Blogs

Ryuk Ransomware Attacks and What You Need to Know

How To Handle Ransomware

Law Enforcement and other Governmental Agencies all over Georgia recently received a shocking warning in regards to what is being characterized as a targeted and organized series of Malware attacks. Shortly after this warning was released, over 20 Texas agencies were crippled.

Ryuk Ransomware attacks are targeting Law Enforcement and Government Agencies in an attempt to gain monetarily. The attacks will cripple operations within these agencies and in order to access encrypted data and files, attackers will insist on a very expensive ransom, likely hundreds of thousands of dollars. According to the Georgia Bureau of Investigation, these attacks are suspected to have originated from North Korea, bringing an entirely new complexion to the ongoing “war” against Malware.

Ryuk can get in two ways; email phishing attacks and unprotected remote desktop ports (RDP). What makes Ryuk so dangerous is that it can be difficult to prevent because it is โ€œbespokeโ€ meaning that it is modified and can be tailor made for a specific target. It spreads slowly and strategically as it is manually spread from within the network by the hackers once they have entered. It is crucial for the health and protection of your agency that preventative actions are taken and that staff and personnel are aware of and educated on Ryuk Malware Attacks. Two major risks that come with Ryuk Malware attacks are the potential disabling of 911 dispatch as well as the crippling of law enforcement missions. Both of these scenarios have played out in previous ransomware attacks in Georgia.

We want to be sure you are best suited in your defense plans to protect against Ryuk. Liberty is using a layered approach to act defensively against Ryuk Malware. Our approach consists of DNS/Cloud Security, Network Security, Endpoint Security, and leveraging tools that learn machines allowing for detection of abnormal network behavior. In addition to these steps, we take it a step further to train our clientโ€™s users. It is important that users know how to spot abnormal or suspicious activity and what best practices to use so that they, themselves, can become, as we like to call it, human malware detectors. For example, just by itself, control over incoming email can minimize the success of those attacks. Without putting those best practices in place, all the malware protection tools in the world will not hold up against careless end-user mistakes.

Below we have listed some additional steps that you should take now in your efforts to prevent against Ryuk:

  • Disable Remote Desktop on every computer on your network.
  • Where you canโ€™t remove RDP, replace it with a third-party version that is secure and that can provide two-factor authentication.
  • Require two-factor authentication for any changes to your network devices, including your servers and to your clients. The second factor should be a physical smart card or USB key, not an SMS text message.
  • Impose a password management policy on your network, including a requirement that all passwords be changed immediately. At this point, any passwords that have been in use for a while will have been compromised, so implement a policy that requires new passwords immediately, sets requirements for password age and doesnโ€™t allow password reuse.
  • Make sure your backups donโ€™t use disk letters or any other method that allows access through the operating system. Backups must be managed by backup software that creates protected backups that cannot be otherwise accessed from the network.
  • Make sure you test the ability to recover your files to confirm that you really have a backup you can use. Then store those backups off-site in a cloud location or potentially in a physical vault.

These proper steps were recommended by an article from eWeek that you can find here.

We want you to be as prepared as possible in your security plans to defend against Ryuk. Contact us at sa***@*********ch.net for more info on Ryuk Ransomware and how to protect your organization against it.

Back Next

Recent Blogs

How To Handle Ransomware

Windows 10 End of Support: What It Means for Your Business (and How DaaS + Section 179 Helps)

Microsoft has officially announced that Windows 10 will reach end of support on October 14, 2025. After that date, Microsoft will stop providing security updates, bug fixes, and technical support for Windows 10 devices. While your PCs wonโ€™t immediately stop working, continuing to use Windows 10 after that point exposes your organization to growing security, […]
Oct 1st, 2025
How To Handle Ransomware

AI, Compliance, & Cybersecurity

Artificial intelligence (AI) is no longer a futuristic idea. Itโ€™s here, and itโ€™s already transforming how businesses operate. From automation to analytics, AI can supercharge productivity and improve decision-making. But with this power comes a new layer of complexity, especially when it comes to compliance and cybersecurity risk management. Today, business leaders are not only […]
Sep 1st, 2025
How To Handle Ransomware

Are Your Employees Ready for AI-Powered Threats?

In todayโ€™s fast-evolving digital landscape, artificial intelligence (AI) is transforming industries โ€” and unfortunately, it’s also empowering cyber criminals. AI-powered threats are smarter, faster, and more sophisticated than ever, putting businesses of all sizes at greater risk. The question is: Are your employees ready to face these new challenges? At Liberty Technology, we understand that […]
Aug 4th, 2025
How To Handle Ransomware

AI & Cybersecurity: Friends or Foes?

Artificial Intelligence (AI) is changing the cybersecurity world faster than ever before. AI can be both a powerful defense tool and a potential new threat for businesses. To stay protected, itโ€™s important to understand how AI impacts your cybersecurity risk management strategy. AI can strengthen security by: Detecting threats and unusual activity in real-time, identifying […]
Aug 4th, 2025
How To Handle Ransomware

What Is Cybersecurity Risk Management?

In todayโ€™s digital landscape, cyber threats are more advanced and persistent than ever. Businesses must take proactive measures to protect their data, systems, and operations. Thatโ€™s where cybersecurity risk management comes in. If your business is looking for reliable cybersecurity risk management solutions, partnering with experts can help your business make informed, risk-based decisions around […]
Jun 1st, 2025
How To Handle Ransomware

What Is Network Security, and Why Is It Important?

In todayโ€™s digital landscape, protecting your business from cyber threats is no longer optional – itโ€™s critical. Network security refers to the tools, policies, and practices that keep your systems, data, and users safe from unauthorized access, misuse, and breaches. From small businesses to large enterprises, securing your network is foundational to safeguarding sensitive information […]
May 1st, 2025
How To Handle Ransomware

Liberty Technologyโ€™s CEO, Ben Johnson, Named a 2025 Webex Insider

Liberty Technology is proud to announce that our CEO, Ben Johnson, has been named a 2025 Webex Insider, an exclusive recognition awarded by Webex to IT leaders and collaboration experts driving innovation in the field. The Webex Insider program highlights professionals dedicated to shaping the future of hybrid work through cutting-edge communication and collaboration solutions. […]
Apr 10th, 2025
How To Handle Ransomware

What Is an MSP and How Does It Work?

In todayโ€™s fast-paced business world, managing IT infrastructure can be challenging, especially for small to mid-sized businesses. Thatโ€™s where a managed service provider (MSP) comes in. If youโ€™re a business in Georgia, looking for reliable IT solutions, partnering with a trusted MSP can help you streamline operations, enhance security, and reduce downtime.ย  What Is a […]
Apr 4th, 2025
How To Handle Ransomware

Cyber Insurance: What's Covered, What's Not, and How to Stay Protected

With cyber threats on the rise, businesses are increasingly turning to cybersecurity insurance to protect themselves from cyber incidents’ financial and operational impact. This type of insurance can be essential for organizations of all sizes, offering a safety net in case of data breaches, ransomware attacks, and other cyber risks. Liberty Technology works with businesses […]
Mar 3rd, 2025
How To Handle Ransomware

What to Expect During a Cybersecurity Risk Assessment

In todayโ€™s digital landscape, protecting your business from cyber threats is more critical than ever. A cybersecurity risk assessment (CSRA) is a crucial step in identifying vulnerabilities and strengthening your organizationโ€™s defenses. Liberty Technology offers comprehensive CSRA services to help businesses uncover risks and implement tailored solutions. Hereโ€™s what you can expect when partnering with […]
Jan 2nd, 2025
How To Handle Ransomware

2024 Highlights and Whatโ€™s Next

As we complete the last chapter of 2024, Liberty Technology is proud to reflect on a year of growth, community engagement, and exciting innovations. This year has been one for the books, from strengthening IT services to giving back to the communities we serve. Here’s a look back at what weโ€™ve accomplished and how weโ€™re […]
Dec 11th, 2024
How To Handle Ransomware

What is a vCIO?

In today’s fast-paced business world, having the right technology strategy can make all the difference. This is where a Virtual CIO (vCIO) comes into play. But what exactly is a vCIO, and how can virtual CIO services benefit your business?   Understanding the Role of a vCIO A vCIO, or Virtual Chief Information Officer, is […]
Nov 1st, 2024