Security News > 2020 > October > Ryuk Ransomware Gang Uses Zerologon Bug for Lightning-Fast Attack
The analysis of the attack revealed that after about four hours and 10 minutes, the Ryuk gang pivoted from the primary domain controller, using RDP to connect to backup servers.
For the final phase of the attack, the Ryuk operators first deployed their ransomware executable onto backup servers.
Ryuk is a highly active malware, responsible for a string of recent hits, including a high-profile attack that shut down Universal Health Services, a Fortune-500 owner of a nationwide network of hospitals.
"The threat actors finished their objective by executing the ransomware on the primary domain controller, and at the five-hour mark, the attack completed," researchers said.
The use of Zerologon made the cybrcriminals' efforts much easier, since the attack didn't need to be aimed at a high-privileged user who would likely have more security controls.
News URL
https://threatpost.com/ryuk-ransomware-gang-zerologon-lightning-attack/160286/
Related news
- JetBrains TeamCity under attack by ransomware thugs after disclosure mess (source)
- Possible China link to Change Healthcare ransomware attack (source)
- Change Healthcare registers pulse after crippling ransomware attack (source)
- BianLian Threat Actors Exploiting JetBrains TeamCity Flaws in Ransomware Attacks (source)
- JetBrains is still mad at Rapid7 for the ransomware attacks on its customers (source)
- Stanford: Data of 27,000 people stolen in September ransomware attack (source)
- Nissan confirms ransomware attack exposed data of 100,000 people (source)
- TeamCity Flaw Leads to Surge in Ransomware, Cryptomining, and RAT Attacks (source)
- What the Latest Ransomware Attacks Teach About Defending Networks (source)
- Lessons from a Ransomware Attack against the British Library (source)