- Block all threat indicators at their respective controls.
- Search for IOCs in your environment.