WHAT ATTACK USES RYUK? UNDERSTANDING ITS THREAT TO MODERN CYBERSECURITY