Press ESC to close

Lynx Ransomware Threat Intel

CategoryDetails
Threat ActorsLynx ransomware group, Successor to INC ransomware group.
Campaign OverviewEmerged in 2024; ransomware-as-a-service (RaaS) model; active targeting of multiple sectors.
Target Regions (or Victims)Organizations in the U.S. and UK; avoids government, hospitals, and non-profits.
MethodologyDouble extortion: Exfiltrates and Encrypts Data; Disseminated via Phishing emails, malicious downloads, and hacking forums.
Product TargetedWindows systems; no Linux samples confirmed for Lynx yet (unlike INC).
Malware ReferenceLynx ransomware shares 48-70% code similarity with INC ransomware; uses AES-128 in CTR mode, Curve25519 Donna encryption.
Tools UsedRestart Manager API (RstrtMgr), OneNote for reporting.
Vulnerabilities ExploitedPrimarily social engineering (e.g., phishing); no specific software vulnerabilities detailed.
TTPsUses arguments for execution; Terminates Processes, Deletes Backups, Appends .lynx extension, Drops README.txt as ransom note.
AttributionCode similarities indicate Lynx reused and adapted INC ransomware’s code.
RecommendationsUse Palo Alto’s Cortex XDR Anti-Ransomware module; monitor indicators of compromise (IoCs); enhance phishing defenses.
SourceUnit42 by Paloaltonetworks

Read full article: Read More

Disclaimer: The above summary has been generated by an AI language model.

Leave a Reply

Your email address will not be published. Required fields are marked *