Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Cat's Got Your Files: Lynx Ransomware

0
Medium
Published: Mon Nov 17 2025 (11/17/2025, 18:13:18 UTC)
Source: AlienVault OTX General

Description

The Lynx ransomware campaign involves a threat actor gaining initial access via RDP using compromised credentials, likely from infostealers or data breaches. The attacker moves laterally to domain controllers, creates high-privilege impersonation accounts, and installs AnyDesk for persistence. Over nine days, extensive network reconnaissance and virtualization mapping are conducted, followed by data exfiltration from multiple file shares. On the final day, backup jobs are deleted before deploying Lynx ransomware across multiple servers. The intrusion lasted approximately 178 hours, leveraging domain admin credentials throughout. This attack combines credential abuse, lateral movement, data theft, backup sabotage, and ransomware deployment, posing significant operational and data confidentiality risks. European organizations with exposed RDP services and insufficient credential protection are particularly vulnerable. Mitigation requires proactive credential hygiene, network segmentation, backup hardening, and monitoring for anomalous administrative activity.

AI-Powered Analysis

AILast updated: 11/18/2025, 02:37:58 UTC

Technical Analysis

The Lynx ransomware campaign is a sophisticated multi-stage intrusion characterized by initial access through Remote Desktop Protocol (RDP) using compromised credentials, which are likely obtained via infostealers, data breaches, or purchased from initial access brokers. Upon gaining entry, the attacker rapidly escalates privileges and moves laterally within the network, targeting domain controllers to create multiple impersonation accounts with elevated privileges. Persistence is maintained through the installation of AnyDesk, a legitimate remote access tool, allowing continued access even if initial vectors are closed. Over a nine-day period, the adversary performs extensive network reconnaissance using tools such as SoftPerfect NetScan and NetExec to map the network topology and virtualization infrastructure, as well as to identify valuable file shares. Sensitive data is exfiltrated using the temp.sh service, indicating a focus on data theft alongside ransomware deployment. On the final day, the attacker targets backup servers, deleting backup jobs to prevent recovery, before deploying the Lynx ransomware payload across multiple servers, encrypting critical data and disrupting operations. The entire intrusion spans approximately 178 hours, with continuous use of compromised domain admin credentials, highlighting the threat actor’s deep access and control. The campaign leverages multiple MITRE ATT&CK techniques including credential dumping, lateral movement, network reconnaissance, data exfiltration, and backup deletion, culminating in ransomware deployment. Indicators of compromise include specific hashes, IP addresses, and suspicious domains. No known public exploits are reported, but the attack relies heavily on credential compromise and abuse of legitimate tools, making detection challenging. The campaign underscores the importance of securing RDP access, monitoring privileged account activity, and protecting backup infrastructure.

Potential Impact

For European organizations, the Lynx ransomware campaign presents a severe threat to confidentiality, integrity, and availability of critical systems and data. The use of compromised domain admin credentials and lateral movement to domain controllers can lead to widespread network compromise, affecting multiple business units and critical infrastructure. Data exfiltration risks regulatory non-compliance under GDPR due to potential exposure of personal and sensitive data, leading to legal and financial penalties. Deletion of backup jobs severely impairs recovery capabilities, increasing downtime and operational disruption. Sectors with high reliance on virtualization and networked file shares, such as finance, healthcare, manufacturing, and government, face heightened risks. The persistence via AnyDesk and use of legitimate tools complicate detection and response, potentially allowing prolonged undetected access. The campaign’s multi-day duration and extensive reconnaissance indicate a targeted approach, which could impact large enterprises and critical infrastructure providers in Europe, causing significant financial losses, reputational damage, and operational paralysis.

Mitigation Recommendations

1. Enforce strict multi-factor authentication (MFA) for all RDP and remote access services to prevent unauthorized access via compromised credentials. 2. Implement network segmentation to isolate domain controllers, backup servers, and critical infrastructure from general user networks, limiting lateral movement opportunities. 3. Harden backup infrastructure by restricting access, enabling immutable backups where possible, and regularly testing backup restoration processes. 4. Monitor for anomalous account creation, especially high-privilege impersonation accounts, and unusual use of remote access tools like AnyDesk. 5. Deploy endpoint detection and response (EDR) solutions capable of detecting reconnaissance tools such as SoftPerfect NetScan and NetExec, as well as suspicious PowerShell or command-line activity. 6. Conduct regular credential audits and enforce least privilege principles to reduce the impact of credential compromise. 7. Establish robust logging and alerting for RDP logins, administrative actions, and backup job modifications. 8. Educate staff on phishing and credential theft risks to reduce initial compromise likelihood. 9. Utilize threat intelligence feeds to detect and block known indicators of compromise associated with Lynx ransomware. 10. Prepare and regularly update incident response plans specifically addressing ransomware and backup sabotage scenarios.

Need more detailed analysis?Get Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://thedfirreport.com/2025/11/17/cats-got-your-files-lynx-ransomware"]
Adversary
null
Pulse Id
691b65be81167e8300b087de
Threat Score
null

Indicators of Compromise

Domain

ValueDescriptionCopy
domainnational.shitposting.agency
domaindelete.me

Hash

ValueDescriptionCopy
hash3073af95dfc18361caebccd69d0021a2
hash7532ff90145b8c59dc9440bf43dc87a5
hashe2179046b86deca297ebf7398b95e438
hash2b4b11d3ecffd82ed44db652cdd65733224f8e34
hash3e01df0155a539fe6d802ee9e9226d8c77fd96c9
hashefe8b9ff7ff93780c9162959a4c1e5ecf6e840a4
hash07b36c1660deb223749a8ac151676d8924bc13aa59e6712a3c14a2df5237264a
hash517288e12c05a92e483e6d80b9136c19bc58c46851720680bb6d1b7016034c37
hash6285d32a9491a0084da85a384a11e15e203badf67b1deed54155f02b7338b108

Ip

ValueDescriptionCopy
ip195.211.190.189
ip77.90.153.30

Threat ID: 691bd87cd4c3ef3c7a5e99cf

Added to database: 11/18/2025, 2:22:52 AM

Last enriched: 11/18/2025, 2:37:58 AM

Last updated: 11/19/2025, 4:06:21 AM

Views: 56

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats