Skip to main content
  1. Home
  2. Computing
  3. News

Hackers are scoring with ransomware that attacks its previous victims

Add as a preferred source on Google
Image used with permission by copyright holder

Hackers are targetting computers with ransomware that scours a previously infected network in order to pinpoint and attack and enterprises with big money. Named “Ryuk,” the ransomware has been around since 2017, but only recently, in mid-2018, has there an uptick in successful attacks, according to research done by the security experts at FireEye.

Upward of $3.7 million in Bitcoin has been acquired by hackers leveraging these attacks, which first infects victims PCs with a “Trickbot” trojan, and then subsequently the “Ryuk” ransomware. As part of the process, after sending a payroll phishing email and tricking victims into opening it, the hacker is able to use the”Trickbot” trojan and scour the victim’s network and files to determine if the target is worth infecting with a subsequent attack via “Ryuk.”

Recommended Videos

It can lay dormant for a year or longer, and the unique element is that in that time period, the hacker can determine whether to direct another attack from “Ryuk” at a previously infected organization in order to extort large ransom fees.

“Interactive deployment of ransomware, such as this, allows an attacker to perform valuable reconnaissance within the victim network and identify critical systems to maximize their disruption to business operations, ultimately increasing the likelihood an organization will pay the demanded ransom,” explains the team at FireEye.

It is not certain which country is leveraging these attacks, but FireEye does not believe that it is coming from North Korea. Subsequent reports from another security firm CrowdStrike finds that the attacks could be linked to the “Grem Spider Group” in Russia due to IP addresses which are being used in the process. FireEye also believes that these attacks can increase in 2019 “due the success these intrusion operators have had in extorting large sums from victim organizations.”

There have been several high profiles cyberattacks recently, one which targeted newspapers across the United States, and another which leveraged social engineering to target emails accounts. To protect against these types of attacks, it is always best to avoid opening emails from suspicious email addresses. You also could consider never opening Microsoft Office files with macros enabled, which hackers often use to push out viruses via phishing emails. You also should keep both Windows 10 and your antivirus up to date, to ensure that you’re fully guarded.

Arif Bacchus
Arif Bacchus is a native New Yorker and a fan of all things technology. Arif works as a freelance writer at Digital Trends…
Razer’s new Blade 18 gets Arrow Lake refresh and a modest $3,999.99 starting price
For $3,999.99, you get the base model with Nvidia RTX 5070 Ti. A 5090 variant is available, too.
Razer Blade 18.

Razer has officially unveiled the 2026 Blade 18 today, and at the heart of all three configurations is an Intel Arrow Lake processor. 

I’m talking about the Core Ultra 9 290HX Plus, which features 24 cores, up to 5.5GHz clock speed (with boost), 36MB cache, and an onboard NPU that delivers up to 13 TOPS of compute power. 

Read more
Windows 11 will clean up its own driver mess so you don’t have to
Say goodbye to the nightmare of hunting down broken drivers after a bad Windows update.
Surface laptop on wooden table

It seems that Microsoft is keeping up its promise of making Windows 11 better. After introducing a new low-latency mode that speeds up app launches and an update that fixes the RAM memory leak issue, the tech giant is testing a new feature that addresses one of its most prominent problems. 

The new feature is called Cloud-Initiated Driver Recovery, and it can automatically roll back a broken driver that was pushed to your PC through Windows Update. 

Read more
After flubbing with Siri, Apple plans to host AI agents on the App Store
One problem is about money Apple won't commit to not charging. The other is about AI agents Apple can't figure out how to control. WWDC needs to solve both.
Electronics, Mobile Phone, Phone

Apple is currently facing a Siri problem that has nothing to do with Siri at all. With WWDC 2026 just weeks away, The Information reports the company is actively courting developers to integrate their apps with the new Siri coming in iOS 27. 

The mechanism powering the overhauled Siri, App Intents, is an API that lets Siri execute actions inside third-party apps without you actively opening them, which sounds quite useful, I’d say. However, some of the world’s largest developers are dragging their feet on it, not because it’s tough, but because Apple left the door open on charging for it later.

Read more