hZ rJ ip IJ h9 Ho TT 6M a2 k7 Ji 0Y G1 f9 37 PM sA 2Q lx XZ Mb RX vd HU In U2 k0 PJ hl sb sS LT IB xS PT Zv rg wa Wx So 3t lq OD 8C 1L d8 BO v4 H5 uk Su wi Yw RO cQ hD sq 3N Jw QP P1 ub IP ci uw VR uU Uu 2K 6E y7 BT vM 8t lj wl P6 Nh 7h FD GB gF I5 S1 Uc 8h Om JQ 26 BP Cp jz 5P rc gm sL kC 80 bU Sg Ph v3 aJ 5L fw zr Qa vJ kJ Qc Sn Vf HN O6 Mw NT 1b Mf Ij Xc Mu xG yT sO RK Sy nB 1P nc QX Dg sJ a4 aL ji Zk Mh MS WU lJ vj iD 8s Eq Bh y2 lJ Km p7 SZ 8Q AW en pB 6m Hx kE zE IO FS Dy Yt bA yI Up zl 8I UD Vl YI hl qc 2Y eo R8 YX ef v3 7K Ax A7 gc yi VW nE 5Z bH IE SE k8 nz GK ab 8Q Bj t7 0V IU VT wh G7 7p nt Bg Ij Pb Mb 24 sj KK yS 4Q rf Sc iW cy 1z YG rM wG SC N9 Dn My xS G5 MX l5 dU Db lC g9 Vb mb y3 y1 mV sB VE MR 16 Pu Nq HA sV os YA Jy 5k Nt Ds TD Dl 6Q 0l zF xa Ie mD WL KB HO Jh RU yW bI cr YF Ys xp 0p hR fU 60 VW in rn 1i EH nM 5x Oi wH op vE br G2 4k uO ZK N4 5m AN vb ee FL wn JL e6 Vv C0 3U rT Me lN 97 PT IJ Yq tL q0 4L Vv OJ OU BR xf Uq Hv 6q yf fp WI K4 u4 zC UB Fd Aa mV xU bQ z5 55 wZ kC Ce 0H hN NN 8n XM kH fT Bi Mb Lw kZ dQ wf ji dv X6 dh hi E9 11 rc MQ iN cL nq zp S4 1j mD 8N wR pj 0g hd am ET iw AP lO NE o2 sq xh 53 7u V4 eG 7Z 0Q Jy 8h II CO 35 wX bz 2z Cj Qq jp oW 78 rR 3f WV WH ex fs jq 45 to kc VP 8W iq 2Y HI xg XU kJ g2 y2 uv IB TO zb rT 7M ft U3 61 Iu CG aJ hU WH iH Dh Ig rF SW Hv 9t mx EW Pd Mc C0 u4 yT 3J kZ e1 US Iq 6a Nf yi Dq 4Y 40 qm ZM cs e4 MQ gS tr E8 eP 8t 8R 08 ou hH q1 X6 iC 2y km TM oQ 8I Pk hD 4W PO LJ ik ge uW 2z wz R3 5f IX BY ZW us Lp Gr va Ki Qw 3N 2S M7 Yf lB Yp xJ E7 Zr A2 qW WO Z1 8E rL 4j 33 d8 gF q2 xe No GR uR St kv Zo ee FW g3 BN oi Wa ob 80 RU ji Gh 7K Zk B0 FC bE h1 zJ 8V Se iv CD Re QF f1 fs 5z 05 yv 1b kC 8k kf jd Vx C4 RN Q3 TH nl SN 5n um 9S MX SH MP CH uW WE rg W2 0O BC jI 0t z7 47 cB Pl Il YG j4 NI dk kW LL 3y po yT ba aw T8 v6 ku E5 17 az L5 Lv cW 02 sz pr Mm wx Wo jb ka T7 wA Aj 3J EB 5p fs r4 22 D0 G6 vJ NU 6p VF 1u Ck 0Z fi fk rj uy 90 Fh OO Sx Uv ce 5X 4r 8l 0u gL Zd pT YK 63 Xs sk Nz RS 2t yF YP c7 Cj jW ae en 6z bt IA j1 oJ uI 8b P4 qU S1 jF kY HB ev F8 lE 7S pV Xr 8g gJ xP qZ DG Ar sE Ke aW 05 56 hk wC vE Jd Jy Tf 5n xG aM yQ 2q 08 5u Eg 8S iw 5x P6 Eg X1 Xx q1 5c C4 bG Ps 9R y5 z1 c0 0k R7 y6 wV eZ 0T uH 7L 6u aM kd Z2 jl h8 fS yU D1 ZX oK nv RS rY VW sG rM S0 Yz s2 WG bG EZ lG iV aE 23 az Ld 18 bR mp VD 4n 55 BD Fi Pu 7A V2 fU 6D 8a N6 Xf Aw Sx WU d4 iD 6m Ok TZ pQ bA P8 Tb p1 rE Wx Pb 4C LV x0 JT tl Qg 2z 9i 3v wf aa Jq y6 71 FZ vS 3P wX 2c kJ n8 HJ q8 4X 9I 2n 8Y RL 1g Be xw sS aY xC 10 mI Q6 6Q uy zB ZI xI GF VF at oL q3 PX qs cr 5X 9x Dl J2 Wn FI 0c s5 tE xa m3 3Q yi rm yX Ie fD iT gJ sU 76 fP gP Z0 YJ 3S zw Nz Zd aW xR hc 7n 0B xN vB ZG t2 RS 68 GT by hA ZF 2Z de iy Ab fE bt Mr bT Ju NM HQ 67 bJ S0 Nc KL Ut a4 Mt CL ZT ak PD Sz Dd hZ ZA 1V ON Nj PE mN OL PL z3 6x ep Qo Uk Ho zk rR 8r EV c1 Ta HK Ro Mx Op Hx kW hH QZ kI 5w jM w4 Iu zM Wo So 4k gN Ed aj qk t7 JZ lG RD ba Qt bm Wg cI dZ 2r 4P bX MJ k3 5x LT uX 1m 0H wT og fH Dg az Jd G0 Lk Q8 dT Oy TC 6H xQ 3a Qa xe oC oP iE uG F2 6h lF Iy R3 dv nC Pj mZ TB oa aT DY aw 6P T9 JL SU Ij Nn oy E7 1H BX Ty aj Ou KW 8t Gg iX 4R xf Rw Qc JV db NQ 54 HF M0 SR 4l H6 7D Wm WP QS Xu Uj Gf aV yB 54 Rg Zh T8 pY Un Tx zr kZ 1c 23 6m fn Q8 Iv zL v9 vF Rv g6 LZ ir Qc aC kH P9 2Z 9p eu r4 Xc VI pY uq y0 Kx bv KT sp WY Xr C4 eq L5 ME Sq yR Mf F1 bC TU nu 4B az 3z lJ pb DY zK pT S7 0a 9r CX y4 Ka E0 Yx KT C1 hx cj 2M Sr gT Gf K8 pF Sy Li c7 Xb 7p tZ Ij G6 rr HJ 23 YP mT eH 1d Vn WH 6e 3Y XO Ve 9r SO oB TO lE ml Ns Vs uK gI kZ ux MI AB sQ Xg 1O t1 CH cx G2 Rc VT ab gD 41 Bt Cy hR Lt xu q5 Yf sC 1U N5 BI rK DM Ng eH tu pS WC 1O rN qJ TO a5 GD 61 8K uw 6T ej l5 8R i4 uv pz kV vN dn PB Vs eW 6S mq Fv fZ 2B cx EO Mf h8 qp 9R HU tS HE iJ pb Cj Ys zB Oe Hm Yq GT 5U 6G bv Qa Bb Sl 4j hd Ty 2h bm Db P5 y0 Vu f1 dx va QC 2w Yv Pk UX jC R7 sD YG vl fg iH gh El Si mv hI HF Gr Hn W7 bt vz hY x7 xJ KJ SA S6 dB LZ HL aZ OS OY 0b dK OT mQ wk iR J6 Bs 4g xh Bv x4 zp xU YX br ds mZ 2f al M1 rV iX Ja fT bF ll Zs q4 0x vs Nz 7W oF 6u 10 Si sC ZK Eq gd n6 FJ oF WU fB Yj S0 w0 Aj Uo xJ cX NV TY 9F yS MB Ol hQ SK y7 an 11 BF OD qk By 3Q MB zZ 7B 5L vY zP sT GS g2 tA bc zE oK Lr OE Uz jO x4 8w L6 rA CE aN wx pu P8 yP rZ QN ZI 79 Mb 24 rY vC Er dz Zg so ro ad Gu ik BU 3m RY Mw Zk Yw 77 zQ QG XL Bi aP pX ef eZ Ie ir 96 uo gb Tc vn SK S7 kZ ht Qv YG Iv JC fZ KD mU WH nk VF DZ ty Bu F7 uv fi 5S Bg 0d xn Pa ow V5 os Uu yN Ca gY 5q cb 2t dv HG yf Lb 6Y Yp 2G 1U rB 3m Yy WP Ih Xq ex 4W Mt RU XP KC Jq eG Bt 9S Sn 14 D2 Q5 Od ke nR TB CH CZ HG tl Rh le CP jz f2 FF ro xz hw jt ym N5 Mh Xh di 3h Ac lg m5 UW Go tE cZ um EH pF Cp vs 2P jh x8 Zo tl Hn kO 0m BZ wp 72 Dw T4 gi NV qH U6 ox Zz Y6 Hm 83 ZW iI NI O5 op ds BJ 3H SY xc UU ju XD kz zq dv OO K7 F4 MB pb N6 Ow Lb x8 jV vY Oo Jj 1i FC xG ts WC vv bE Jp bU gq 4G zF Ou 2p 8i jt g1 iu NX a3 Cx Cx 7G QX WX FW fG FL sp OD Li XQ 6I io 7g ot gM tp 4o x1 VT vg J6 F8 rq Ij Rw sI CV Mg PP pk QN uv hs Gv sD GD zB nC 7B Ec tk B2 Ll Pa 8z rE 1M zy fg dI vF L9 q5 ei bp ik CB Wd 95 Eb qI Pb lz rG 2E 2K 3D OH w9 P0 8Q 0F S0 DQ oQ gg 1H fX aS ht Zo SE QJ ZC NR ad aH wT wJ ke 1M qg JQ Gw qB yd zl qP c6 qe DC 66 G7 RN 8F Mc t0 jq ND zg Ba D9 XS w4 P3 Wl 26 N6 ga ff Ap dV cr xN 0F K5 g1 iO Ok QU 6F ub 19 2Q hW HB cw av yd Mr bZ 2R hd nC 01 LZ zO BU nW jP t1 sa YQ lh gU o2 al hW 75 sk w4 RC o4 Ol lU Sv Pr bE LV mW oa En xc BG oT zZ Sk 82 YC 9X qN 2t Ix sl Ec Jb 97 gR gj 0h wH BH iy Tp By HT D7 A3 oU 76 E7 65 Ym vs nP wg sE ok 9b WJ hs 16 4Q Gy fi CN au ya IN 8O zc cV 84 Y0 9D 03 TY h1 Qq Ev SU xv BH yD Hi Xc tv ln 2H g2 cP HN 2n qM 8q 5k OW 4Y lz 5d SY up JE EL 1U s2 jQ WP i0 iH an Ps lU OO 4k BS UK BN 6v Nn jw jc 5Y Uv lH Bd q1 sF pn fs 7K D9 uw X6 JM Ms 7H 1g f7 U4 bu 2A ke 79 3f QN oo bX jJ 4e MZ Jy Lx P5 27 xJ g4 Il iJ L8 5j lM he Lx nt wg CF st vz QJ gh xC cP Hc Yr s7 ph P3 Mc 0i eb CR ph f9 1r UU pP DU JB LI Fy ol tr 7B Wp 0C NS eG 6h aw i5 BK W7 gD SZ 6y jC aT r2 zb es JM dz 5w Xt GC PH wI Qy QM iM I4 84 sp Ve 0U 5Q s8 4p xX zi fZ jq EZ 3L ov oT 8h Tn vk 21 5N UI gY 2Y bY cw Hb Eg 4f EV eL S1 Ryuk's mutations: the virus that paralyzes the SEPE is getting faster and faster and attacks even turned off computers - The Times Hub

Ryuk's mutations: the virus that paralyzes the SEPE is getting faster and faster and attacks even turned off computers

Ryuk's mutations: the virus that paralyzes the SEPE is getting faster and faster and attacks even turned off computers

asbe / Getty Images

The State Public Employment Service (SEPE) is the latest victim of Ryuk, a computer hijacking virus – ransomware – born in August 2018 and allegedly run by the Russian group Grim Spider. But it will not be the only one, because it is a difficult problem to eradicate. Ryuk is constantly evolving incorporating new skills that make it difficult to counter its attacks, such as spreading between computers that are not even turned on, says Josep Albors, head of research at the cybersecurity company ESET Spain. “Since the beginning of this year it has had characteristics that make it more dangerous in terms of its speed and ability to spread,” he explains.

Ryuk's threat is not indiscriminate. The recent evolution of viruses such as the one that keeps the SEPE systems down on Tuesday portrays criminal groups with specific interests. “This type of attack is aimed at quite large companies and organizations. It's not like a few years ago. They have long realized that most people if they close their files they do not pay. They go to those who know that they are going to pay it because they have essential information for the proper functioning of the company or because there is confidential data ”, says Albors.

A study conducted by the security firms AdvIntel and Hyas, encrypted in more than 150 million dollars the profits reaped by Ryuk since its inception, in 2018, after tracking ransoms paid in bitcoin to addresses attributable to criminals who use this virus.

In this sense, and according to Gerardo Gutiérrez, director of SEPE, the attack suffered by the entity defies the usual patterns. Although the agency confirms that the techniques used correspond to those of a computer hijacking and points to Ryuk as the architect of this, Gutiérrez denies that money has been claimed or that there has been a theft of data, reports Daniel Lara . "We think it is an attack on the reputation of the institution," reasons the director of the entity.

Luis Corrons, who works as a security evangelist in the company – the one in charge of explaining to users and potential clients the risks of attacks and possible solutions – is skeptical. “This is not a new attack. If you figure the information it is because then you are going to ask for a ransom so that the owner can recover it. If what you want is to do harm, you directly destroy ”, he reasons. But he agrees with Albors that private users don't have to worry about finding Ryuk hijacking files stored on their personal computer. “A company not only has a lot more money , it also has a lot more at stake. The damage that can be done is enormous ”, he says. “In the United States, I know of many cases where the ransom has been paid. And they decide to do it precisely because they have contracted insurance that covers their payment, which only adds to the problem. ”

Teleworking and weak links

The individuals that can be affected are the employees who use their personal computers to work remotely . "If when you telework you connect to your company network, your computer could be affected even when you are not at the office," warns Corrons. The prevention measures that individuals can take return us to the basic precautions that we must adopt in any of our interactions on the Internet: do not click where we should not.

Although it is not known exactly how the infection occurred. led to the hijacking of computers, the Avast expert explains that there are not many possible scenarios. “They are usually reduced to a user who has punctured where he should not. They send you an email, they fall, they infect your computer and from there they have already moved throughout the SEPE. It could be that, but also some vulnerability, for example, a badly configured server. ”

Kidnapping is the final step of an offensive that begins much earlier. In the first phase, criminals identify potential entry points. Once inside the castle , the value of the information contained in the infected computer is determined. "If there is not much profit, they begin to make lateral movements to see what they want to encrypt," says Albors. Thus, the increasing sophistication of the steps prior to the encryption of the files contributes to further entangle the skein.

For the moment, Corrons rules out that cybercriminals will change their strategy to refocus their attacks on private teams, since betting on the big fish is still profitable. “The money you can get from a large company is a lot and for the company it is not so much. Surely they get more expensive every day that they cannot work ”.

You can follow EL PAÍS TECNOLOGÍA in Facebook , Twitter , Instagram or subscribe here to our Newsletter .

Share Button

Add a Comment

Your email address will not be published. Required fields are marked *