Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Osiris Ransomware Using Wide Range of Living off the Land and Dual-use Tools in Attacks

New Osiris Ransomware Using Wide Range of Living off the Land and Dual-use Tools in Attacks

Posted on January 22, 2026January 22, 2026 By CWS

A newly found ransomware household known as Osiris launched assaults in opposition to a significant meals service firm in Southeast Asia throughout November 2025.

Safety researchers have recognized this risk as a totally new malware variant with no connection to an older ransomware household that shared the identical title in 2016.

The emergence of Osiris marks one other addition to the rising variety of refined encryption threats concentrating on essential infrastructure and enterprise operations.

The assault marketing campaign demonstrates superior ways generally related to skilled risk actors.

Attackers leveraged a various toolkit combining legit system instruments with malicious utilities to infiltrate the sufferer’s community, set up persistence, and deploy the ransomware payload.

The incident reveals how trendy cybercriminals function by abusing on a regular basis Home windows utilities alongside custom-developed malicious software program to keep away from detection and bypass safety controls.

Symantec analysts recognized the malware after discovering suspicious patterns matching beforehand documented Inc ransomware campaigns.

Researchers famous technical overlaps together with an identical filenames for credential extraction instruments and related knowledge exfiltration strategies. The attackers used Rclone to steal knowledge earlier than encryption, importing stolen info to Wasabi cloud storage buckets.

They employed Mimikatz, a widely known software for extracting credentials, particularly utilizing a model named kaz.exe that earlier Inc attackers utilized.

Exploitation of Malicious Drivers and Protection Bypass

Essentially the most regarding facet of this assault entails the deployment of a malicious driver known as Poortry, also referred to as Abyssworker. This tradition driver pretended to be legit Malwarebytes software program to deceive directors.

Attackers used this driver in what safety specialists name a bring-your-own-vulnerable-driver (BYOVD) assault, enabling them to disable safety software program by exploiting kernel-level entry.

BYOVD assaults have turn out to be the popular approach for ransomware operators searching for to neutralize endpoint defenses.

By deploying signed susceptible drivers, attackers can escalate privileges and terminate safety processes with out elevating instant suspicion.

Poortry stands out as a result of attackers developed this driver themselves reasonably than counting on present susceptible code, suggesting sophistication throughout the risk group.

The attackers additionally deployed extra instruments together with Netexec, Netscan, and a modified model of Rustdesk distant administration software program disguised as WinZip to take care of community entry.

Osiris itself encrypts information utilizing superior hybrid encryption combining ECC and AES-128-CTR, with distinctive keys for every encrypted file.

The ransomware terminates databases and backup providers whereas deleting quantity snapshots to stop restoration. These technical capabilities, mixed with the delicate assault chain, point out skilled operators behind this new risk household.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Attacks, Dualuse, Land, Living, Osiris, Range, Ransomware, Tools, Wide

Post navigation

Previous Post: Beware of PNB MetLife Payment Gateway that Steals Your Details and Direct to UPI Payments
Next Post: Halo Security Achieves SOC 2 Type II Compliance, Demonstrating Sustained Security Excellence Over Time

Related Posts

Hackers Exploit Microsoft Teams, Posing as IT Help Desk for Screen Sharing and Remote Access Hackers Exploit Microsoft Teams, Posing as IT Help Desk for Screen Sharing and Remote Access Cyber Security News
Top Ransomware Actors Actively Attacking Financial Sector, 406 Incidents Publicly Disclosed Top Ransomware Actors Actively Attacking Financial Sector, 406 Incidents Publicly Disclosed Cyber Security News
Accessible AI-Powered Cybersecurity Platform for SME Security Accessible AI-Powered Cybersecurity Platform for SME Security Cyber Security News
New ZipLine Campaign Attacks Critical Manufacturing Companies to Deploy In-memory Malware MixShell New ZipLine Campaign Attacks Critical Manufacturing Companies to Deploy In-memory Malware MixShell Cyber Security News
Mystery OAST With Exploit for 200 CVEs Leveraging Google Cloud to Launch Attacks Mystery OAST With Exploit for 200 CVEs Leveraging Google Cloud to Launch Attacks Cyber Security News
Researchers Uncover Link Between Belsen and ZeroSeven Cybercriminal Groups Researchers Uncover Link Between Belsen and ZeroSeven Cybercriminal Groups Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News