Ryuk Ransomware Hits Georgia's Court Systems
CYBER NEWS

Ryuk Ransomware Hits Georgia’s Court Systems

1 Star2 Stars3 Stars4 Stars5 Stars (1 votes, average: 5.00 out of 5)
Loading...

Ryuk ransomware has attacked Georgia’s court system. This appears to be the fourth attack against government institutions in the past couple of months. Officials confirmed that at least some parts of the court system’s network were taken offline due to the ransomware.




According to CNN, after receiving a ransom note, Georgia officials decided to take a system offline just in case, to be safe. Bruce Shaw, an official with the state court system, said:

Our systems have been compromised, so we have quarantined our servers and shut off our network to the outside. We haven’t figured that out yet, we would love to. It could be a matter of opportunity, I think.

The good news is that private information hasn’t been compromised in the attack because officials were quick to react after reading the ransom note. This is because taking a system offline makes time to get rid of the malware and secure it against future endeavors.

Related: Ryuk Ransomware Updated with IP Address Blacklisting

Ryuk Ransomware Most Likely Behind the Attack against Georgia’s Court System

The details surrounding the attack are scarce but it appears that it involved Ryuk ransomware.

The ransomware has a new version released in June which has IP blacklisting capabilities and is designed to check the output of the “arp –a” parameter for specific IP address strings. In case these strings are found, the ransomware will not encrypt the files on that computer. Here are some of the partial IP address strings in question: 10.30.4, 10.30.5, 10.30.6, or 10.31.32.

Another update of Ryuk includes the ransomware comparing the computer name to the strings “SPB”, “Spb”, “spb”, “MSK”, “Msk”, and “msk”, and if those are found, the computer won’t be encrypted.

It is most likely that all this is done so that the ransomware operators don’t target computers in Russia for encryption.

Besides these changes, the ransomware proceeds with its usual encryption process. As we wrote back in December, 2018, when it was first released, Ryuk Ransomware will encrypt the victim’s data and demand a ransom to get it restored.

Files will receive the .RYK extension as a secondary one, without any changes made to the original name of an encrypted file. The ransomware will also leave instructions inside a text file.

Avatar

Milena Dimitrova

An inspired writer and content manager who has been with SensorsTechForum for 4 years. Enjoys ‘Mr. Robot’ and fears ‘1984’. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

More Posts

Follow Me:
Twitter

Leave a Comment

Your email address will not be published. Required fields are marked *

Time limit is exhausted. Please reload CAPTCHA.

Share on Facebook Share
Loading...
Share on Twitter Tweet
Loading...
Share on Google Plus Share
Loading...
Share on Linkedin Share
Loading...
Share on Digg Share
Share on Reddit Share
Loading...
Share on Stumbleupon Share
Loading...