Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

New Osiris Ransomware Using Wide Range of Living off the Land and Dual-use Tools in Attacks

Posted on January 22, 2026January 22, 2026 By CWS

A newly found ransomware household known as Osiris launched assaults in opposition to a significant meals service firm in Southeast Asia throughout November 2025.

Safety researchers have recognized this risk as a totally new malware variant with no connection to an older ransomware household that shared the identical title in 2016.

The emergence of Osiris marks one other addition to the rising variety of refined encryption threats concentrating on essential infrastructure and enterprise operations.

The assault marketing campaign demonstrates superior ways generally related to skilled risk actors.

Attackers leveraged a various toolkit combining legit system instruments with malicious utilities to infiltrate the sufferer’s community, set up persistence, and deploy the ransomware payload.

The incident reveals how trendy cybercriminals function by abusing on a regular basis Home windows utilities alongside custom-developed malicious software program to keep away from detection and bypass safety controls.

Symantec analysts recognized the malware after discovering suspicious patterns matching beforehand documented Inc ransomware campaigns.

Researchers famous technical overlaps together with an identical filenames for credential extraction instruments and related knowledge exfiltration strategies. The attackers used Rclone to steal knowledge earlier than encryption, importing stolen info to Wasabi cloud storage buckets.

They employed Mimikatz, a widely known software for extracting credentials, particularly utilizing a model named kaz.exe that earlier Inc attackers utilized.

Exploitation of Malicious Drivers and Protection Bypass

Essentially the most regarding facet of this assault entails the deployment of a malicious driver known as Poortry, also referred to as Abyssworker. This tradition driver pretended to be legit Malwarebytes software program to deceive directors.

Attackers used this driver in what safety specialists name a bring-your-own-vulnerable-driver (BYOVD) assault, enabling them to disable safety software program by exploiting kernel-level entry.

BYOVD assaults have turn out to be the popular approach for ransomware operators searching for to neutralize endpoint defenses.

By deploying signed susceptible drivers, attackers can escalate privileges and terminate safety processes with out elevating instant suspicion.

Poortry stands out as a result of attackers developed this driver themselves reasonably than counting on present susceptible code, suggesting sophistication throughout the risk group.

The attackers additionally deployed extra instruments together with Netexec, Netscan, and a modified model of Rustdesk distant administration software program disguised as WinZip to take care of community entry.

Osiris itself encrypts information utilizing superior hybrid encryption combining ECC and AES-128-CTR, with distinctive keys for every encrypted file.

The ransomware terminates databases and backup providers whereas deleting quantity snapshots to stop restoration. These technical capabilities, mixed with the delicate assault chain, point out skilled operators behind this new risk household.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Attacks, Dualuse, Land, Living, Osiris, Range, Ransomware, Tools, Wide

Post navigation

Previous Post: Beware of PNB MetLife Payment Gateway that Steals Your Details and Direct to UPI Payments
Next Post: Halo Security Achieves SOC 2 Type II Compliance, Demonstrating Sustained Security Excellence Over Time

Related Posts

New Python RAT Mimic as Legitimate Minecraft App Steals Sensitive Data from Users Computer Cyber Security News
New Whisper Leak Toolkit Exposes User Prompts to Popular AI Agents within Encrypted Traffic Cyber Security News
New Malware Attack Via “I’m not a Robot Check” to Trick Users into Running Malware Cyber Security News
Fortinet FortiSIEM Vulnerability CVE-2025-64155 Actively Exploited in Attacks Cyber Security News
CastleLoader Malware Infected Over 400+ Devices Using Cloudflare-Themed ClickFix Phishing Attack Cyber Security News
Chinese Hackers Organization Influence U.S. Government Policy on International Issues Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Halo Security Achieves SOC 2 Type II Compliance, Demonstrating Sustained Security Excellence Over Time
  • New Osiris Ransomware Using Wide Range of Living off the Land and Dual-use Tools in Attacks
  • Beware of PNB MetLife Payment Gateway that Steals Your Details and Direct to UPI Payments
  • Hackers Hijacking Snap Domains to Posion Linux Software Packages for Desktops and Servers
  • Proxyware Malware Disguised as Notepad++ Tool Leverages Windows Explorer Process to Hijack Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Halo Security Achieves SOC 2 Type II Compliance, Demonstrating Sustained Security Excellence Over Time
  • New Osiris Ransomware Using Wide Range of Living off the Land and Dual-use Tools in Attacks
  • Beware of PNB MetLife Payment Gateway that Steals Your Details and Direct to UPI Payments
  • Hackers Hijacking Snap Domains to Posion Linux Software Packages for Desktops and Servers
  • Proxyware Malware Disguised as Notepad++ Tool Leverages Windows Explorer Process to Hijack Systems

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark