FeaturedOpinion

50 Things I learned about the RansomEXX group

3 Mins read
AboveL A redacted note issued by RansomEXX

Shiva Parasram created this list of factoids about the ransomware group RansomEXX and published it to his LinkedIn page. It is reproduced here with his kind permission.

  1. 🎯 Emergence: RansomEXX came into the spotlight around 2020, primarily targeting notable organizations.
  2. 📛 Alias: They are also referred to as Defray777, stemming from a unique identifier in their ransomware code.
  3. 🔒 Encryption Techniques: RansomEXX employs strong encryption, making it difficult to restore files without their decryptor.
  4. 🌎 Global Attacks: While selective, they have targeted entities across various continents.
  5. 🔍 Specific Targets: They have a penchant for large corporations and public sector organizations.
  6. 🖥️ Hands-on Approach: RansomEXX prefers manual operations inside a network over automated techniques.
  7. 💽 Data Theft: Before encrypting systems, they often steal sensitive data.
  8. 📢 Double Extortion: They not only encrypt but threaten to leak stolen data if ransoms aren’t paid.
  9. 📜 Personalized Notes: Their ransom communications are typically customized based on the victim.
  10. 💰 RaaS: They do operate independently but have been known to operate as a RaaS (Ransomware-as-a-Service) model.
  11. 🎣 Phishing Mastery: Deceptive emails are often their initial entry method into networks.
  12. 🔗 Exploit Chains: They often chain together multiple software vulnerabilities for deeper access.
  13. 🖇️ Unpatched Software: RansomEXX capitalizes on outdated and vulnerable software, especially public-facing applications.
  14. 🧰 Diverse Toolkit: Their arsenal includes a mix of custom and off-the-shelf tools.
  15. 🔑 Mimikatz: A favored tool for credential dumping and privilege escalation.
  16. ⚡ PowerShell Empire: A post-exploitation framework granting wide-ranging capabilities.
  17. 💼 Cobalt Strike: Originally a legitimate pen-testing tool, it’s now a favorite among attackers.
  18. 🌐 Lateral Tactics: Tools like PsExec help them traverse laterally across compromised networks.
  19. 🔍 Network Recon: They actively map networks using tools like BloodHound.
  20. ☁️ Data Movement: Rclone can be misused for moving data stealthily to cloud storage.
  21. 🔍 Active Directory: They mine AD data using tools like AdFind for understanding permissions and relations.
  22. 🚪 Misconfigurations: They exploit insecure settings or exposed services.
  23. 📊 Target Research: Before an attack, they spend time researching potential victims for maximum impact.
  24. 💰 High Ransoms: Their demands can be exorbitant, reflecting their target’s perceived ability to pay.
  25. 📈 Tailored Operations: RansomEXX customizes their attack methods based on the target’s environment.
  26. 🛡️ Avoiding Detection: They use “living off the land” tactics to blend into environments.
  27. 🚷 No Known Decryptor: As of the last known update, no public decryption tool can counter RansomEXX.
  28. 📞 Communication Channels: They often provide a communication channel for ransom negotiations.
  29. 🔥 Destruction: In some cases, they may try to delete backups or disrupt recovery efforts.
  30. 🌍 Varied Victims: Targets have included healthcare, government entities, and critical infrastructure.
  31. 🔄 Network Propagation: Once inside, they work to gain higher privileges and access more systems.
  32. 🔐 Credential Theft: Capturing credentials is a priority to facilitate movement and persistence.
  33. 🛑 Stopping Security: They might attempt to disable security software or services.
  34. 🗂️ File Types: They target a broad range of file extensions, ensuring vital data gets encrypted.
  35. ⌛ Dwell Time: They can remain in networks for days to weeks before launching the ransomware.
  36. 📝 Detailed Notes: Ransom notes often provide detailed payment instructions using cryptocurrencies.
  37. ⚖️ Negotiations: Some victims have successfully negotiated lower ransoms.
  38. 🚫 Decryption Issues: Even after payment, decryption isn’t always smooth, with occasional technical issues.
  39. 🌐 Network Disruptions: Their operations can disrupt not just endpoints but entire networks.
  40. 🚫 No Warranty: Paying the ransom doesn’t guarantee data safety or prevent future attacks.
  41. 🕵️ Stealth: They often clean logs or use encrypted channels to avoid detection.
  42. 📦 Payload Delivery: Various methods, from malicious attachments to drive-by downloads, are used.
  43. 📡 Command & Control: They establish robust C2 communications to control compromised systems.
  44. 🛡️ Backup Importance: The best defense against their attack is having secure and isolated backups.
  45. 🚫 No Discrimination: Despite being selective, no industry is truly safe from their attention.
  46. 🖲️ VPN Exploits: Vulnerable VPNs have been a notable point of entry.
  47. 📅 Continuous Evolution: Their techniques and tools evolve to counteract defenses.
  48. 💡 Awareness: Training staff to spot phishing and suspicious behavior can prevent initial access.
  49. 🚀 Rapid Response: Quick detection and response can mitigate the damage they cause.
  50. 🔒 Layered Defense: Employing a multi-layered security approach is crucial in defending against groups like RansomEXX.

Related Posts

Dukharan deepfaked

Dukharan deepfaked

If a post, video, or article claiming to be me is not hosted on my official website or verified channels, it is a fabrication. Period. I do not endorse get-rich-quick...
Read More
Visa contactless transactions grew 30% during TT’s 2026 Carnival 

Visa contactless transactions grew 30% during TT’s 2026 Carnival 

Digital payments have entered a sustained growth phase in Trinidad and Tobago, fundamentally transforming how locals and visitors experience major cultural celebrations.
Read More
Samsung’s S26 leans in hard on AI

Samsung’s S26 leans in hard on AI

Some users including those with data that requires above average security, may not greet these agentic AI advancements with enthusiasm.
Read More
Why verification technologies will shape the next decade

Why verification technologies will shape the next decade

Trust infrastructure enables identity-backed interactions to cryptographically link each payment to a verified legal identity.
Read More
A 2026 manifesto for Carnival

A 2026 manifesto for Carnival

The idea of Carnival, the spark of the individual, rebellious, expressed as boldly inventive creation still catches fire.
Read More
Digital SME onboarding for CIBC customers coming to TT

Digital SME onboarding for CIBC customers coming to TT

The new system is designed to remove traditional barriers to opening a business account, providing entrepreneurs with a faster, simpler, and more transparent onboarding experience.
Read More
A hiss from a rose

A hiss from a rose

There is likely to be a need for sex re-education to deprogram children who see sex as a wrestling match.
Read More
TATT answers questions about its cybersecurity framework for telcoms, broadcasters

TATT answers questions about its cybersecurity framework for telcoms, broadcasters

Meaningful cybersecurity incidents are those that result in loss or degradation of services, whether isolated or widespread, due to compromised network element.
Read More
News is a niche until it’s not

News is a niche until it’s not

The New York Times produced approximately 230 pieces of content per day on average; The Washington Post, more than 500 per day in 2016
Read More
FT’s second Next Gen News report offers deeper insights

FT’s second Next Gen News report offers deeper insights

Successful producers are reversing the journalism process, dismantling the inverted pyramid of news structure
Read More
Dukharan deepfaked Dukharan deepfaked
Visa contactless transactions grew 30% during TT’s 2026 Carnival  Visa contactless transactions grew 30% during...
Samsung’s S26 leans in hard on AI Samsung’s S26 leans in hard on...
Why verification technologies will shape the next decade Why verification technologies will shape the...
A 2026 manifesto for Carnival A 2026 manifesto for Carnival
Digital SME onboarding for CIBC customers coming to TT Digital SME onboarding for CIBC customers...
A hiss from a rose A hiss from a rose
TATT answers questions about its cybersecurity framework for telcoms, broadcasters TATT answers questions about its cybersecurity...
News is a niche until it’s not News is a niche until it’s...
FT’s second Next Gen News report offers deeper insights FT’s second Next Gen News report...

🤞 Get connected!

A once weekly email notification of new stories on TechNewsTT. Just that. No spam.

Possible UI Glitch. Click top right corner to dismiss 👉

Get Connected!

A once weekly email notification of new stories on TechNewsTT.

Just that. No spam.

Related posts
BitDepth+Featured

TATT answers questions about its cybersecurity framework for telcoms, broadcasters

6 Mins read
Meaningful cybersecurity incidents are those that result in loss or degradation of services, whether isolated or widespread, due to compromised network element.
FeaturedOpinion

Strengthening Cloud Defense: The Shared Responsibility Model

4 Mins read
Every business process, whether it’s managed in-house or hosted in the cloud, still needs to have dedicated ownership to keep accountability where it belongs.
BitDepthFeatured

Ransomware report notes fourth quarter 2025 attack surge

4 Mins read
“The year 2026 will likely see continued convergence of criminal innovation and AI capabilities, demanding that defenders adopt equally sophisticated technologies and intelligence-led approaches.”
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
×
FeaturedNews Briefs

Updated: TSTT reported hacked by RansomEXX exploit

0
Share your perspective in the comments!x
()
x