Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

OSINT - New Arena Crysis Ransomware Variant Released

0
Low
Published: Fri Aug 25 2017 (08/25/2017, 00:00:00 UTC)
Source: CIRCL OSINT Feed
Vendor/Project: type
Product: osint

Description

OSINT - New Arena Crysis Ransomware Variant Released

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 05/10/2026, 02:22:26 UTC

Technical Analysis

Arena Crysis is a ransomware variant related to the Dharma family that encrypts files and appends the .arena extension. Distribution is mainly via manual compromise of Remote Desktop Services, typically through weak or exposed RDP credentials. The ransomware encrypts files, denying access to victims until a ransom is paid. Indicators include specific file hashes and a ransom note email address. No automated exploits or widespread campaigns have been reported. No patches exist as this is malware infection rather than a software vulnerability.

Potential Impact

Successful compromise results in encryption of files, causing loss of access and potential operational disruption. The ransomware affects confidentiality by encrypting data, availability by denying access, and integrity by altering file contents. Organizations lacking reliable backups may face data loss or be forced to pay ransom. The manual infection method suggests targeted attacks on systems with exposed or weak RDP access. No automated exploits or widespread campaigns have been observed. The overall impact is currently limited, reflected in the low severity rating.

Mitigation Recommendations

No official patch exists for this ransomware as it is malware rather than a software vulnerability. Organizations should secure Remote Desktop Services by enforcing strong, unique passwords and implementing multi-factor authentication (MFA). Restrict RDP access through network-level controls such as VPNs, IP whitelisting, or jump servers. Maintain robust, offline or immutable backups to enable recovery without paying ransom. Monitor for indicators of compromise including the provided file hashes and the .arena file extension. Employ endpoint detection and response (EDR) solutions capable of identifying ransomware behavior. Disable unused remote access protocols and conduct user training on phishing and social engineering risks. Maintain incident response plans for ransomware scenarios and stay updated with threat intelligence sources.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Uuid
59a3d08d-5dc8-4153-bc7c-456d950d210f
Original Timestamp
1774942903

Indicators of Compromise

Link

ValueDescriptionCopy
linkhttps://www.bleepingcomputer.com/news/security/new-arena-crysis-ransomware-variant-released/
linkhttps://www.virustotal.com/file/a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e/analysis/1503922016/
- Xchecked via VT: a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e

Comment

ValueDescriptionCopy
commentYesterday, ID-Ransomware's Michael Gillespie discovered a new variant of the Crysis/Dharma ransomware that is appending the .arena extension to encrypted files. It is not known exactly how this variant is being distributed, but in the past Crysis was typically spread by hacking into Remote Desktop Services and manually installing the ransomware.

Hash

ValueDescriptionCopy
hasha683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e
hash60cbe0e3a70ef3d56810bd9178ce232529c09c5f
- Xchecked via VT: a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e
hashf2679bdabe46e10edc6352fff3c829bc
- Xchecked via VT: a683494fc0d017fd3b4638f8b84caaaac145cc28bc211bd7361723368b4bb21e

Email

ValueDescriptionCopy
emailchivas@aolonline.top
Email to contact in ransom note

Url

ValueDescriptionCopy
urlhttps://forms.gle/KC1bqL56BTfo6pyi6

Threat ID: 69cbc738e6bfc5ba1d160f93

Added to database: 3/31/2026, 1:08:08 PM

Last enriched: 5/10/2026, 2:22:26 AM

Last updated: 5/15/2026, 10:10:27 AM

Views: 82

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses