Global shipping and ecommerce giant Pitney Bowes revealed on Thursday that the recent service disruptions were caused by a piece of ransomware known as Ryuk.
The company informed customers on Monday that some services had been unavailable due to a piece of ransomware that encrypted files on some systems. I an update shared on Thursday, the company described the security incident as “the Ryuk virus malware attack.”
The incident impacted the company’s mailing services, customer account access, the supplies web store, Software and Data Marketplace downloads, and some commerce services.
Pitney Bowes says it has made significant progress in restoring affected systems, and many services are now fully functional.
The Ryuk ransomware emerged in the summer of 2018 and researchers initially found some evidence suggesting that the malware may have been developed by North Korean hackers. However, further research showed that the initial attribution to North Korea was likely incorrect.
Ryuk has hit a wide range of organizations. It’s said to have been used in the attack on Chicago-based Tribune Publishing, an incident that resulted in the LA Times, New York Times, and Wall Street Journal newspapers being delivered late.
The ransomware also hit a cloud hosting provider and some U.S. cities, some of which have agreed to pay hundreds of thousands of dollars to recover their files.
Related: ‘Coordinated’ Ransomware Attack Hits 23 Towns in Texas
Related: Network Shares Are a Primary Target for Ransomware
Related: The Growing Threat of Targeted Ransomware

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Critical TorchServe Flaws Could Expose AI Infrastructure of Major Companies
- Cybersecurity M&A Roundup: 28 Deals Announced in September 2023
- Companies Address Impact of Exploited Libwebp Vulnerability
- Number of Internet-Exposed ICS Drops Below 100,000: Report
- Unpatched Exim Vulnerabilities Expose Many Mail Servers to Attacks
- Recently Patched TeamCity Vulnerability Exploited to Hack Servers
- CISA Warns of Old JBoss RichFaces Vulnerability Being Exploited in Attacks
- NIST Publishes Final Version of 800-82r3 OT Security Guide
Latest News
- Synqly Joins Race to Fix Security, Infrastructure Product Integrations
- ZDI Discusses First Automotive Pwn2Own
- Critical TorchServe Flaws Could Expose AI Infrastructure of Major Companies
- US Executives Targeted in Phishing Attacks Exploiting Flaw in Indeed Job Platform
- Actor Tom Hanks Warns of Ad With AI Imposter
- Network, Meet Cloud; Cloud, Meet Network
- Dozens of Malicious NPM Packages Steal User, System Data
- Motel One Discloses Ransomware Attack Impacting Customer Data
