Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Chinese Hackers Use Velociraptor IR Tool in Ransomware Attacks

0
Medium
Vulnerability
Published: Fri Oct 10 2025 (10/10/2025, 15:53:51 UTC)
Source: Dark Reading

Description

In a new wrinkle for adversary tactics, the Storm-2603 threat group is abusing the digital forensics and incident response (DFIR) tool to gain persistent access to victim networks.

AI-Powered Analysis

AILast updated: 10/11/2025, 01:15:02 UTC

Technical Analysis

The Storm-2603 threat group, linked to Chinese state-sponsored actors, has adopted a novel tactic by abusing Velociraptor, a legitimate digital forensics and incident response (DFIR) tool, to gain and maintain persistent access within victim networks. Velociraptor is designed to assist security teams in collecting forensic data and performing incident response activities. However, adversaries have repurposed its capabilities to evade detection, move laterally, and establish persistence without relying on traditional malware or exploits. This approach leverages the trust and legitimacy of the tool, making it difficult for defenders to distinguish between benign and malicious activity. Although no specific vulnerabilities in Velociraptor have been disclosed, the threat arises from the misuse of its features, such as remote code execution and file system access, which can be exploited once initial access is obtained. The attackers integrate this tactic into ransomware operations, using Velociraptor to maintain footholds, escalate privileges, and deploy ransomware payloads at opportune moments. This method complicates incident response, as defenders must differentiate between legitimate DFIR activities and malicious actions. The absence of known public exploits and the medium severity rating reflect the complexity and targeted nature of the attacks rather than widespread automated exploitation. Organizations employing Velociraptor or similar tools must be aware of this abuse vector and implement monitoring and access controls accordingly.

Potential Impact

For European organizations, the misuse of Velociraptor by Storm-2603 poses significant risks to confidentiality, integrity, and availability. The attackers' ability to maintain persistent access using a trusted tool can lead to prolonged undetected intrusions, data exfiltration, and ultimately ransomware deployment causing operational disruption. Critical sectors such as finance, energy, telecommunications, and government are particularly vulnerable due to their reliance on advanced DFIR tools and the high value of their data. The stealthy nature of this tactic can delay detection and remediation, increasing potential damage and recovery costs. Furthermore, the use of legitimate tools complicates attribution and response, potentially undermining trust in security operations. European organizations with mature cybersecurity infrastructures may still face challenges due to the sophistication of this threat. The impact extends beyond immediate victims, as successful ransomware attacks can disrupt supply chains and critical services across the region.

Mitigation Recommendations

To mitigate this threat, European organizations should implement the following specific measures: 1) Enforce strict access controls and least privilege principles for all DFIR tools, ensuring only authorized personnel can deploy and operate Velociraptor. 2) Monitor and log all Velociraptor-related activities with high granularity, including command execution, file access, and network connections, to detect anomalous or unauthorized usage. 3) Employ behavioral analytics and threat hunting focused on DFIR tool abuse patterns to identify potential misuse early. 4) Segment networks to limit lateral movement opportunities, especially between sensitive environments and endpoints where Velociraptor is deployed. 5) Regularly audit and validate the integrity of DFIR tool deployments to detect unauthorized modifications or installations. 6) Integrate threat intelligence on Storm-2603 tactics into security operations to enhance detection capabilities. 7) Conduct training and awareness for incident response teams on the risks of tool abuse and appropriate response procedures. 8) Maintain up-to-date backups and test ransomware recovery plans to minimize operational impact in case of compromise. These targeted actions go beyond generic advice by focusing on the unique challenges posed by the abuse of legitimate DFIR tools.

Need more detailed analysis?Get Pro

Threat ID: 68e9af5454cfe91d8fea39ac

Added to database: 10/11/2025, 1:13:56 AM

Last enriched: 10/11/2025, 1:15:02 AM

Last updated: 10/11/2025, 1:57:40 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats