Velociraptor DFIR Tool Abused in LockBit and Babuk Ransomware Campaigns
Summary
Hide ▲
Show ▼
Threat actors, assessed to be China-based Storm-2603, have started using the Velociraptor digital forensics and incident response (DFIR) tool in ransomware attacks deploying LockBit and Babuk ransomware. The attackers exploited a privilege escalation vulnerability in an outdated version of Velociraptor to gain persistent access and control over virtual machines. The campaign involved creating local admin accounts, disabling security features, and using fileless PowerShell encryptors for data exfiltration and encryption. The ransomware deployed on Windows systems was identified as LockBit, while a Linux binary detected as Babuk ransomware was found on VMware ESXi systems. Storm-2603 initially exploited SharePoint vulnerabilities in July 2025 and deployed Warlock, LockBit, and Babuk ransomware on VMware ESXi servers in August 2025. Sophos CTU researchers first documented Velociraptor abuse by Storm-2603 on August 5, 2025. Storm-2603 used the ToolShell exploit to gain initial access and deployed an outdated version of Velociraptor (version 0.73.4.0) that is susceptible to a privilege escalation vulnerability (CVE-2025-6264) to enable arbitrary command execution and endpoint takeover. The group also used Smbexec to remotely launch programs using the SMB protocol and modified Active Directory (AD) Group Policy Objects (GPOs) to disable real-time protection. Storm-2603 established the infrastructure for the AK47 C2 framework in March 2025 and created the first prototype of the tool the next month. The group pivoted from LockBit-only deployment to dual LockBit/Warlock deployment in April 2025 and used the ToolShell exploit as a zero-day in July 2025. Storm-2603 demonstrated operational flexibility and sophisticated builder expertise using leaked and open-source ransomware frameworks. In a recent breach, SmarterTools confirmed that the Warlock ransomware gang breached its network on January 29, 2026, via a single SmarterMail virtual machine (VM) set up by an employee. The vulnerability exploited in the attack to gain access is CVE-2026-23760, an authentication bypass flaw in SmarterMail before Build 9518, which allows resetting administrator passwords and obtaining full privileges. The attackers moved laterally from that one vulnerable VM via Active Directory, using Windows-centric tooling and persistence methods. The ransomware operators waited roughly a week after gaining initial access, the final stage being encryption of all reachable machines. Sentinel One security products reportedly stopped the final payload from performing encryption, the impacted systems were isolated, and data was restored from fresh backups. Tools used in the attacks include Velociraptor, SimpleHelp, and vulnerable versions of WinRAR, while startup items and scheduled tasks were also used for persistence. ReliaQuest reported that Storm-2603 chains CVE-2026-23760 access with the software’s built-in 'Volume Mount' feature to gain full system control. ReliaQuest also saw probes for CVE-2026-24423, another SmarterMail flaw flagged by CISA as actively exploited by ransomware actors, although the primary vector was CVE-2026-23760.
Timeline
-
11.10.2025 16:04 1 articles · 4mo ago
Storm-2603 Establishes AK47 C2 Framework and Demonstrates Operational Flexibility
Storm-2603 established the infrastructure for the AK47 C2 framework in March 2025 and created the first prototype of the tool the next month. The group pivoted from LockBit-only deployment to dual LockBit/Warlock deployment in April 2025 and used the ToolShell exploit as a zero-day in July 2025. Storm-2603 demonstrated operational flexibility and sophisticated builder expertise using leaked and open-source ransomware frameworks. The group used operational security (OPSEC) measures, such as stripped timestamps and intentionally corrupted expiration mechanisms, and compiled ransomware payloads at 22:58-22:59 China Standard Time, packaging them into a malicious installer at 01:55 the next morning. Storm-2603 used consistent contact information and shared, misspelled domains across Warlock, LockBit, and Babuk deployments, demonstrating cohesive command-and-control (C2) operations.
Show sources
- Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks — thehackernews.com — 11.10.2025 16:04
-
09.10.2025 22:31 5 articles · 4mo ago
Storm-2603 Group Exploits Velociraptor Vulnerability in Ransomware Attacks
Storm-2603 initially exploited SharePoint vulnerabilities in July 2025 and deployed Warlock, LockBit, and Babuk ransomware on VMware ESXi servers in August 2025. Sophos CTU researchers first documented Velociraptor abuse by Storm-2603 on August 5, 2025. The group switched to using a new C2 domain on Cloudflare's workers.dev service after Sophos' August report. Velociraptor abuse was detected through behavioral detections in the Sophos Endpoint platform. Storm-2603 used the ToolShell exploit to gain initial access and deployed an outdated version of Velociraptor (version 0.73.4.0) that is susceptible to a privilege escalation vulnerability (CVE-2025-6264) to enable arbitrary command execution and endpoint takeover. The group also used Smbexec to remotely launch programs using the SMB protocol and modified Active Directory (AD) Group Policy Objects (GPOs) to disable real-time protection. In a recent breach, SmarterTools confirmed that the Warlock ransomware gang breached its network on January 29, 2026, via a single SmarterMail virtual machine (VM) set up by an employee. The vulnerability exploited in the attack to gain access is CVE-2026-23760, an authentication bypass flaw in SmarterMail before Build 9518, which allows resetting administrator passwords and obtaining full privileges. The attackers moved laterally from that one vulnerable VM via Active Directory, using Windows-centric tooling and persistence methods. The ransomware operators waited roughly a week after gaining initial access, the final stage being encryption of all reachable machines. Sentinel One security products reportedly stopped the final payload from performing encryption, the impacted systems were isolated, and data was restored from fresh backups. Tools used in the attacks include Velociraptor, SimpleHelp, and vulnerable versions of WinRAR, while startup items and scheduled tasks were also used for persistence. ReliaQuest reported that Storm-2603 chains CVE-2026-23760 access with the software’s built-in 'Volume Mount' feature to gain full system control. ReliaQuest also saw probes for CVE-2026-24423, another SmarterMail flaw flagged by CISA as actively exploited by ransomware actors, although the primary vector was CVE-2026-23760. The breach did not affect SmarterTools' website, shopping cart, My Account portal, or several other services, and no business applications or account data were compromised. About 12 Windows servers on the company's office network, as well as a secondary data center used for quality control (QC) tests, were confirmed to be affected. Hosted customers using SmarterTrack were the most affected, not due to any issue within SmarterTrack itself, but because that environment was more easily accessible once the network was breached. The attackers waited for approximately 6–7 days after gaining initial access to take control of the Active Directory server and create new users, followed by dropping additional payloads like Velociraptor and the locker to encrypt files. The attackers used a malicious MSI installer ("v4.msi") downloaded from Supabase, a legitimate cloud-based backend platform, to install Velociraptor. The attackers abused legitimate features (password resets and drive mounting) to blend in with typical administrative workflows, helping them avoid detection.
Show sources
- Hackers now use Velociraptor DFIR tool in ransomware attacks — www.bleepingcomputer.com — 09.10.2025 22:31
- Chinese Hackers Use Velociraptor IR Tool in Ransomware Attacks — www.darkreading.com — 10.10.2025 18:53
- Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks — thehackernews.com — 11.10.2025 16:04
- Hackers breach SmarterTools network using flaw in its own software — www.bleepingcomputer.com — 09.02.2026 21:08
- Warlock Ransomware Breaches SmarterTools Through Unpatched SmarterMail Server — thehackernews.com — 10.02.2026 12:24
Information Snippets
-
Velociraptor, an open-source DFIR tool, was used by threat actors to gain persistent access and control over virtual machines.
First reported: 09.10.2025 22:313 sources, 4 articlesShow sources
- Hackers now use Velociraptor DFIR tool in ransomware attacks — www.bleepingcomputer.com — 09.10.2025 22:31
- Chinese Hackers Use Velociraptor IR Tool in Ransomware Attacks — www.darkreading.com — 10.10.2025 18:53
- Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks — thehackernews.com — 11.10.2025 16:04
- Hackers breach SmarterTools network using flaw in its own software — www.bleepingcomputer.com — 09.02.2026 21:08
-
The attackers exploited CVE-2025-6264, a privilege escalation vulnerability in Velociraptor version 0.73.4.0, to execute arbitrary commands and take control of the host.
First reported: 09.10.2025 22:313 sources, 4 articlesShow sources
- Hackers now use Velociraptor DFIR tool in ransomware attacks — www.bleepingcomputer.com — 09.10.2025 22:31
- Chinese Hackers Use Velociraptor IR Tool in Ransomware Attacks — www.darkreading.com — 10.10.2025 18:53
- Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks — thehackernews.com — 11.10.2025 16:04
- Hackers breach SmarterTools network using flaw in its own software — www.bleepingcomputer.com — 09.02.2026 21:08
-
The threat actors created local admin accounts synced to Entra ID and accessed the VMware vSphere console for persistent control.
First reported: 09.10.2025 22:313 sources, 3 articlesShow sources
- Hackers now use Velociraptor DFIR tool in ransomware attacks — www.bleepingcomputer.com — 09.10.2025 22:31
- Chinese Hackers Use Velociraptor IR Tool in Ransomware Attacks — www.darkreading.com — 10.10.2025 18:53
- Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks — thehackernews.com — 11.10.2025 16:04
-
The attackers disabled Defender real-time protection and monitoring features by modifying Active Directory GPOs.
First reported: 09.10.2025 22:313 sources, 4 articlesShow sources
- Hackers now use Velociraptor DFIR tool in ransomware attacks — www.bleepingcomputer.com — 09.10.2025 22:31
- Chinese Hackers Use Velociraptor IR Tool in Ransomware Attacks — www.darkreading.com — 10.10.2025 18:53
- Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks — thehackernews.com — 11.10.2025 16:04
- Hackers breach SmarterTools network using flaw in its own software — www.bleepingcomputer.com — 09.02.2026 21:08
-
The ransomware deployed on Windows systems was identified as LockBit, using the file extension '.xlockxlock' seen in Warlock ransomware attacks.
First reported: 09.10.2025 22:313 sources, 4 articlesShow sources
- Hackers now use Velociraptor DFIR tool in ransomware attacks — www.bleepingcomputer.com — 09.10.2025 22:31
- Chinese Hackers Use Velociraptor IR Tool in Ransomware Attacks — www.darkreading.com — 10.10.2025 18:53
- Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks — thehackernews.com — 11.10.2025 16:04
- Hackers breach SmarterTools network using flaw in its own software — www.bleepingcomputer.com — 09.02.2026 21:08
-
A Linux binary detected as Babuk ransomware was found on VMware ESXi systems.
First reported: 09.10.2025 22:313 sources, 4 articlesShow sources
- Hackers now use Velociraptor DFIR tool in ransomware attacks — www.bleepingcomputer.com — 09.10.2025 22:31
- Chinese Hackers Use Velociraptor IR Tool in Ransomware Attacks — www.darkreading.com — 10.10.2025 18:53
- Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks — thehackernews.com — 11.10.2025 16:04
- Hackers breach SmarterTools network using flaw in its own software — www.bleepingcomputer.com — 09.02.2026 21:08
-
The attackers used a fileless PowerShell encryptor to generate random AES keys for mass encryption on Windows machines.
First reported: 09.10.2025 22:312 sources, 2 articlesShow sources
- Hackers now use Velociraptor DFIR tool in ransomware attacks — www.bleepingcomputer.com — 09.10.2025 22:31
- Chinese Hackers Use Velociraptor IR Tool in Ransomware Attacks — www.darkreading.com — 10.10.2025 18:53
-
Before encrypting data, the attackers used a PowerShell script to exfiltrate files for double-extortion purposes, inserting delays to evade detection.
First reported: 09.10.2025 22:312 sources, 2 articlesShow sources
- Hackers now use Velociraptor DFIR tool in ransomware attacks — www.bleepingcomputer.com — 09.10.2025 22:31
- Chinese Hackers Use Velociraptor IR Tool in Ransomware Attacks — www.darkreading.com — 10.10.2025 18:53
-
Storm-2603, also known as Gold Salem, initially exploited SharePoint vulnerabilities in July 2025.
First reported: 10.10.2025 18:532 sources, 2 articlesShow sources
- Chinese Hackers Use Velociraptor IR Tool in Ransomware Attacks — www.darkreading.com — 10.10.2025 18:53
- Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks — thehackernews.com — 11.10.2025 16:04
-
Storm-2603 deployed Warlock, LockBit, and Babuk ransomware on VMware ESXi servers in August 2025.
First reported: 10.10.2025 18:532 sources, 2 articlesShow sources
- Chinese Hackers Use Velociraptor IR Tool in Ransomware Attacks — www.darkreading.com — 10.10.2025 18:53
- Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks — thehackernews.com — 11.10.2025 16:04
-
Velociraptor was first observed being abused by Storm-2603 in August 2025.
First reported: 10.10.2025 18:533 sources, 3 articlesShow sources
- Chinese Hackers Use Velociraptor IR Tool in Ransomware Attacks — www.darkreading.com — 10.10.2025 18:53
- Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks — thehackernews.com — 11.10.2025 16:04
- Hackers breach SmarterTools network using flaw in its own software — www.bleepingcomputer.com — 09.02.2026 21:08
-
Sophos CTU researchers first documented Velociraptor abuse by Storm-2603 on August 5, 2025.
First reported: 10.10.2025 18:532 sources, 2 articlesShow sources
- Chinese Hackers Use Velociraptor IR Tool in Ransomware Attacks — www.darkreading.com — 10.10.2025 18:53
- Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks — thehackernews.com — 11.10.2025 16:04
-
Storm-2603 switched to using a new C2 domain on Cloudflare's workers.dev service after Sophos' August report.
First reported: 10.10.2025 18:531 source, 1 articleShow sources
- Chinese Hackers Use Velociraptor IR Tool in Ransomware Attacks — www.darkreading.com — 10.10.2025 18:53
-
Velociraptor abuse by Storm-2603 was detected through behavioral detections in the Sophos Endpoint platform.
First reported: 10.10.2025 18:531 source, 1 articleShow sources
- Chinese Hackers Use Velociraptor IR Tool in Ransomware Attacks — www.darkreading.com — 10.10.2025 18:53
-
Rapid7 acknowledged that attackers can modify Velociraptor to remove IoCs, but such binaries will be unsigned or signed by another entity.
First reported: 10.10.2025 18:531 source, 1 articleShow sources
- Chinese Hackers Use Velociraptor IR Tool in Ransomware Attacks — www.darkreading.com — 10.10.2025 18:53
-
Rapid7 has implemented detections for Velociraptor misuse and is not impacted by the reported incidents.
First reported: 10.10.2025 18:532 sources, 2 articlesShow sources
- Chinese Hackers Use Velociraptor IR Tool in Ransomware Attacks — www.darkreading.com — 10.10.2025 18:53
- Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks — thehackernews.com — 11.10.2025 16:04
-
Storm-2603 used Smbexec to remotely launch programs using the SMB protocol.
First reported: 11.10.2025 16:041 source, 1 articleShow sources
- Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks — thehackernews.com — 11.10.2025 16:04
-
Storm-2603 modified Active Directory (AD) Group Policy Objects (GPOs) to disable real-time protection.
First reported: 11.10.2025 16:041 source, 1 articleShow sources
- Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks — thehackernews.com — 11.10.2025 16:04
-
Storm-2603 used the ToolShell exploit to gain initial access.
First reported: 11.10.2025 16:041 source, 1 articleShow sources
- Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks — thehackernews.com — 11.10.2025 16:04
-
Storm-2603 established the infrastructure for the AK47 C2 framework in March 2025.
First reported: 11.10.2025 16:041 source, 1 articleShow sources
- Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks — thehackernews.com — 11.10.2025 16:04
-
Storm-2603 created the first prototype of the AK47 C2 framework in April 2025.
First reported: 11.10.2025 16:041 source, 1 articleShow sources
- Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks — thehackernews.com — 11.10.2025 16:04
-
Storm-2603 pivoted from LockBit-only deployment to dual LockBit/Warlock deployment in April 2025.
First reported: 11.10.2025 16:041 source, 1 articleShow sources
- Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks — thehackernews.com — 11.10.2025 16:04
-
Storm-2603 used the ToolShell exploit as a zero-day in July 2025.
First reported: 11.10.2025 16:041 source, 1 articleShow sources
- Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks — thehackernews.com — 11.10.2025 16:04
-
Storm-2603 deployed Babuk ransomware starting July 21, 2025.
First reported: 11.10.2025 16:041 source, 1 articleShow sources
- Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks — thehackernews.com — 11.10.2025 16:04
-
Storm-2603 demonstrated operational flexibility and sophisticated builder expertise using leaked and open-source ransomware frameworks.
First reported: 11.10.2025 16:042 sources, 2 articlesShow sources
- Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks — thehackernews.com — 11.10.2025 16:04
- Hackers breach SmarterTools network using flaw in its own software — www.bleepingcomputer.com — 09.02.2026 21:08
-
Storm-2603 used operational security (OPSEC) measures, such as stripped timestamps and intentionally corrupted expiration mechanisms.
First reported: 11.10.2025 16:041 source, 1 articleShow sources
- Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks — thehackernews.com — 11.10.2025 16:04
-
Storm-2603 compiled ransomware payloads at 22:58-22:59 China Standard Time and packaged them into a malicious installer at 01:55 the next morning.
First reported: 11.10.2025 16:041 source, 1 articleShow sources
- Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks — thehackernews.com — 11.10.2025 16:04
-
Storm-2603 used consistent contact information and shared, misspelled domains across Warlock, LockBit, and Babuk deployments.
First reported: 11.10.2025 16:041 source, 1 articleShow sources
- Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks — thehackernews.com — 11.10.2025 16:04
-
Storm-2603 demonstrated 48-hour development cycles for feature additions, reflective of structured team workflows.
First reported: 11.10.2025 16:041 source, 1 articleShow sources
- Hackers Turn Velociraptor DFIR Tool Into Weapon in LockBit Ransomware Attacks — thehackernews.com — 11.10.2025 16:04
-
SmarterTools confirmed that the Warlock ransomware gang breached its network on January 29, 2026, via a single SmarterMail virtual machine (VM) set up by an employee.
First reported: 09.02.2026 21:082 sources, 2 articlesShow sources
- Hackers breach SmarterTools network using flaw in its own software — www.bleepingcomputer.com — 09.02.2026 21:08
- Warlock Ransomware Breaches SmarterTools Through Unpatched SmarterMail Server — thehackernews.com — 10.02.2026 12:24
-
The vulnerability exploited in the attack to gain access is CVE-2026-23760, an authentication bypass flaw in SmarterMail before Build 9518, which allows resetting administrator passwords and obtaining full privileges.
First reported: 09.02.2026 21:082 sources, 2 articlesShow sources
- Hackers breach SmarterTools network using flaw in its own software — www.bleepingcomputer.com — 09.02.2026 21:08
- Warlock Ransomware Breaches SmarterTools Through Unpatched SmarterMail Server — thehackernews.com — 10.02.2026 12:24
-
The attackers moved laterally from that one vulnerable VM via Active Directory, using Windows-centric tooling and persistence methods.
First reported: 09.02.2026 21:082 sources, 2 articlesShow sources
- Hackers breach SmarterTools network using flaw in its own software — www.bleepingcomputer.com — 09.02.2026 21:08
- Warlock Ransomware Breaches SmarterTools Through Unpatched SmarterMail Server — thehackernews.com — 10.02.2026 12:24
-
The ransomware operators waited roughly a week after gaining initial access, the final stage being encryption of all reachable machines.
First reported: 09.02.2026 21:081 source, 1 articleShow sources
- Hackers breach SmarterTools network using flaw in its own software — www.bleepingcomputer.com — 09.02.2026 21:08
-
Sentinel One security products reportedly stopped the final payload from performing encryption, the impacted systems were isolated, and data was restored from fresh backups.
First reported: 09.02.2026 21:081 source, 1 articleShow sources
- Hackers breach SmarterTools network using flaw in its own software — www.bleepingcomputer.com — 09.02.2026 21:08
-
Tools used in the attacks include Velociraptor, SimpleHelp, and vulnerable versions of WinRAR, while startup items and scheduled tasks were also used for persistence.
First reported: 09.02.2026 21:082 sources, 2 articlesShow sources
- Hackers breach SmarterTools network using flaw in its own software — www.bleepingcomputer.com — 09.02.2026 21:08
- Warlock Ransomware Breaches SmarterTools Through Unpatched SmarterMail Server — thehackernews.com — 10.02.2026 12:24
-
ReliaQuest reported that Storm-2603 chains CVE-2026-23760 access with the software’s built-in 'Volume Mount' feature to gain full system control.
First reported: 09.02.2026 21:082 sources, 2 articlesShow sources
- Hackers breach SmarterTools network using flaw in its own software — www.bleepingcomputer.com — 09.02.2026 21:08
- Warlock Ransomware Breaches SmarterTools Through Unpatched SmarterMail Server — thehackernews.com — 10.02.2026 12:24
-
ReliaQuest also saw probes for CVE-2026-24423, another SmarterMail flaw flagged by CISA as actively exploited by ransomware actors, although the primary vector was CVE-2026-23760.
First reported: 09.02.2026 21:082 sources, 2 articlesShow sources
- Hackers breach SmarterTools network using flaw in its own software — www.bleepingcomputer.com — 09.02.2026 21:08
- Warlock Ransomware Breaches SmarterTools Through Unpatched SmarterMail Server — thehackernews.com — 10.02.2026 12:24
-
The Warlock ransomware gang breached SmarterTools' network on January 29, 2026, through an unpatched SmarterMail virtual machine (VM) set up by an employee.
First reported: 10.02.2026 12:241 source, 1 articleShow sources
- Warlock Ransomware Breaches SmarterTools Through Unpatched SmarterMail Server — thehackernews.com — 10.02.2026 12:24
-
The breach did not affect SmarterTools' website, shopping cart, My Account portal, or several other services, and no business applications or account data were compromised.
First reported: 10.02.2026 12:241 source, 1 articleShow sources
- Warlock Ransomware Breaches SmarterTools Through Unpatched SmarterMail Server — thehackernews.com — 10.02.2026 12:24
-
About 12 Windows servers on the company's office network, as well as a secondary data center used for quality control (QC) tests, were confirmed to be affected.
First reported: 10.02.2026 12:241 source, 1 articleShow sources
- Warlock Ransomware Breaches SmarterTools Through Unpatched SmarterMail Server — thehackernews.com — 10.02.2026 12:24
-
Hosted customers using SmarterTrack were the most affected, not due to any issue within SmarterTrack itself, but because that environment was more easily accessible once the network was breached.
First reported: 10.02.2026 12:241 source, 1 articleShow sources
- Warlock Ransomware Breaches SmarterTools Through Unpatched SmarterMail Server — thehackernews.com — 10.02.2026 12:24
-
The attackers waited for approximately 6–7 days after gaining initial access to take control of the Active Directory server and create new users, followed by dropping additional payloads like Velociraptor and the locker to encrypt files.
First reported: 10.02.2026 12:241 source, 1 articleShow sources
- Warlock Ransomware Breaches SmarterTools Through Unpatched SmarterMail Server — thehackernews.com — 10.02.2026 12:24
-
The attackers used a malicious MSI installer ("v4.msi") downloaded from Supabase, a legitimate cloud-based backend platform, to install Velociraptor.
First reported: 10.02.2026 12:241 source, 1 articleShow sources
- Warlock Ransomware Breaches SmarterTools Through Unpatched SmarterMail Server — thehackernews.com — 10.02.2026 12:24
-
The attackers abused legitimate features (password resets and drive mounting) to blend in with typical administrative workflows, helping them avoid detection.
First reported: 10.02.2026 12:241 source, 1 articleShow sources
- Warlock Ransomware Breaches SmarterTools Through Unpatched SmarterMail Server — thehackernews.com — 10.02.2026 12:24
Similar Happenings
eScan Antivirus Supply Chain Compromise Delivers Signed Malware
A supply chain compromise in eScan antivirus products led to the distribution of multi-stage malware via legitimate update channels on January 20, 2026. The malware, signed with a compromised eScan certificate, established persistence, enabled remote access, and blocked further updates. Morphisec Threat Labs detected and mitigated the attack, while eScan took its update system offline for remediation. The malware modified system files and registry settings to prevent automatic remediation and communicated with external C2 infrastructure. Affected organizations are advised to search for malicious files, review scheduled tasks, inspect registry keys, block C2 domains, and revoke the compromised certificate. The breach was limited to a two-hour window on January 20, 2026, affecting only customers downloading updates from a specific regional update cluster. eScan detected the issue internally through monitoring and customer reports on January 20, isolated the affected infrastructure within hours, and issued a security advisory on January 21. eScan disputes Morphisec's claims of being the first to discover or report the incident, stating it conducted proactive notifications and direct outreach to impacted customers. The incident did not involve a vulnerability in the eScan product itself but was due to unauthorized access to a regional update server configuration. The malicious update was signed with what appears to be eScan's code-signing certificate, but both Windows and VirusTotal show the signature as invalid. The command and control servers observed include hxxps://vhs.delrosal.net/i, hxxps://tumama.hns.to, hxxps://blackice.sol-domain.org, hxxps://codegiant.io/dd/dd/dd.git/download/main/middleware.ts, 504e1a42.host.njalla.net, and 185.241.208.115.
CyberVolk's VolkLocker ransomware flaw allows free decryption
CyberVolk, a pro-Russia hacktivist group, launched VolkLocker ransomware-as-a-service (RaaS) with a critical cryptographic flaw. The ransomware uses a hardcoded master key stored in plaintext, enabling victims to decrypt files without paying the ransom. VolkLocker targets both Linux/VMware ESXi and Windows systems and includes a timer function that wipes user folders if the ransom is not paid. The group also offers a remote access trojan and a keylogger for sale. The flaw in VolkLocker's cryptography was discovered by SentinelOne researchers, who noted that the master key is written to a plaintext file in the %TEMP% folder, allowing victims to recover their files. This weakness undermines the ransomware's effectiveness and highlights the group's inexperience in cybercrime operations. VolkLocker is written in Golang and attempts to escalate privileges and perform reconnaissance and system enumeration. It makes Windows Registry modifications to thwart recovery and analysis, deletes volume shadow copies, and terminates processes associated with Microsoft Defender Antivirus and other common analysis tools. The ransomware uses an enforcement timer that wipes the content of user folders if victims fail to pay within 48 hours or enter the wrong decryption key three times. VolkLocker payloads come with built-in Telegram automation for command-and-control, allowing users to message victims, initiate file decryption, list active victims, and get system information.
DeadLock Ransomware Campaign Uses BYOVD to Evade Security Tools
A financially motivated threat actor has been observed deploying DeadLock ransomware using a Bring Your Own Vulnerable Driver (BYOVD) technique to disable endpoint detection tools and achieve full system compromise. The attack involved privilege-escalation scripts, registry modifications, remote access tools (RATs), and a custom encryption routine. The ransomware targeted various applications and services while avoiding critical system files to maintain system functionality for ransom negotiations. Victims were instructed to pay ransom in Bitcoin or Monero via Session Messenger. The latest DeadLock samples observed by Group-IB include an HTML file used to communicate with victims through the Session encrypted messaging platform. Instead of relying on hard-coded servers, the malware retrieves proxy addresses stored inside a Polygon smart contract. This approach uses read-only calls that do not generate transactions or incur network fees, complicating traditional blocking approaches. The JavaScript code within the calls queries a specific Polygon smart contract to obtain the current proxy URL, which then relays encrypted messages between the victim and the attacker’s Session ID.
Storm-0249 Adopts Advanced Tactics for Ransomware Attacks
Storm-0249, previously known as an initial access broker, has escalated its operations by employing advanced tactics such as domain spoofing, DLL sideloading, and fileless PowerShell execution to facilitate ransomware attacks. These methods allow the threat actor to bypass defenses, infiltrate networks, maintain persistence, and operate undetected. The group has shifted from mass phishing campaigns to more precise attacks, leveraging the trust associated with signed processes for added stealth. The ultimate goal is to obtain persistent access to enterprise networks and monetize them by selling access to ransomware gangs.
Kraken Ransomware Implements System Benchmarking for Encryption Optimization
Kraken ransomware, active since early 2025 and linked to the defunct HelloKitty operation, benchmarks systems to determine optimal encryption methods. The ransomware targets Windows, Linux, and VMware ESXi systems, using temporary files to decide between full or partial encryption. Kraken employs SMB vulnerabilities for initial access, deploys Cloudflared and SSHFS for data exfiltration, and encrypts data based on system performance to avoid detection. Victims include organizations in the US, UK, Canada, Panama, Kuwait, and Denmark. Kraken also operates a cybercrime forum, 'The Last Haven Board,' and demands ransoms up to $1 million in Bitcoin. The group was observed in August 2025 by Cisco Talos, detailing intrusions where SMB flaws were abused for entry, followed by the use of Cloudflare for persistence and SSHFS for data theft before encryption.