RateLimited°C
09-21-2024
BSV
$48.61
Vol 16.63m
-1.13%
BTC
$63037
Vol 26738.78m
-0.71%
BCH
$335.77
Vol 212.2m
-1.82%
LTC
$65.81
Vol 297.69m
-0.47%
DOGE
$0.1
Vol 557.51m
-1.04%

The Ryuk cryptocurrency-targeting malware is still running rampant, despite efforts to bring it under control. The malware was found in more than 100 government and private-industry computer systems around the world over the past year, according to a report by the U.S. FBI, and has now set its sights on tech equipment in China.

Ryuk is a version of the Hermes virus, which was first found in August 2018. Both malware applications operate by using spam and botnets to infiltrate computer systems and then spread by attacking IP ports that are left unprotected. It was reportedly involved in a ransom scheme at Tribune Publishing this past January, as well as another attack on the city of Lake City, Florida, last month. The city was targeted only two weeks after another Florida city, Riviera Beach, paid a $600,000 ransom to regain access to its computer systems.

According to a report by Tencent Security, Ryuk is now in China. It is used to blackmail computer owners and a recent attack held a computer system hostage for 11 SegWitcoin (BTC), worth around $117,345 at today’s prices.

Tencent warns, “With the continuous expansion of the virus’s intrusion map, Tencent Security Threat Intelligence Center recently detected that the virus has been partially detected in China. Because the virus uses RSA+AES to encrypt user files and users cannot decrypt them temporarily, it reminds all government and enterprises to be vigilant. The ransomware can be intercepted by Tencent Computer Manager and Tencent Royal Terminal Security Management System.”

To help prevent future attacks, Tencent recommends companies close certain ports, such as 135, 139, 445 and others that are typically not used. They should also whitelist other ports that are required and only allow IP connections through those whitelisted ports.

These measures, as well as other security measures, will help contain the distribution of the virus, but won’t stop it completely. According to the FBI, Ryuk is coded in such a way that it can be easily modified to continue its existence. However, as a general rule of thumb, enterprise computer systems need to be locked down as tightly as possible and individual computer users need to avoid opening any email attachment or link unless they can completely verify the source.

Recommended for you

Blockchain enables autonomous AI agents to learn
Utilizing blockchain tech, a group of Belgian scientists enabled autonomous AI agents to learn and communicate securely, contributing to the...
September 17, 2024
WhatsOnChain gets own UTXO endpoints for BSV blockchain services
With ElectrumX set to retire in October, WhatsOnChain is gearing up to implement a new UTXO set of API endpoints,...
September 16, 2024
Advertisement