Press "Enter" to skip to content

Ryuk Ransomware Collects $3.7 Million In 5 Months

The Ryuk ransomware has not just causing anguish for newspapers. It is also quite beneficial for its operators. Scientists at FireEye and CrowdStrike both predicted that the code has created the equivalent of $3.7 Million since August in bitcoin, spread all over 52 transactions. The key is the eagerness to be calm and aim on big targets.

The assaults typically begin by infecting devices with TrickBot malware (normally via techniques such as spam email) that attains access and, notably, allows the intruders survey their targets to decide the money-making capability.

They look for the most important systems and, as media claimed, will even pass on issuing the Ryuk ransomware if the agency is not huge enough. This scouting will be fairly familiar if you have witnessed campaigns such as SamSam (the ransomware that hit the Atlanta city), and it is just as disturbing.

On a related note, over 13 families of ransomware and 2.3 Million viruses were identified earlier on Windows. This data was received to the media from a new report. As per Quick Heal Technologies, detections of malware witnessed a fall of 23% but carried on to come out more than 1,700 times each minute.

“Even though detections of malware on Android and Windows witnessed a fall compared to last quarter, attacks from ransomware have grown. This inclination proves that cyber attackers are operating on attacks that need fewer resources but at the same time provides high returns,” claimed Chief Technology Officer of Quick Heal, Sanjay Katkar, to the media in an interview.

The report forecasted that there was an elevated probability of huge attacks such as WannaCry owing to each businesses and users failing to keep their networks up-to-date and patched. In addition to this, attacks of ransomware may elevate on healthcare organizations. And destructive, newer, and more improved versions of the Petya and WannaCry are anticipated to surface.

Be First to Comment

Leave a Reply

Your email address will not be published. Required fields are marked *