CyberHappenings logo

Track cybersecurity events as they unfold. Sourced timelines. Filter, sort, and browse. Fast, privacy‑respecting. No invasive ads, no tracking.

Osiris Ransomware Leverages POORTRY Driver in BYOVD Attack

First reported
Last updated
1 unique sources, 1 articles

Summary

Hide ▲

A new ransomware family called Osiris has emerged, targeting a major food service franchisee operator in Southeast Asia in November 2025. The attack utilized a malicious driver named POORTRY as part of a bring your own vulnerable driver (BYOVD) technique to disable security software. Osiris employs a hybrid encryption scheme and is assessed to be a new strain with no links to the 2016 Locky ransomware variant of the same name. The attackers exfiltrated data to Wasabi cloud storage and used dual-use tools like Netscan, Netexec, and MeshAgent, along with a custom version of Rustdesk remote desktop software. The attack also involved enabling RDP for remote access and deploying the KillAV tool to terminate security processes.

Timeline

  1. 22.01.2026 20:00 1 articles · 23h ago

    Osiris Ransomware Targets Food Service Franchisee in Southeast Asia

    In November 2025, the Osiris ransomware targeted a major food service franchisee operator in Southeast Asia. The attack leveraged the POORTRY driver in a BYOVD technique to disable security software. The attackers exfiltrated data to Wasabi cloud storage and used dual-use tools like Netscan, Netexec, and MeshAgent, along with a custom version of Rustdesk remote desktop software. The attack also involved enabling RDP for remote access and deploying the KillAV tool to terminate security processes.

    Show sources

Information Snippets