Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
New Osiris Ransomware Using Wide Range of Living off the Land and Dual-use Tools in Attacks

New Osiris Ransomware Using Wide Range of Living off the Land and Dual-use Tools in Attacks

Posted on January 22, 2026January 22, 2026 By CWS

A newly found ransomware household known as Osiris launched assaults in opposition to a significant meals service firm in Southeast Asia throughout November 2025.

Safety researchers have recognized this risk as a totally new malware variant with no connection to an older ransomware household that shared the identical title in 2016.

The emergence of Osiris marks one other addition to the rising variety of refined encryption threats concentrating on essential infrastructure and enterprise operations.

The assault marketing campaign demonstrates superior ways generally related to skilled risk actors.

Attackers leveraged a various toolkit combining legit system instruments with malicious utilities to infiltrate the sufferer’s community, set up persistence, and deploy the ransomware payload.

The incident reveals how trendy cybercriminals function by abusing on a regular basis Home windows utilities alongside custom-developed malicious software program to keep away from detection and bypass safety controls.

Symantec analysts recognized the malware after discovering suspicious patterns matching beforehand documented Inc ransomware campaigns.

Researchers famous technical overlaps together with an identical filenames for credential extraction instruments and related knowledge exfiltration strategies. The attackers used Rclone to steal knowledge earlier than encryption, importing stolen info to Wasabi cloud storage buckets.

They employed Mimikatz, a widely known software for extracting credentials, particularly utilizing a model named kaz.exe that earlier Inc attackers utilized.

Exploitation of Malicious Drivers and Protection Bypass

Essentially the most regarding facet of this assault entails the deployment of a malicious driver known as Poortry, also referred to as Abyssworker. This tradition driver pretended to be legit Malwarebytes software program to deceive directors.

Attackers used this driver in what safety specialists name a bring-your-own-vulnerable-driver (BYOVD) assault, enabling them to disable safety software program by exploiting kernel-level entry.

BYOVD assaults have turn out to be the popular approach for ransomware operators searching for to neutralize endpoint defenses.

By deploying signed susceptible drivers, attackers can escalate privileges and terminate safety processes with out elevating instant suspicion.

Poortry stands out as a result of attackers developed this driver themselves reasonably than counting on present susceptible code, suggesting sophistication throughout the risk group.

The attackers additionally deployed extra instruments together with Netexec, Netscan, and a modified model of Rustdesk distant administration software program disguised as WinZip to take care of community entry.

Osiris itself encrypts information utilizing superior hybrid encryption combining ECC and AES-128-CTR, with distinctive keys for every encrypted file.

The ransomware terminates databases and backup providers whereas deleting quantity snapshots to stop restoration. These technical capabilities, mixed with the delicate assault chain, point out skilled operators behind this new risk household.

Observe us on Google Information, LinkedIn, and X to Get Extra Instantaneous Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Attacks, Dualuse, Land, Living, Osiris, Range, Ransomware, Tools, Wide

Post navigation

Previous Post: Beware of PNB MetLife Payment Gateway that Steals Your Details and Direct to UPI Payments
Next Post: Halo Security Achieves SOC 2 Type II Compliance, Demonstrating Sustained Security Excellence Over Time

Related Posts

Beware of Security Alert-Themed Malicious Emails that Steal Your Email Logins Beware of Security Alert-Themed Malicious Emails that Steal Your Email Logins Cyber Security News
List of AI Tools Promoted by Threat Actors in Underground Forums and Their Capabilities List of AI Tools Promoted by Threat Actors in Underground Forums and Their Capabilities Cyber Security News
Palo Alto Networks GlobalProtect Vulnerability Allows Root User Privilege Escalation Palo Alto Networks GlobalProtect Vulnerability Allows Root User Privilege Escalation Cyber Security News
EvilAI as AI-enhanced Tools to Exfiltrate Sensitive Browser Data and Evade Detections EvilAI as AI-enhanced Tools to Exfiltrate Sensitive Browser Data and Evade Detections Cyber Security News
Windows Defender Firewall Service Vulnerability Let Attackers Disclose Sensitive Data Windows Defender Firewall Service Vulnerability Let Attackers Disclose Sensitive Data Cyber Security News
Firefox 141 Released With Fix for Multiple Vulnerabilities Firefox 141 Released With Fix for Multiple Vulnerabilities Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark