Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Severity
High
Analysis Summary
A new variant of the Ryuk Ransomware has been discovered that adds IP address and computer blacklisting so that matching computers will not be encrypted. These features include IP address and computer blacklisting to prevent certain systems from being infected. The new version was also digitally signed, possibly in an attempt to evade detection prior to installation. The IP ranges and computer names in the malware’s blacklist (i.e. a list of hosts not to infect) are listed below. The article indicated this blacklist may have been added to prevent infecting Russian systems during worming attacks. If the victim’s system does not fall into one of the blacklist categories, the files are encrypted as usual and a .RYK extension is appended to the file name. RyukReadMe.html is created as the ransom note and contains the phrase “balance of shadow universe” and an email address to contact for payment instructions.
Impact
Indicators of Compromise
IP(s) / Hostname(s)
Email Address
Malware Hash (MD5/SHA1/SH256)
Remediation