Osiris ransomware emerges, leveraging BYOVD technique to kill security tools
好的,我现在需要帮用户总结这篇文章的内容,控制在100个字以内。首先,我得通读整篇文章,抓住关键点。 文章主要讲的是Osiris勒索软件的出现,利用BYOVD技术禁用安全工具。攻击发生在2025年11月,针对东南亚的一家食品服务公司。研究人员Symantec和Carbon Black发现了恶意驱动程序POORTRY,使用BYOVD技术禁用了安全软件。 此外,Osiris的功能包括停止服务、选择加密文件、删除VSS快照等。攻击者还使用了Rclone窃取数据,并利用修改过的RustDesk隐藏真实用途。文章还提到Osiris可能与INC勒索软件有关联。 总结时要包括:Osiris勒索软件、BYOVD技术、禁用安全工具、攻击目标和时间、功能特点以及可能的关联。控制在100字以内,所以需要简洁明了。 </think> Osiris 勒索软件利用 BYOVD 技术禁用安全工具,在 2025 年 11 月针对东南亚食品服务公司发动攻击。研究人员发现其恶意驱动程序 POORTRY 可终止安全软件,并具备停止服务、选择加密文件及删除 VSS 快照等功能。攻击者还窃取数据并伪装工具以隐藏行踪,或与 INC 勒索团伙有关联。 2026-1-24 18:17:13 Author: securityaffairs.com(查看原文) 阅读量:4 收藏

Osiris ransomware emerges, leveraging BYOVD technique to kill security tools

Researchers identified a new Osiris ransomware used in a November 2025 attack, abusing the POORTRY driver via BYOVD to disable security tools.

Symantec and Carbon Black researchers uncovered a new ransomware strain named Osiris, used in a November 2025 attack against a major Southeast Asian food service franchise operator.

The attackers deployed a malicious driver, POORTRY, abusing the BYOVD technique to disable security software, according to Symantec and VMware Carbon Black threat hunters.

Little is known about Osiris’ developers or whether it’s offered as RaaS, but evidence suggests links to INC ransomware actors.

“While this Osiris ransomware shares a name with a ransomware family from 2016, which was a variant of the Locky ransomware, there is no indication that there is any link between these two families.” reads the report published by Symantec and Carbon Black.

Osiris appears to be a new ransomware strain unrelated to the 2016 Locky-based variant of the same name. The developers and any RaaS model remain unknown, but Broadcom researchers found signs linking the attackers to the INC (Warble) ransomware group.

Osiris is a full-featured ransomware with capabilities to stop services and processes, select files and folders to encrypt, and drop a ransom note. The researchers report that it supports multiple command-line options to define targets, logging, encryption mode (partial or full), and Hyper-V handling. The new ransomware family skips specific file types and system folders, appends a .Osiris extension to encrypted files, deletes VSS snapshots, and terminates database, backup, and productivity processes. The malware uses hybrid ECC and AES-128-CTR encryption with a unique key per file, manages async I/O via completion ports, and leaves an Osiris-MESSAGE.txt ransom note with extortion details and negotiation links.

The attack chain began days before ransomware deployment, when attackers quietly stole data using Rclone and uploaded it to a Wasabi cloud storage bucket. This method, along with reused tools like a Mimikatz variant named kaz.exe, mirrors past Inc ransomware operations, suggesting either imitation or involvement by a former Inc affiliate.

“The attackers also deployed other dual-use tools like Netscan, Netexec, and MeshAgent. They also used a custom version of the Rustdesk remote monitoring and management (RMM) tool, which was modified to masquerade its functionality and to include the file description of “WinZip Remote Desktop” and the WinZip icon in an effort to hide its true use.” continues the report.

The attackers used common dual-use tools for network discovery and access, plus a modified RustDesk remote tool disguised as “WinZip Remote Desktop” to hide its purpose. To disable defenses, they deployed the Poortry (Abyssworker) driver, posing as a Malwarebytes component, in a bring-your-own-vulnerable-driver (BYOVD) attack to shut down security software. KillAV was also used for this purpose. Finally, they enabled RDP to maintain remote access before launching the ransomware.

Osiris is a capable new ransomware used by skilled threat actors. The researchers highlight that tool reuse and tactics suggest possible links to Inc affiliates and Medusa activity, though attribution remains unclear.

“With the constant shifting sands of the ransomware landscape, the emergence of a new ransomware family is always something to keep an eye on.” concludes the report.

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, ransomware)




文章来源: https://securityaffairs.com/187279/security/osiris-ransomware-emerges-leveraging-byovd-technique-to-kill-security-tools.html
如有侵权请联系:admin#unsafe.sh