test_scratch / cti-ATT-CK-v13.1 /ics-attack /malware /malware--a020a61c-423f-4195-8c46-ba1d21abba37.json
khoicrtp's picture
Upload 2298 files
5fe70fd
raw
history blame
3.84 kB
{
"type": "bundle",
"id": "bundle--837242f4-62b8-4a41-9f21-2f57aecea834",
"spec_version": "2.0",
"objects": [
{
"labels": [
"malware"
],
"x_mitre_platforms": [
"Windows"
],
"x_mitre_domains": [
"enterprise-attack",
"ics-attack"
],
"x_mitre_contributors": [
"The DFIR Report, @TheDFIRReport",
"Matt Brenton, Zurich Insurance Group"
],
"x_mitre_aliases": [
"Ryuk"
],
"object_marking_refs": [
"marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168"
],
"type": "malware",
"id": "malware--a020a61c-423f-4195-8c46-ba1d21abba37",
"created": "2020-05-13T20:14:53.171Z",
"x_mitre_version": "1.3",
"external_references": [
{
"source_name": "mitre-attack",
"external_id": "S0446",
"url": "https://attack.mitre.org/software/S0446"
},
{
"source_name": "Ryuk",
"description": "(Citation: CrowdStrike Ryuk January 2019) (Citation: Bleeping Computer - Ryuk WoL) "
},
{
"source_name": "Bleeping Computer - Ryuk WoL",
"url": "https://www.bleepingcomputer.com/news/security/ryuk-ransomware-uses-wake-on-lan-to-encrypt-offline-devices/",
"description": "Abrams, L. (2021, January 14). Ryuk Ransomware Uses Wake-on-Lan To Encrypt Offline Devices. Retrieved February 11, 2021."
},
{
"source_name": "FireEye Ryuk and Trickbot January 2019",
"url": "https://www.fireeye.com/blog/threat-research/2019/01/a-nasty-trick-from-credential-theft-malware-to-business-disruption.html",
"description": "Goody, K., et al (2019, January 11). A Nasty Trick: From Credential Theft Malware to Business Disruption. Retrieved May 12, 2020."
},
{
"source_name": "CrowdStrike Ryuk January 2019",
"url": "https://www.crowdstrike.com/blog/big-game-hunting-with-ryuk-another-lucrative-targeted-ransomware/",
"description": "Hanel, A. (2019, January 10). Big Game Hunting with Ryuk: Another Lucrative Targeted Ransomware. Retrieved May 12, 2020."
},
{
"source_name": "FireEye FIN6 Apr 2019",
"url": "https://www.fireeye.com/blog/threat-research/2019/04/pick-six-intercepting-a-fin6-intrusion.html",
"description": "McKeague, B. et al. (2019, April 5). Pick-Six: Intercepting a FIN6 Intrusion, an Actor Recently Tied to Ryuk and LockerGoga Ransomware. Retrieved April 17, 2019."
}
],
"x_mitre_deprecated": false,
"revoked": false,
"description": "[Ryuk](https://attack.mitre.org/software/S0446) is a ransomware designed to target enterprise environments that has been used in attacks since at least 2018. [Ryuk](https://attack.mitre.org/software/S0446) shares code similarities with Hermes ransomware.(Citation: CrowdStrike Ryuk January 2019)(Citation: FireEye Ryuk and Trickbot January 2019)(Citation: FireEye FIN6 Apr 2019)",
"modified": "2022-05-24T21:10:44.381Z",
"created_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5",
"name": "Ryuk",
"x_mitre_attack_spec_version": "2.1.0",
"x_mitre_modified_by_ref": "identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5"
}
]
}