Cat's Got Your Files: Lynx Ransomware
The Lynx ransomware campaign involves a threat actor gaining initial access via RDP using compromised credentials, likely from infostealers or data breaches. The attacker moves laterally to domain controllers, creates high-privilege impersonation accounts, and installs AnyDesk for persistence. Over nine days, extensive network reconnaissance and virtualization mapping are conducted, followed by data exfiltration from multiple file shares. On the final day, backup jobs are deleted before deploying Lynx ransomware across multiple servers. The intrusion lasted approximately 178 hours, leveraging domain admin credentials throughout. This attack combines credential abuse, lateral movement, data theft, backup sabotage, and ransomware deployment, posing significant operational and data confidentiality risks. European organizations with exposed RDP services and insufficient credential protection are particularly vulnerable. Mitigation requires proactive credential hygiene, network segmentation, backup hardening, and monitoring for anomalous administrative activity.
AI Analysis
Technical Summary
The Lynx ransomware campaign is a sophisticated multi-stage intrusion characterized by initial access through Remote Desktop Protocol (RDP) using compromised credentials, which are likely obtained via infostealers, data breaches, or purchased from initial access brokers. Upon gaining entry, the attacker rapidly escalates privileges and moves laterally within the network, targeting domain controllers to create multiple impersonation accounts with elevated privileges. Persistence is maintained through the installation of AnyDesk, a legitimate remote access tool, allowing continued access even if initial vectors are closed. Over a nine-day period, the adversary performs extensive network reconnaissance using tools such as SoftPerfect NetScan and NetExec to map the network topology and virtualization infrastructure, as well as to identify valuable file shares. Sensitive data is exfiltrated using the temp.sh service, indicating a focus on data theft alongside ransomware deployment. On the final day, the attacker targets backup servers, deleting backup jobs to prevent recovery, before deploying the Lynx ransomware payload across multiple servers, encrypting critical data and disrupting operations. The entire intrusion spans approximately 178 hours, with continuous use of compromised domain admin credentials, highlighting the threat actor’s deep access and control. The campaign leverages multiple MITRE ATT&CK techniques including credential dumping, lateral movement, network reconnaissance, data exfiltration, and backup deletion, culminating in ransomware deployment. Indicators of compromise include specific hashes, IP addresses, and suspicious domains. No known public exploits are reported, but the attack relies heavily on credential compromise and abuse of legitimate tools, making detection challenging. The campaign underscores the importance of securing RDP access, monitoring privileged account activity, and protecting backup infrastructure.
Potential Impact
For European organizations, the Lynx ransomware campaign presents a severe threat to confidentiality, integrity, and availability of critical systems and data. The use of compromised domain admin credentials and lateral movement to domain controllers can lead to widespread network compromise, affecting multiple business units and critical infrastructure. Data exfiltration risks regulatory non-compliance under GDPR due to potential exposure of personal and sensitive data, leading to legal and financial penalties. Deletion of backup jobs severely impairs recovery capabilities, increasing downtime and operational disruption. Sectors with high reliance on virtualization and networked file shares, such as finance, healthcare, manufacturing, and government, face heightened risks. The persistence via AnyDesk and use of legitimate tools complicate detection and response, potentially allowing prolonged undetected access. The campaign’s multi-day duration and extensive reconnaissance indicate a targeted approach, which could impact large enterprises and critical infrastructure providers in Europe, causing significant financial losses, reputational damage, and operational paralysis.
Mitigation Recommendations
1. Enforce strict multi-factor authentication (MFA) for all RDP and remote access services to prevent unauthorized access via compromised credentials. 2. Implement network segmentation to isolate domain controllers, backup servers, and critical infrastructure from general user networks, limiting lateral movement opportunities. 3. Harden backup infrastructure by restricting access, enabling immutable backups where possible, and regularly testing backup restoration processes. 4. Monitor for anomalous account creation, especially high-privilege impersonation accounts, and unusual use of remote access tools like AnyDesk. 5. Deploy endpoint detection and response (EDR) solutions capable of detecting reconnaissance tools such as SoftPerfect NetScan and NetExec, as well as suspicious PowerShell or command-line activity. 6. Conduct regular credential audits and enforce least privilege principles to reduce the impact of credential compromise. 7. Establish robust logging and alerting for RDP logins, administrative actions, and backup job modifications. 8. Educate staff on phishing and credential theft risks to reduce initial compromise likelihood. 9. Utilize threat intelligence feeds to detect and block known indicators of compromise associated with Lynx ransomware. 10. Prepare and regularly update incident response plans specifically addressing ransomware and backup sabotage scenarios.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
Indicators of Compromise
- domain: national.shitposting.agency
- hash: 3073af95dfc18361caebccd69d0021a2
- hash: 7532ff90145b8c59dc9440bf43dc87a5
- hash: e2179046b86deca297ebf7398b95e438
- hash: 2b4b11d3ecffd82ed44db652cdd65733224f8e34
- hash: 3e01df0155a539fe6d802ee9e9226d8c77fd96c9
- hash: efe8b9ff7ff93780c9162959a4c1e5ecf6e840a4
- hash: 07b36c1660deb223749a8ac151676d8924bc13aa59e6712a3c14a2df5237264a
- hash: 517288e12c05a92e483e6d80b9136c19bc58c46851720680bb6d1b7016034c37
- hash: 6285d32a9491a0084da85a384a11e15e203badf67b1deed54155f02b7338b108
- ip: 195.211.190.189
- ip: 77.90.153.30
- domain: delete.me
Cat's Got Your Files: Lynx Ransomware
Description
The Lynx ransomware campaign involves a threat actor gaining initial access via RDP using compromised credentials, likely from infostealers or data breaches. The attacker moves laterally to domain controllers, creates high-privilege impersonation accounts, and installs AnyDesk for persistence. Over nine days, extensive network reconnaissance and virtualization mapping are conducted, followed by data exfiltration from multiple file shares. On the final day, backup jobs are deleted before deploying Lynx ransomware across multiple servers. The intrusion lasted approximately 178 hours, leveraging domain admin credentials throughout. This attack combines credential abuse, lateral movement, data theft, backup sabotage, and ransomware deployment, posing significant operational and data confidentiality risks. European organizations with exposed RDP services and insufficient credential protection are particularly vulnerable. Mitigation requires proactive credential hygiene, network segmentation, backup hardening, and monitoring for anomalous administrative activity.
AI-Powered Analysis
Technical Analysis
The Lynx ransomware campaign is a sophisticated multi-stage intrusion characterized by initial access through Remote Desktop Protocol (RDP) using compromised credentials, which are likely obtained via infostealers, data breaches, or purchased from initial access brokers. Upon gaining entry, the attacker rapidly escalates privileges and moves laterally within the network, targeting domain controllers to create multiple impersonation accounts with elevated privileges. Persistence is maintained through the installation of AnyDesk, a legitimate remote access tool, allowing continued access even if initial vectors are closed. Over a nine-day period, the adversary performs extensive network reconnaissance using tools such as SoftPerfect NetScan and NetExec to map the network topology and virtualization infrastructure, as well as to identify valuable file shares. Sensitive data is exfiltrated using the temp.sh service, indicating a focus on data theft alongside ransomware deployment. On the final day, the attacker targets backup servers, deleting backup jobs to prevent recovery, before deploying the Lynx ransomware payload across multiple servers, encrypting critical data and disrupting operations. The entire intrusion spans approximately 178 hours, with continuous use of compromised domain admin credentials, highlighting the threat actor’s deep access and control. The campaign leverages multiple MITRE ATT&CK techniques including credential dumping, lateral movement, network reconnaissance, data exfiltration, and backup deletion, culminating in ransomware deployment. Indicators of compromise include specific hashes, IP addresses, and suspicious domains. No known public exploits are reported, but the attack relies heavily on credential compromise and abuse of legitimate tools, making detection challenging. The campaign underscores the importance of securing RDP access, monitoring privileged account activity, and protecting backup infrastructure.
Potential Impact
For European organizations, the Lynx ransomware campaign presents a severe threat to confidentiality, integrity, and availability of critical systems and data. The use of compromised domain admin credentials and lateral movement to domain controllers can lead to widespread network compromise, affecting multiple business units and critical infrastructure. Data exfiltration risks regulatory non-compliance under GDPR due to potential exposure of personal and sensitive data, leading to legal and financial penalties. Deletion of backup jobs severely impairs recovery capabilities, increasing downtime and operational disruption. Sectors with high reliance on virtualization and networked file shares, such as finance, healthcare, manufacturing, and government, face heightened risks. The persistence via AnyDesk and use of legitimate tools complicate detection and response, potentially allowing prolonged undetected access. The campaign’s multi-day duration and extensive reconnaissance indicate a targeted approach, which could impact large enterprises and critical infrastructure providers in Europe, causing significant financial losses, reputational damage, and operational paralysis.
Mitigation Recommendations
1. Enforce strict multi-factor authentication (MFA) for all RDP and remote access services to prevent unauthorized access via compromised credentials. 2. Implement network segmentation to isolate domain controllers, backup servers, and critical infrastructure from general user networks, limiting lateral movement opportunities. 3. Harden backup infrastructure by restricting access, enabling immutable backups where possible, and regularly testing backup restoration processes. 4. Monitor for anomalous account creation, especially high-privilege impersonation accounts, and unusual use of remote access tools like AnyDesk. 5. Deploy endpoint detection and response (EDR) solutions capable of detecting reconnaissance tools such as SoftPerfect NetScan and NetExec, as well as suspicious PowerShell or command-line activity. 6. Conduct regular credential audits and enforce least privilege principles to reduce the impact of credential compromise. 7. Establish robust logging and alerting for RDP logins, administrative actions, and backup job modifications. 8. Educate staff on phishing and credential theft risks to reduce initial compromise likelihood. 9. Utilize threat intelligence feeds to detect and block known indicators of compromise associated with Lynx ransomware. 10. Prepare and regularly update incident response plans specifically addressing ransomware and backup sabotage scenarios.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://thedfirreport.com/2025/11/17/cats-got-your-files-lynx-ransomware"]
- Adversary
- null
- Pulse Id
- 691b65be81167e8300b087de
- Threat Score
- null
Indicators of Compromise
Domain
| Value | Description | Copy |
|---|---|---|
domainnational.shitposting.agency | — | |
domaindelete.me | — |
Hash
| Value | Description | Copy |
|---|---|---|
hash3073af95dfc18361caebccd69d0021a2 | — | |
hash7532ff90145b8c59dc9440bf43dc87a5 | — | |
hashe2179046b86deca297ebf7398b95e438 | — | |
hash2b4b11d3ecffd82ed44db652cdd65733224f8e34 | — | |
hash3e01df0155a539fe6d802ee9e9226d8c77fd96c9 | — | |
hashefe8b9ff7ff93780c9162959a4c1e5ecf6e840a4 | — | |
hash07b36c1660deb223749a8ac151676d8924bc13aa59e6712a3c14a2df5237264a | — | |
hash517288e12c05a92e483e6d80b9136c19bc58c46851720680bb6d1b7016034c37 | — | |
hash6285d32a9491a0084da85a384a11e15e203badf67b1deed54155f02b7338b108 | — |
Ip
| Value | Description | Copy |
|---|---|---|
ip195.211.190.189 | — | |
ip77.90.153.30 | — |
Threat ID: 691bd87cd4c3ef3c7a5e99cf
Added to database: 11/18/2025, 2:22:52 AM
Last enriched: 11/18/2025, 2:37:58 AM
Last updated: 11/19/2025, 4:06:21 AM
Views: 56
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Anatomy of an Akira Ransomware Attack: When a Fake CAPTCHA Led to 42 Days of Compromise
Medium330 custom email domains, and what this tells us about how attackers build infrastructure for fake account creation
MediumThreat Actor "888" Claims LG Electronics Data Breach - Source Code and Hardcoded Credentials Allegedly Leaked [Unconfirmed]
HighShadowRay 2.0: Active Global Campaign Hijacks Ray AI Infrastructure Into Self-Propagating Botnet | Oligo Security
MediumMicrosoft Azure Blocks Massive 15.72 Tbps of DDoS Attack Powered by Aisuru Botnet
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.