Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Analysis of Encryption Structure of Yurei Ransomware Go-based Builder

0
Medium
Published: Fri Nov 14 2025 (11/14/2025, 12:16:01 UTC)
Source: AlienVault OTX General

Description

Yurei ransomware, identified in September 2025, targets corporate networks primarily in transportation, IT, marketing, and food sectors. Developed in Go, it uses strong encryption algorithms ChaCha20-Poly1305 for file encryption and secp256k1-ECIES for key protection. The ransomware excludes certain files and directories to maintain system operability. Each file is encrypted with a unique key and nonce, ensuring only the attacker can decrypt the data. The ransom note threatens data leaks and regulatory notifications if demands are unmet within five days. While currently observed in Sri Lanka and Nigeria, the ransomware’s sophisticated encryption and typical corporate targeting pose a medium-level threat globally. No known exploits in the wild or CVEs exist yet. European organizations should be vigilant due to potential expansion and regulatory impact. Mitigation requires proactive network segmentation, strict access controls, and advanced detection of lateral movement and privilege escalation.

AI-Powered Analysis

AILast updated: 11/14/2025, 12:46:57 UTC

Technical Analysis

The Yurei ransomware group, first identified in September 2025, operates a typical ransomware model targeting corporate networks with a focus on sectors such as transportation, IT, marketing, and food industries. The ransomware is developed in the Go programming language, which facilitates cross-platform capabilities and ease of deployment. It employs ChaCha20-Poly1305, a modern authenticated encryption algorithm, to encrypt files, ensuring confidentiality and integrity of the encrypted data. Additionally, it uses secp256k1-ECIES (Elliptic Curve Integrated Encryption Scheme) to protect encryption keys, leveraging elliptic curve cryptography for secure key exchange and protection. The ransomware excludes specific directories, file extensions, and files from encryption to avoid disrupting critical system functions, which is a common tactic to maintain system operability and delay detection. The encryption process generates a unique key and nonce per file, making decryption without the attacker’s private key infeasible. The ransom note threatens victims with data leaks and regulatory notifications if the ransom is not paid within five days, indicating a double extortion tactic. Although the ransomware has been observed primarily in Sri Lanka and Nigeria, its use of advanced cryptographic techniques and targeting of corporate networks suggests potential for wider geographic spread. Indicators of compromise include multiple file hashes associated with the ransomware binaries. No known CVEs or exploits in the wild have been reported, and the severity is assessed as medium due to the ransomware’s operational model and encryption strength. The attack techniques include reconnaissance, credential dumping, privilege escalation, and data encryption, aligning with MITRE ATT&CK tactics such as T1082, T1140, T1055, T1112, T1070, T1083, T1566, T1027, T1486, and T1490. The threat actor’s use of Go and modern cryptography indicates a well-resourced and technically capable group.

Potential Impact

For European organizations, the Yurei ransomware poses a significant risk to confidentiality, integrity, and availability of corporate data. The use of strong encryption algorithms means that encrypted files are effectively inaccessible without the attacker’s key, potentially causing prolonged operational disruption. The threat of data leaks and regulatory notifications is particularly impactful in Europe due to stringent data protection laws such as GDPR, which mandate timely breach notifications and can result in substantial fines. Industries similar to those targeted so far—transportation, IT, marketing, and food—are critical to European economies and supply chains, increasing the potential for cascading effects. The ransomware’s exclusion of certain files to maintain system functionality may allow it to evade early detection and complicate incident response. Although no known exploits in the wild have been reported yet, the ransomware’s presence and operational model suggest a credible threat that could expand geographically. The medium severity rating reflects the balance between strong encryption and the current limited geographic spread. However, the potential for double extortion increases reputational and financial risks for European entities.

Mitigation Recommendations

European organizations should implement a multi-layered defense strategy tailored to the Yurei ransomware’s characteristics. First, enforce strict network segmentation to limit lateral movement within corporate networks, especially between critical systems and user workstations. Deploy advanced endpoint detection and response (EDR) solutions capable of identifying behaviors associated with reconnaissance, credential dumping, and privilege escalation (e.g., monitoring for T1082, T1140, T1055 techniques). Regularly audit and restrict administrative privileges to reduce the attack surface. Implement application allowlisting to prevent execution of unauthorized Go-based binaries and monitor for suspicious file hashes matching known Yurei indicators. Backup strategies must include offline and immutable backups to ensure recovery without ransom payment. Conduct phishing awareness training to mitigate initial infection vectors (T1566). Monitor network traffic for unusual encrypted communications or data exfiltration attempts. Finally, prepare incident response plans that include legal and regulatory notification procedures to comply with GDPR and other European data protection laws in case of data leaks.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://asec.ahnlab.com/en/90975/"]
Adversary
Yurei
Pulse Id
69171d813a530356d4732351
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash1263ffe930e8ccde5bc62b043a5b6bd8
hash1f9700295e592ce3ea40b282e91597a2
hash24b4a69e3220b4e52e7c14f71e0f8dd6
hash32d489eef7cbbdf51dc41d07648d7d8f
hash331f9e123696007a9b2cc962dfb86d12
hash570a0e5e82568202d25c951596db8e3f563d8446
hash1ea37e077e6b2463b8440065d5110377e2b4b4283ce9849ac5efad6d664a8e9e

Threat ID: 69172119dd0733879bf23f81

Added to database: 11/14/2025, 12:31:21 PM

Last enriched: 11/14/2025, 12:46:57 PM

Last updated: 11/15/2025, 4:24:10 AM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats