Ptechhub
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs
No Result
View All Result
PtechHub
No Result
View All Result

Top 3 Ransomware Threats Active in 2025

The Hacker News by The Hacker News
February 6, 2025
Home Cybersecurity
Share on FacebookShare on Twitter


You arrive at the office, power up your system, and panic sets in. Every file is locked, and every system is frozen. A ransom demand flashes on your screen: “Pay $2 million in Bitcoin within 48 hours or lose everything.”

And the worst part is that even after paying, there’s no guarantee you’ll get your data back. Many victims hand over the money, only to receive nothing in return, or worse, get hit again.

This isn’t a rare case. Ransomware attacks are crippling businesses worldwide, from hospitals and banks to small companies. The only way to stop the damage is by proactively analyzing suspicious files and links before they can be executed.

Below, we break down the top three ransomware families active in 2025: LockBit, Lynx, and Virlock, and find out how interactive analysis helps businesses detect and stop them before it’s too late.

LockBit: Teasing a Comeback in 2025

LockBit is one of the most notorious ransomware groups, known for its highly efficient encryption, double extortion tactics, and ability to evade traditional security measures. Operating under a Ransomware-as-a-Service (RaaS)model, it enables affiliates to distribute the malware, leading to widespread attacks across various industries.

Latest attacks and activity:

  • London Drugs (May 2024): LockBit targeted Canadian retailer London Drugs, forcing the closure of all its locations across Canada. Hackers demanded $25 million, leaking some employee data after the company refused to pay.
  • University Hospital Center, Zagreb (June 2024): Disrupted Croatia’s largest hospital, forcing staff to revert to manual operations while attackers claimed to have exfiltrated medical records.
  • Evolve Bank & Trust (June 2024): Breached sensitive financial data, with hackers falsely claiming to have Federal Reserve information. The attack raised concerns due to Evolve’s ties with major fintech firms.

LockBit sample:

Let’s take a closer look at a LockBit ransomware sample inside ANY.RUN’s secure sandbox to discover its key behaviors.

View analysis session

File icons changed inside ANY.RUN sandbox

Inside the Interactive Sandbox, we notice the first thing that stands out: file icons changing to the LockBit logo. This is an immediate sign of ransomware infection.

Uncover ransomware tactics in real-time and prevent costly breaches before they happen.

Try ANY.RUN free for 14 days

This is followed by a ransom note inside the sandbox, stating that your files have been stolen and encrypted. The message is clear: Pay the ransom, or the data will be published on a TOR website.

Ransom note displayed inside secure environment

On the right side of the screen, we see a detailed breakdown of every process LockBit executes to attack the system.

Process tree demonstrates the behaviors of LockBit

By clicking on any process, security teams can analyze the exact tactics used in the attack.

Detailed breakdown of processes inside Interactive Sandbox

This type of analysis is important for businesses as it allows them to understand how ransomware spreads, identify weak points in their security, and take proactive steps to block similar threats before they cause financial and operational damage.

For a more in-depth breakdown of the attack tactics, you can also click on the ATT&CK button in the upper-right corner of the sandbox. This provides detailed insights into each tactic, helping teams fine-tune their defenses and strengthen response strategies.

MITRE ATT&CK tactics and techniques detected by ANY.RUN

In this case, we see LockBit using several dangerous techniques:

  • Gaining higher privileges by bypassing security controls.
  • Extracting stored credentials from files and web browsers.
  • Scanning the system to gather information before encrypting files.
  • Encrypting data to lock down critical business operations.

New attack warning in 2025:

Despite law enforcement actions, LockBit continues to pose a significant threat for 2025. The group’s alleged leader, known as LockBitSupp, has warned of new ransomware attacks launching this February. This means businesses cannot afford to let their guard down.

Lynx: The Rising Threat to Small and Mid-Sized Businesses

Lynx is a relatively new ransomware group that surfaced in mid-2024 and quickly built a reputation for its highly aggressive approach. Unlike larger ransomware gangs that focus on corporate giants, Lynx deliberately goes after small and mid-sized businesses across North America and Europe, taking advantage of weaker security measures.

Their strategy relies on double extortion. They don’t just encrypt files but also threaten to leak stolen data on both public websites and dark web forums if victims refuse to pay. This forces businesses into an impossible choice: pay the ransom or risk having confidential data, financial details, and customer records exposed online.

Latest Lynx attack:

In mid-January 2025, Lynx targeted Lowe Engineers, a prominent civil engineering firm based in Atlanta, Georgia. The attack led to the exfiltration of sensitive data, including confidential project information and client details. Given the firm’s involvement in critical infrastructure projects, this breach raised significant concerns about potential impacts on federal and municipal contracts.

Lynx sample:

Thanks to ANY.RUN’s Interactive Sandbox, we can analyze the full attack chain of Lynx ransomware in a controlled virtual environment, without risking real systems.

View sandbox analysis of Lynx

The moment we upload and launch the malicious executable file in ANY.RUN’s cloud-based sandbox, the ransomware immediately starts encrypting files and changes their extensions to .LYNX.

The Files Modification tab provides the changes of file system activity

Shortly after, a ransom note appears, and the desktop wallpaper is replaced with an extortion message directing victims to a TOR site, where attackers demand payment.

Lynx ransomware changing the wallpaper inside ANY.RUN sandbox

Inside the ANY.RUN sandbox, we can manually open the README.txt dropped by Lynx to view the ransom message exactly as a victim would.

The ransom note includes .onion links that direct victims to the attackers’ communication portal

In the MITRE ATT&CK section, we get a clear breakdown of Lynx’s tactics and techniques, revealing how it operates:

MITRE ATT&CK tactics and techniques used by Lynx ransomware
  • Encrypting files to lock critical business data.
  • Renaming files to mimic other ransomware strains.
  • Querying the registry to scan for system details and security software.
  • Reading CPU information to assess the target environment.
  • Checking software policies to determine security settings before proceeding.

Virlock: A Self-Replicating Ransomware That Won’t Die

Virlock is a unique ransomware strain that first emerged in 2014. Unlike typical ransomware, Virlock not only encrypts files but also infects them, turning each into a polymorphic file infector. This dual capability allows it to spread rapidly, especially through cloud storage and collaboration platforms.

Recent attacks:

In recent analyses, Virlock has been observed spreading stealthily via cloud storage and collaboration apps. When a user’s system is infected, Virlock encrypts and infects files, which are then synced to shared cloud environments.

Collaborators who access these shared files inadvertently execute the infected files, leading to further spread within the organization.

Virlock sample:

Let’s analyze Virlock’s behavior using a real-time sample inside ANY.RUN’s sandbox.

View sandbox analysis of Virlock

Virlock ransomware inside VM

Just like LockBit and Lynx, Virlock drops a ransom note upon execution. However, this time, it demands payment in Bitcoin, a common tactic among ransomware operators.

In this specific sample, Virlock asks for the equivalent of $250 in Bitcoin, threatening to permanently delete files if the ransom isn’t paid.

Interestingly, the ransom note doesn’t just demand payment. It also includes a guide on Bitcoin, explaining what it is and how victims can acquire it for payment.

Ransom note demanding BitCoin left by Virlock

During execution, ANY.RUN detects several malicious activities, revealing how Virlock operates:

Behavior of Virlock ransomware analyzed by Interactive Sandbox
  • A Virlock-specific mutex is identified, helping the malware ensure only one instance runs at a time to avoid interference.
  • Virlock executes commands through batch (.bat) files, launching CMD.EXE to perform malicious actions.
  • The ransomware modifies the Windows registry using REG/REGEDIT.EXE, likely to establish persistence or disable security features.

Each sandbox session in ANY.RUN automatically generates a detailed report that can be easily shared within a company. These reports are formatted for further analysis, helping security teams collaborate and develop effective strategies to combat ransomware threats in 2025.

Generated report by ANY.RUN sandbox

Ransomware in 2025: A Growing Threat You Can Stop

Ransomware is more aggressive than ever, disrupting businesses, stealing data, and demanding millions in ransom. The cost of an attack includes lost operations, damaged reputation, and stolen customer trust.

You can stop ransomware before it locks you out. By analyzing suspicious files in ANY.RUN’s Interactive Sandbox, you get real-time insights into malware behavior, without risking your systems.

Try ANY.RUN free for 14 days to proactively identify cyber threats to your business before it’s too late!

Found this article interesting? This article is a contributed piece from one of our valued partners. Follow us on Twitter  and LinkedIn to read more exclusive content we post.





Source link

Tags: computer securitycyber attackscyber newscyber security newscyber security news todaycyber security updatescyber updatesdata breachhacker newshacking newshow to hackinformation securitynetwork securityransomware malwaresoftware vulnerabilitythe hacker news
The Hacker News

The Hacker News

Next Post
North Korean APT Kimsuky Uses forceCopy Malware to Steal Browser-Stored Credentials

North Korean APT Kimsuky Uses forceCopy Malware to Steal Browser-Stored Credentials

Recommended.

NETMARBLE BUILDS ANTICIPATION FOR ITS BRUTAL DARK FANTASY MMORPG RAVEN2 THROUGH ONGOING VIDEO SERIES “INSIDE RAVEN2”

NETMARBLE BUILDS ANTICIPATION FOR ITS BRUTAL DARK FANTASY MMORPG RAVEN2 THROUGH ONGOING VIDEO SERIES “INSIDE RAVEN2”

September 19, 2025
Replit schließt Finanzierung in Höhe von 250 Millionen US-Dollar ab, um die Kundendynamik weiter auszubauen

Replit schließt Finanzierung in Höhe von 250 Millionen US-Dollar ab, um die Kundendynamik weiter auszubauen

September 11, 2025

Trending.

⚡ Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More

⚡ Weekly Recap: Oracle 0-Day, BitLocker Bypass, VMScape, WhatsApp Worm & More

October 6, 2025
Cloud Computing on the Rise: Market Projected to Reach .6 Trillion by 2030

Cloud Computing on the Rise: Market Projected to Reach $1.6 Trillion by 2030

August 1, 2025
Stocks making the biggest moves midday: Autodesk, PayPal, Rivian, Nebius, Waters and more

Stocks making the biggest moves midday: Autodesk, PayPal, Rivian, Nebius, Waters and more

July 14, 2025
The Ultimate MSP Guide to Structuring and Selling vCISO Services

The Ultimate MSP Guide to Structuring and Selling vCISO Services

February 19, 2025
Translators’ Voices: China shares technological achievements with the world for mutual benefit

Translators’ Voices: China shares technological achievements with the world for mutual benefit

June 3, 2025

PTechHub

A tech news platform delivering fresh perspectives, critical insights, and in-depth reporting — beyond the buzz. We cover innovation, policy, and digital culture with clarity, independence, and a sharp editorial edge.

Follow Us

Industries

  • AI & ML
  • Cybersecurity
  • Enterprise IT
  • Finance
  • Telco

Navigation

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Subscribe to Our Newsletter

  • About
  • Advertise
  • Privacy & Policy
  • Contact

Copyright © 2025 | Powered By Porpholio

No Result
View All Result
  • News
  • Industries
    • Enterprise IT
    • AI & ML
    • Cybersecurity
    • Finance
    • Telco
  • Brand Hub
    • Lifesight
  • Blogs

Copyright © 2025 | Powered By Porpholio