Bitcoin Ransomware That Infiltrated 100 US Enterprises Spreads to China

Bounties demanded by the Ryuk hackers reach upwards of $5 million to be paid in bitcoin, according to the FBI.

AccessTimeIconJul 18, 2019 at 6:00 p.m. UTC
Updated Aug 18, 2021 at 11:35 p.m. UTC

Presented By Icon

Election 2024 coverage presented by

Stand with crypto

A ransomware virus that has successfully infiltrated more than 100 government and private enterprises in the U.S. and internationally has been detected in China, according to a recent Tencent Security report.

Dubbed Ryuk, the pernicious code targets “logistics companies, technology companies and small municipalities” with high data value, demanding bounties upward of $5 million paid in bitcoin, according to the Federal Bureau of Investigation (FBI).

  • Bitcoin Mining in the U.S. Will Become 'a Lot More Decentralized': Core Scientific CEO
    13:18
    Bitcoin Mining in the U.S. Will Become 'a Lot More Decentralized': Core Scientific CEO
  • Binance to Discontinue Its Nigerian Naira Services After Government Scrutiny
    05:10
    Binance to Discontinue Its Nigerian Naira Services After Government Scrutiny
  • The first video of the year 2024
    04:07
    The first video of the year 2024
  • The last regression video of the year 3.67.0
    40:07
    The last regression video of the year 3.67.0
  • In January, Ryuk was thought to be behind a hack of Tribune Publishing, affecting all of the media conglomerate’s outlets. In June, officials in Lake City, Florida paid out a $460,000 ransom after the city’s computer systems went dark. This was two weeks after Riviera Beach, Florida’s $600,000 hijacking.

    Ryuk is thought to be a modified version of the Hermes virus, which debuted in August 2018. It spreads through the usual botnet and spam methods, and infiltrates through undefended IP ports.

    Once installed, the malicious malware deletes all files related to the intrusion, and kills antivirus processes, thereby obscuring the infection vector. In one case, however, FBI agents found evidence Ryuk entered through a Remote Desktop Protocols brute force attack.

    The agency wrote in a Flash:

    “After the attacker has gained access to the victim network, additional network exploitation tools may be downloaded… once executed, Ryuk establishes persistence in the registry, injects into running processes, looks for network connected file systems, and begins encrypting files.”

    The virus also drops a “RyukReadMe” file that opens the blackmail letter on the victim’s internet browser. The html webpage lists only the two hacker’s email addresses in the upper left hand corner, the name of the virus in the center of the page, and the cryptic phrase “balance of shadow universe” in the bottom right corner.

    The FBI has been tracking the virus since 2018 and have noticed a number of modifications. It's reported the Chinese variant simultaneously runs a 32-bit and 64-bit blackmail module, which may enable further evolution of the bug.

    It is has not been disclosed how many Chinese enterprises have been infected as of press time, or the total amount the hackers have ransomed.

    Disclosure

    Please note that our privacy policy, terms of use, cookies, and do not sell my personal information have been updated.

    CoinDesk is an award-winning media outlet that covers the cryptocurrency industry. Its journalists abide by a strict set of editorial policies. CoinDesk has adopted a set of principles aimed at ensuring the integrity, editorial independence and freedom from bias of its publications. CoinDesk is part of the Bullish group, which owns and invests in digital asset businesses and digital assets. CoinDesk employees, including journalists, may receive Bullish group equity-based compensation. Bullish was incubated by technology investor Block.one.


    Learn more about Consensus 2024, CoinDesk's longest-running and most influential event that brings together all sides of crypto, blockchain and Web3. Head to consensus.coindesk.com to register and buy your pass now.



    Read more about