SNSSimple Network Solutions
Article complete
Cybersecurity8 min readOctober 8, 2019

Ryuk Ransomware in 2019: How Targeted Attacks Changed the Ransomware Playbook

Ryuk ransomware dominated 2019 headlines by abandoning the spray-and-pray model in favor of targeted, high-value attacks on specific organizations. The ransom demands went from hundreds of dollars to millions. Here's what changed.

MD

Marco Delgado

Senior Cybersecurity Specialist · Simple Network Solutions

CISSP · CEH · CompTIA Security+ · CISM · 14 Years Experience

CybersecurityPenetration TestingHIPAA/FINRA ComplianceIncident Response
Ryuk Ransomware in 2019: How Targeted Attacks Changed the Ransomware Playbook

The ransomware story of 2019 is Ryuk — but understanding why requires understanding how fundamentally the ransomware model changed between 2017 and 2019. The WannaCry attack of 2017 was mass-scale and indiscriminate: it infected every vulnerable system it could reach and demanded $300 per device. Ryuk takes the opposite approach. It selects specific targets, spends weeks or months mapping the victim's network, disables backup systems before detonating, and then demands ransoms measured in hundreds of thousands or millions of dollars. The City of New Orleans paid $7 million in recovery costs. Universal Health Services spent $67 million recovering from a Ryuk attack. Several small and mid-size businesses were quietly hit for $200,000–$500,000 in demands that never made news.

How Ryuk Actually Works: The Three-Stage Attack Chain

Stage 1: Initial Access via TrickBot or Emotet

Ryuk rarely gains initial access directly. It is almost always preceded by TrickBot or Emotet — banking trojans delivered via phishing email that establish a persistent foothold in the victim environment. The initial infection may go undetected for weeks or months while the attackers observe network activity, harvest credentials, and identify valuable systems and backup infrastructure.

Stage 2: Lateral Movement and Privilege Escalation

Get monthly IT tips for Miami businesses

No spam · Unsubscribe anytime · Practical advice only

Once inside, the threat actor (or the automated components of the malware) uses harvested credentials and tools like Mimikatz to escalate privileges, gain domain administrator access, and map the target network. They specifically identify and target: domain controllers, backup servers and NAS devices, financial systems, and any system containing data that would be most painful to lose.

Stage 3: Payload Detonation

Only after the attacker has achieved maximum reach — and has typically destroyed or encrypted backup systems to maximize the victim's desperation — does Ryuk encrypt the target environment. This sequencing is what makes Ryuk so much more damaging than earlier ransomware: by the time the ransom note appears, there may be no clean backup to restore from.

The average Ryuk ransom demand in 2019 was $780,000, according to Coveware's ransomware reports. The average recovery time for organizations that paid was 12.1 days. The average recovery time for organizations that did not pay and restored from backup was 6.2 days. Organizations with tested, immutable backups paid nothing and recovered faster.

What Small Businesses Can Do Against Ryuk-Style Attacks

The Ryuk attack chain has multiple points of intervention. You do not have to stop the attack at every stage — you just need to stop it at one.

  • Email security with behavioral analysis: Emotet and TrickBot are almost always delivered via phishing email. Advanced email security that analyzes sending patterns and URL reputation (not just content) blocks a significant percentage of initial access attempts.
  • Endpoint Detection and Response (EDR): Legacy antivirus does not detect TrickBot or Ryuk because the signature changes with each variant. EDR detects behavior — the lateral movement, the credential dumping, the backup deletion — regardless of whether the specific malware is recognized.
  • Privilege separation: If domain administrator credentials are only used on dedicated admin workstations (not general-purpose computers), the lateral movement phase of Ryuk is significantly more difficult and time-consuming.
  • Immutable offsite backup: The most important control against Ryuk specifically is backup infrastructure that the ransomware cannot reach or delete. Cloud backup with immutable storage (where previous versions cannot be overwritten or deleted) ensures that even if Ryuk destroys your local backups, a clean recovery point exists.
  • Network segmentation: If Ryuk cannot spread freely from an infected workstation to the domain controller and backup server, the blast radius of an infection is contained.

If You Are Hit: The First 4 Hours Matter Most

  • Isolate infected systems immediately — disconnect from network but do not power off (forensic evidence is preserved in memory)
  • Contact your managed IT provider or incident response team before contacting law enforcement — sequence matters
  • Do not pay ransom without consulting legal counsel and a breach coach — payment may trigger OFAC sanctions compliance issues if the attacker is on a sanctions list
  • Notify your cyber liability insurance carrier immediately — many policies require prompt notification and have breach response resources included
  • Preserve evidence — do not wipe systems until forensic imaging is complete

Pro Tip

Simple Network Solutions provides immutable cloud backup as a standard component of all managed IT contracts. We also include incident response planning in Comprehensive tier engagements. If you want to evaluate your current backup infrastructure against the Ryuk-style threat model, call (786) 383-2066 for a free backup security review.

Free Newsletter

Stay ahead of Miami's IT threats & trends

Monthly insights written for South Florida business owners — covering cybersecurity alerts, cost-saving IT strategies, and Miami-specific technology advice.

Cybersecurity alertsCost-saving tipsMiami business focused

No spam. Unsubscribe anytime.

About the Author

MD

Marco Delgado

Senior Cybersecurity Specialist · 14 years experience

CISSP · CEH · CompTIA Security+ · CISM · 14 Years Experience

Marco leads cybersecurity operations at Simple Network Solutions, with 14 years of experience in network security, penetration testing, and compliance for regulated industries. He has responded to over 200 security incidents for Miami businesses and holds four active cybersecurity certifications. He regularly presents at South Florida IT security events and contributes to the FBI InfraGard Miami chapter.

Share:
Ready to Take Action

Questions? Our Miami IT team is standing by.

Turn what you just read into action. Schedule a free consultation with our local team — no sales pressure, just honest technology advice for your Miami business.