技術ブログ2026年3月15日Sarah Kim1 閲覧

Maze, Conti, DarkSide, Ryuk Ransomware Groups: Threat Analysis and Practical Defense Strategies

This analyzes the evolving attack tactics of notorious ransomware groups such as Maze, Conti, DarkSide, and Ryuk, and proposes practical defense strategies to effectively counter these threats in modern IT environments, along with ways to leverage SeekersLab's solutions. It deeply covers key elements of prevention, detection, and response from a platform engineering perspective.

Maze, Conti, DarkSide, Ryuk Ransomware Groups: Threat Analysis and Practical Defense Strategies
Sarah Kim

Sarah Kim

2026年3月15日

Evolving Ransomware Threats: The Shadows of Maze, Conti, DarkSide, Ryuk

In recent years, ransomware attacks have evolved beyond simple file encryption, adopting a double extortion strategy that paralyzes critical corporate assets and leaks sensitive data, causing immense damage to businesses and organizations worldwide. Notorious ransomware groups such as Maze, Conti, DarkSide, and Ryuk, in particular, have changed the landscape of cybersecurity threats through sophisticated attack techniques and organized operational methods. These threats are no longer limited to businesses of a specific industry or size but broadly target modern systems utilizing cloud environments and container-based architectures.

This article provides an in-depth analysis of the main characteristics and attack tactics of notorious ransomware groups. Following this, it presents practical defense strategies from the perspective of platform engineering and security architecture to effectively counter these threats, along with specific ways to leverage SeekersLab's solutions to ensure system robustness and respond quickly to threats. Through this article, readers will be able to enhance their understanding of evolving ransomware threats and strengthen their practical defense capabilities.

The Rise of Ransomware as a Service (RaaS) Model and the Proliferation of Threats

Ransomware is not merely malicious code that encrypts files and demands money; its operational model itself has evolved into a service. The so-called Ransomware as a Service (RaaS) model has enabled ransomware developers and operators to divide roles, maximizing specialization and contributing to higher attack success rates. This allows attackers to easily utilize attack tools and infrastructure without needing separate technical expertise, consequently acting as a key factor in accelerating the quantitative and qualitative spread of ransomware attacks.

Moving away from past simple indiscriminate attack methods, recent ransomware groups select high-value targets and utilize various initial intrusion vectors such as sophisticated spear phishing, supply chain attacks, and exploitation of vulnerabilities. After intrusion, they attempt to seize control of the entire network through Active Directory compromise, lateral movement, and privilege escalation, ultimately exfiltrating sensitive data and encrypting critical systems to maximize negotiation leverage. This attack trend strongly suggests that companies must establish multi-layered security strategies across their entire IT infrastructure, rather than merely relying on endpoint security. In short, as the complexity of attacks increases, defense systems must also become more sophisticated.

Analysis of Major Ransomware Groups: Maze, Conti, DarkSide, Ryuk

First, let's examine the characteristics and TTPs (Tactics, Techniques, and Procedures) of major ransomware groups that have caused significant damage globally over the past few years. Each group has its own unique operational methods and attack philosophy.

Maze: Pioneer of Double Extortion Strategy

Maze ransomware first appeared in 2019 and was active until late 2020, pioneering the popularization of the double extortion strategy. Beyond merely encrypting data, they exfiltrated sensitive data before encryption and threatened to publicly release it if the ransom payment was refused, placing dual pressure on victims. Maze primarily relied on initial intrusion through RDP (Remote Desktop Protocol) vulnerabilities, VPN vulnerabilities, and spear phishing. Subsequently, they followed a typical enterprise network attack pattern, taking control of the Active Directory environment to perform lateral movement and privilege escalation. Their attacks primarily targeted large enterprises and public institutions, demanding high ransoms.

Conti: Organized RaaS Operations and Critical Infrastructure Attacks

Conti emerged around 2020 and succeeded Maze as one of the most active RaaS (Ransomware as a Service) groups. They were highly organized, operating like a corporation and employing team members with specific roles (developers, penetration testers, negotiators, etc.). Conti infiltrated systems through supply chain attacks, exploitation of vulnerable externally exposed services, and spear phishing, then actively used commercial penetration tools like Cobalt Strike to perform lateral movement. Notably, Conti targeted critical social infrastructures such as Healthcare and Critical Infrastructure, causing significant disruption and generating massive profits through data exfiltration and encryption. Following the Russia-Ukraine war in 2022, they suffered a major blow when their operational methods and source code were leaked internally, but they have since splintered into several variant groups and continue their activities.

DarkSide: Sophisticated RaaS That Caused Political Reverberations

The DarkSide ransomware group emerged in August 2020 and gained international attention in May 2021 with the attack on the U.S. Colonial Pipeline. This attack caused an unprecedented disruption to the fuel supply chain in the eastern U.S., raising awareness about the potential impact of ransomware attacks on national security. DarkSide also operated a RaaS model, carrying out attacks with sophisticated tools and a strict partner selection process. They claimed to adhere to 'ethical hacking,' avoiding attacks on specific sectors (hospitals, educational institutions, etc.), but went dormant after the international investigation tightened following the Colonial Pipeline attack. Their TTPs include initial intrusion via RDP, VPN vulnerabilities, and spear phishing, followed by lateral movement, data exfiltration, and encryption, similar to Maze and Conti.

Ryuk: High-Value Target-Centric Spear Attacks

Ryuk, first discovered in 2018, is ransomware that has primarily conducted targeted attacks against high-value targets such as large enterprises, government agencies, and hospitals. Unlike other RaaS groups, Ryuk tends to target specific organizations through thorough reconnaissance and sophisticated intrusion vectors, rather than indiscriminate attacks. They often collaborated with banking Trojans like TrickBot and Emotet to perform initial intrusion and lateral movement, preferring to manually deploy ransomware after gaining control of the entire network. Ryuk was infamous for its rapid propagation speed and high encryption efficiency, causing immense damage in short periods. Their attacks often led to the financial ruin of affected companies.

In summary, these ransomware groups are organized through the RaaS model and execute a series of sophisticated attack phases, from initial intrusion to lateral movement, privilege escalation, data exfiltration, and encryption. This indicates a complex threat that is difficult to defend against with traditional security solutions alone.

Platform Engineering Defense Strategies Against Ransomware Attacks

Now, let's look at defense strategies from a platform engineering perspective to counter these ransomware threats. A multi-layered approach is required to minimize the attack surface and enhance detection and response capabilities.

1. Implement Strong Authentication and Access Control

Weak credentials or permissions are most commonly exploited during the initial intrusion phase. Therefore, it is essential to apply Multi-Factor Authentication (MFA) to all systems and implement Access Control based on the principle of Least Privilege. Especially for remote access services such as RDP, SSH, and VPN, strengthened security policies must be applied.

In cloud environments, granular control over user and service account permissions must be achieved through IAM (Identity and Access Management) policies. For instance, a policy to restrict external access to a specific IAM Role can be implemented as follows:


{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Effect": "Deny",
      "Principal": "*",
      "Action": "sts:AssumeRole",
      "Condition": {
        "StringNotEquals": {
          "aws:SourceVpce": [
            "vpce-0123456789abcdef0",
            "vpce-0fedcba9876543210"
          ]
        }
      }
    }
  ]
}

The core of the above code is to block all sts:AssumeRole requests not coming through specific VPC Endpoints, thereby preventing external access in the event of an IAM Role compromise. FRIIM CIEM (Cloud Infrastructure Entitlement Management) helps effectively implement the principle of least privilege by continuously monitoring and optimizing entitlement misuse in such cloud environments.

2. Network Segmentation and Micro-segmentation

Lateral Movement is a critical phase in ransomware attacks. Network segmentation and micro-segmentation must be applied to logically divide the network and prevent rapid propagation even if an attacker intrudes. In container environments like Kubernetes, Network Policies can be used to control communication between Pods.

Below is an example of a Network Policy that restricts communication to only Pods within a specific namespace.


apiVersion: networking.k8s.io/v1
kind: NetworkPolicy
metadata:
  name: default-deny-all
  namespace: production
spec:
  podSelector: {}
  policyTypes:
    - Ingress
    - Egress
---
apiVersion: networking.k8s.io/v1
kind: NetworkPolicy
metadata:
  name: allow-web-access
  namespace: production
spec:
  podSelector:
    matchLabels:
      app: web
  ingress:
    - from:
      - podSelector:
          matchLabels:
            app: frontend
      ports:
        - protocol: TCP
          port: 80

Such Network Policies can be effectively managed and orchestrated through FRIIM CWPP (Cloud Workload Protection Platform), ensuring visibility and control over threats in container environments. FRIIM CNAPP provides essential functionalities to maintain consistency and verify compliance of these network security policies across the entire cloud.

3. Continuous Vulnerability Management and Patching

Ransomware often infiltrates systems by exploiting known software vulnerabilities. Therefore, continuous vulnerability scanning and patching for all software, including operating systems, middleware, and applications, are fundamental yet crucial defense measures. Integrating vulnerability scanning into the CI/CD pipeline is important to identify and eliminate potential risks before deployment.

For example, tools like Trivy can be used to scan for vulnerabilities during container image builds.


docker build -t my-app:latest .
trivy image my-app:latest

This process ensures the security quality of all deployed images, and FRIIM CWPP helps continuously monitor and manage vulnerabilities in container images and runtime environments.

4. Building Robust Detection and Response Systems

Completely preventing intrusion is realistically difficult. Therefore, it is crucial to build systems that can detect anomalous behavior and respond quickly in the early stages of an attack. Key detection points include:

  • Log Collection and Analysis: All system, network device, and application logs must be centrally collected and analyzed.
  • Behavior-based Detection: Detect abnormal process execution, file access patterns, network connection attempts, etc.
  • Data Exfiltration Detection: Monitor abnormal attempts to transfer sensitive data externally.

Seekurity SIEM collects, normalizes, and analyzes large volumes of log data in real-time to detect anomalous indicators related to ransomware TTPs. For example, rules can be applied to detect mass file encryption attempts within a short period or abnormal communication with external servers. Based on these detection results, Seekurity SOAR executes automated response playbooks, enabling swift actions such as isolating infected systems, disabling accounts, and restoring backups. KYRA AI Sandbox can safely execute and analyze unknown ransomware samples or suspicious files to provide in-depth insights into zero-day attacks.

Below is a conceptual example of a general rule set to detect common ransomware behaviors (e.g., VSS (Volume Shadow Copy Service) deletion).


title: Detect VSS Shadow Copies Deletion
status: stable
author: Your Security Team
date: 2024/07/26
logsource:
  product: windows
  service: sysmon
  category: process_creation
detection:
  selection:
    Image|endswith:
      - '\vssadmin.exe'
    CommandLine|contains:
      - 'delete shadows'
      - 'delete shadowstorage'
  condition: selection
level: high

Rules like the example above, applied in Seekurity SIEM, can effectively detect attempts by ransomware attackers to delete system restore points, a common tactic. This detection capability is essential for generating early warnings before an attack can spread.

Troubleshooting and Precautions

The most common problem in ransomware response is the absence or vulnerability of 'backups'. Many companies believe they have backups, but it's common for recovery to be impossible during an actual attack, or for the backup data itself to be encrypted. Therefore, backup systems must either be network and physically isolated (air-gapped backup) or configured to be immutable using Immutable Storage. Furthermore, regular backup recovery tests must be conducted to verify actual recovery feasibility.

Another precaution is the understanding that 'security solutions alone are not enough.' Even the best security solution can become useless if misconfigured or poorly managed. Security must be accompanied not only by technical aspects but also by organizational processes, employee training, and continuous auditing and improvement. Particularly, strengthening security awareness training for employees is crucial to prepare for social engineering attacks.

Practical Application: Cloud-Based Infrastructure Protection Case Study

Recently, cloud-based startup Company A experienced an initial intrusion due to an open RDP port and weak passwords. The attacker subsequently attempted to steal administrator credentials for a Kubernetes cluster via lateral movement and proceeded to access the sensitive data storage database. During this process, Company A was able to detect the threat early and prevent its spread by leveraging SeekersLab's integrated security solutions.

  • Proactive Defense: Through FRIIM CSPM/CNAPP, unnecessary exposure of RDP ports was detected, and RBAC settings for the Kubernetes cluster were strengthened to apply the principle of least privilege. Furthermore, security configurations for all cloud resources were continuously checked for compliance with CIS Benchmarks.
  • Detection and Analysis: Seekurity SIEM detected abnormal RDP login attempts and privilege escalation attempts within the cluster in real-time, generating alerts. KYRA AI Sandbox analyzed suspicious script files that the attacker attempted to upload, classifying them as unknown malicious code.
  • Response: Upon an alert, Seekurity SOAR immediately executed automated playbooks to forcibly terminate the RDP session and temporarily disable suspicious accounts. Additionally, it dynamically updated the cluster's Network Policies to block external communication and swiftly thwart potential lateral movement.

By implementing these integrated solutions, Company A was able to intercept the ransomware attack in its early stages, before it could lead to data exfiltration or system encryption. This played a crucial role in minimizing service downtime and financial losses due to security incidents. In essence, it demonstrated that the organic interlinking of proactive prevention, real-time detection, and automated response is key to successful defense.

Future Ransomware Threat Outlook and Preparation

Ransomware groups are expected to continuously evolve their methods, utilizing Artificial Intelligence (AI) and Machine Learning (ML) technologies to conduct more sophisticated phishing attacks, generate new forms of malware, and bypass defense systems. The proliferation of cloud environments and DevOps pipelines, in particular, can further expand the attack surface, and ransomware attacks targeting OT (Operational Technology) and IoT devices are also likely to increase.

To prepare for this, it is necessary to go beyond simply relying on existing security solutions. Organizations must actively leverage Threat Intelligence, adopt AI/ML-based anomaly detection systems to proactively respond to unpredictable attacks. Furthermore, efforts are needed to strengthen supply chain security and establish a DevSecOps culture to embed security from the early stages of development. Fully adopting a Zero Trust architecture, applying the principle of 'never trust, always verify' to all systems, will be an essential long-term preparedness measure.

Conclusion: Countering Ransomware Threats with an Integrated Approach

The activities of ransomware groups like Maze, Conti, DarkSide, and Ryuk have clearly demonstrated the critical importance of cybersecurity in the modern digital environment. To counter their sophisticated and organized attacks, an integrated and multi-layered security strategy is essential, rather than fragmented security solutions.

  • Initial Intrusion Defense: Strong authentication and access control, along with continuous vulnerability management, play a crucial role in minimizing the attack surface.
  • Internal Spread Prevention: Network segmentation and micro-segmentation effectively thwart lateral movement.
  • Rapid Detection and Response: Integrated solutions like Seekurity SIEM/SOAR and KYRA AI Sandbox enable real-time threat detection and automated response to minimize damage.
  • Enhanced Cloud Environment Security: FRIIM CNAPP/CSPM/CWPP can proactively prevent misconfigurations in cloud infrastructure and strengthen the security of container workloads.

Businesses must now view ransomware attacks not as mere incidents but as significant risks threatening business continuity, and build proactive defense postures. By leveraging SeekersLab's integrated security solutions, organizations can strengthen these defense capabilities and flexibly respond to changing threat landscapes, ultimately achieving a secure and robust IT infrastructure. Continuous security enhancement and learning about the latest technological trends will be the most reliable ways to prepare for future threats.

最新情報を受け取る

最新のセキュリティインサイトをメールでお届けします。