- Aug 17, 2014
- 11,198
Recent attacks from Ryuk ransomware operators show that the actors have a new preference when it comes to gaining initial access to the victim network.
The trend observed in attacks this year reveals a predilection towards targeting hosts with remote desktop connections exposed on the public internet.
Furthermore, using targeted phishing emails to deliver the malware continues to be a favored initial infection vector for the threat actor.
Security researchers from the threat intelligence boutique Advanced Intelligence (AdvIntel) observed that Ryuk ransomware attacks this year relied more often on compromising exposed RDP connections to gain an initial foothold on a target network. [...]
The researchers say that the actor engages other cybercriminals to learn about the defenses on a network they attack to find a way to disable them.
Among the newer techniques the researchers saw in Ryuk ransomware attacks was the use of KeeThief, an open-source tool for extracting credentials from KeePass password manager.
KeeThief works by extracting key material (e.g. master password, key file) from the memory of a running KeePass process with an unlocked database.
Vitali Kremez, the CEO of AdvIntel, told BleepingComputer that the attackers used KeeThief to bypass EDR and other defenses by stealing the credentials of a local IT administrator with access to EDR software.
Ryuk ransomware operation updates hacking techniques
Recent attacks from Ryuk ransomware operators show that the actors have a new preference when it comes to gaining initial access to the victim network.
www.bleepingcomputer.com