Osiris: New Ransomware, Experienced Attackers?
A new ransomware called Osiris was used in an attack on a major food service franchisee operator in Southeast Asia in November 2025. The ransomware shares similarities with previous Inc ransomware attacks, including the use of Wasabi buckets for data exfiltration and a specific version of Mimikatz. Osiris has typical ransomware functions, uses a hybrid encryption scheme, and drops a ransom note. The attack chain involved data exfiltration using Rclone, deployment of dual-use tools, and the use of a malicious driver called Abyssworker or Poortry. The attackers employed bring-your-own-vulnerable-driver (BYOVD) techniques to disable security software. While the impact of Osiris on the ransomware landscape remains uncertain, it appears to be wielded by experienced attackers with potential links to Inc ransomware or its affiliates.
AI Analysis
Technical Summary
Osiris is a recently observed ransomware variant first detected in a targeted attack against a major food service franchisee operator in Southeast Asia in November 2025. It shares notable similarities with the Inc ransomware family, including the use of Wasabi cloud storage buckets for exfiltrating stolen data and a specialized version of Mimikatz for credential harvesting. The ransomware employs a hybrid encryption scheme, encrypting victim files and dropping ransom notes to demand payment. The attack chain is complex, involving data exfiltration via Rclone, deployment of dual-use tools, and the use of a malicious kernel-mode driver named Abyssworker or Poortry. These drivers are leveraged through bring-your-own-vulnerable-driver (BYOVD) techniques, allowing attackers to disable or bypass security software by exploiting legitimate but vulnerable signed drivers. The attackers also use advanced tactics such as process injection, persistence via service creation, obfuscation, and credential dumping, as indicated by the referenced MITRE ATT&CK techniques (e.g., T1055, T1543.003, T1003.001). The presence of these sophisticated tools and methods suggests the threat actors behind Osiris are experienced and possibly affiliated with or inspired by the Inc ransomware group or its affiliates. Although the ransomware’s broader impact remains uncertain, its use of cloud-based exfiltration and kernel driver exploitation represents a significant evolution in ransomware tactics, complicating detection and mitigation efforts.
Potential Impact
For European organizations, Osiris poses a significant threat, particularly to sectors with extensive supply chains and customer-facing operations such as food service, hospitality, and logistics. The ransomware’s ability to exfiltrate data to cloud storage before encryption increases the risk of data breaches and regulatory penalties under GDPR. The use of BYOVD techniques to disable security software can render traditional endpoint protections ineffective, increasing the likelihood of successful compromise and prolonged dwell time. Credential theft capabilities facilitate lateral movement and privilege escalation, potentially allowing attackers to compromise multiple systems and disrupt business continuity. The hybrid encryption scheme and ransom demands can cause operational downtime, financial losses, and reputational damage. Organizations relying on vulnerable signed drivers or lacking robust cloud monitoring are particularly at risk. Given the sophistication of the attack chain, incident response and recovery may require significant resources and expertise.
Mitigation Recommendations
European organizations should implement targeted measures to mitigate Osiris ransomware risks. First, conduct thorough inventories of all signed drivers in use and apply strict whitelisting to prevent loading of vulnerable or unauthorized drivers, mitigating BYOVD exploitation. Deploy advanced endpoint detection and response (EDR) solutions capable of detecting suspicious driver behavior and process injection techniques. Monitor outbound network traffic for unusual connections to cloud storage services such as Wasabi, and implement strict controls and logging on cloud storage access. Harden credential management by enforcing multi-factor authentication, limiting administrative privileges, and monitoring for credential dumping activities. Regularly update and patch all software, including drivers, to reduce vulnerabilities. Conduct phishing awareness training to reduce the risk of initial infection via social engineering (T1204.002). Establish robust backup and recovery procedures, ensuring backups are isolated and immutable to prevent ransomware encryption. Finally, integrate threat intelligence feeds to detect emerging indicators related to Osiris and related Inc ransomware activity.
Affected Countries
United Kingdom, Germany, France, Netherlands, Italy, Spain, Belgium
Indicators of Compromise
- hash: 316a534a8f17de17c38ee3f7c37eedf4
- hash: 8e024a4c90f17f1aedc7fc53d5ca23c6
- hash: 94d53edb65a089cd1491b4b2e46714aa
- hash: c29dbcc9742f3464c890882a5aec889e
- hash: d634c9a618a48ce2b892b9992f7ccbd7
- hash: f33ed8098974bba785a0c86e629e1622
- hash: fda664fc5e941ce6ff9c7ff30094af96
- hash: 10770be56c62b66af3ff2d48a0ae36c61218e7ac
- hash: 3511c07428fef55e2ff2f3b38442a91b6422e10b
- hash: 40367efb18e13a4a62f1a9a47dedec2f55a8b8f9
- hash: 44f3067c0ae0f5bb46b1c5455f881eb646fba782
- hash: c026aa8c56c11ca7b385739a4d722c28e1b4bbb9
- hash: c4da0ec252fdfefee9ccccf72aeab726a0f903a9
- hash: fc0be142a0d7da29257e8bd112f9ac1ce705f425
- hash: 231e6bee1ee77d70854c1e3600342d8a69c18442f601cd201e033fa13cb8d5a5
- hash: 39a0565f0c0adc4dc5b45c67134b3b488ddb9d67b417d32e9588235868316fac
- hash: 44748c22baec61a0a3bd68b5739736fa15c479a3b28c1a0f9324823fc4e3fe34
- hash: 44e007741f7650d1bd04cca3cd6dfd4f32328c401f95fb2d6d1fafce624cc99e
- hash: 534bd6b99ed0e40ccbefad1656f03cc56dd9cc3f6d990cd7cb87af4cceebe144
- hash: 5bd82a1b2db1bdc8ff74cacb53823edd8529dd9311a4248a86537a5b792939f8
- hash: 5c2f663c8369af70f727cccf6e19248c50d7c157fe9e4db220fbe2b73f75c713
- hash: 79bd876918bac1af641be10cfa3bb96b42c30d18ffba842e0eff8301e7659724
- hash: 824e16f0664aaf427286283d0e56fdc0e6fa8698330fa13998df8999f2a6bb61
- hash: 8c378f6200eec750ed66bde1e54c29b7bd172e503a5874ca2eead4705dd7b515
- hash: c189595c36996bdb7dce6ec28cf6906a00cbb5c5fe182e038bf476d74bed349e
- hash: c74509fcae41fc9f63667dce960d40907f81fae09957bb558d4c3e6a786dde7d
- hash: ce719c223484157c7f6e52c71aadaf496d0dad77e40b5fc739ca3c51e9d26277
- hash: d524ca33a4f20f70cb55985289b047defc46660b6f07f1f286fa579aa70cf57a
- hash: d78f7d9b0e4e1f9c6b061fb0993c2f84e22c3e6f32d9db75013bcfbba7b64bc3
- hash: fc39cca5d71b1a9ed3c71cca6f1b86cfe03466624ad78cdb57580dba90847851
- hash: fff586c95b510e6c8c0e032524026ef22297869a86d14075cd601ca8e20d4a16
- domain: ausare.net
- domain: wesir.net
Osiris: New Ransomware, Experienced Attackers?
Description
A new ransomware called Osiris was used in an attack on a major food service franchisee operator in Southeast Asia in November 2025. The ransomware shares similarities with previous Inc ransomware attacks, including the use of Wasabi buckets for data exfiltration and a specific version of Mimikatz. Osiris has typical ransomware functions, uses a hybrid encryption scheme, and drops a ransom note. The attack chain involved data exfiltration using Rclone, deployment of dual-use tools, and the use of a malicious driver called Abyssworker or Poortry. The attackers employed bring-your-own-vulnerable-driver (BYOVD) techniques to disable security software. While the impact of Osiris on the ransomware landscape remains uncertain, it appears to be wielded by experienced attackers with potential links to Inc ransomware or its affiliates.
AI-Powered Analysis
Technical Analysis
Osiris is a recently observed ransomware variant first detected in a targeted attack against a major food service franchisee operator in Southeast Asia in November 2025. It shares notable similarities with the Inc ransomware family, including the use of Wasabi cloud storage buckets for exfiltrating stolen data and a specialized version of Mimikatz for credential harvesting. The ransomware employs a hybrid encryption scheme, encrypting victim files and dropping ransom notes to demand payment. The attack chain is complex, involving data exfiltration via Rclone, deployment of dual-use tools, and the use of a malicious kernel-mode driver named Abyssworker or Poortry. These drivers are leveraged through bring-your-own-vulnerable-driver (BYOVD) techniques, allowing attackers to disable or bypass security software by exploiting legitimate but vulnerable signed drivers. The attackers also use advanced tactics such as process injection, persistence via service creation, obfuscation, and credential dumping, as indicated by the referenced MITRE ATT&CK techniques (e.g., T1055, T1543.003, T1003.001). The presence of these sophisticated tools and methods suggests the threat actors behind Osiris are experienced and possibly affiliated with or inspired by the Inc ransomware group or its affiliates. Although the ransomware’s broader impact remains uncertain, its use of cloud-based exfiltration and kernel driver exploitation represents a significant evolution in ransomware tactics, complicating detection and mitigation efforts.
Potential Impact
For European organizations, Osiris poses a significant threat, particularly to sectors with extensive supply chains and customer-facing operations such as food service, hospitality, and logistics. The ransomware’s ability to exfiltrate data to cloud storage before encryption increases the risk of data breaches and regulatory penalties under GDPR. The use of BYOVD techniques to disable security software can render traditional endpoint protections ineffective, increasing the likelihood of successful compromise and prolonged dwell time. Credential theft capabilities facilitate lateral movement and privilege escalation, potentially allowing attackers to compromise multiple systems and disrupt business continuity. The hybrid encryption scheme and ransom demands can cause operational downtime, financial losses, and reputational damage. Organizations relying on vulnerable signed drivers or lacking robust cloud monitoring are particularly at risk. Given the sophistication of the attack chain, incident response and recovery may require significant resources and expertise.
Mitigation Recommendations
European organizations should implement targeted measures to mitigate Osiris ransomware risks. First, conduct thorough inventories of all signed drivers in use and apply strict whitelisting to prevent loading of vulnerable or unauthorized drivers, mitigating BYOVD exploitation. Deploy advanced endpoint detection and response (EDR) solutions capable of detecting suspicious driver behavior and process injection techniques. Monitor outbound network traffic for unusual connections to cloud storage services such as Wasabi, and implement strict controls and logging on cloud storage access. Harden credential management by enforcing multi-factor authentication, limiting administrative privileges, and monitoring for credential dumping activities. Regularly update and patch all software, including drivers, to reduce vulnerabilities. Conduct phishing awareness training to reduce the risk of initial infection via social engineering (T1204.002). Establish robust backup and recovery procedures, ensuring backups are isolated and immutable to prevent ransomware encryption. Finally, integrate threat intelligence feeds to detect emerging indicators related to Osiris and related Inc ransomware activity.
Affected Countries
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.security.com/threat-intelligence/new-ransomware-osiris"]
- Adversary
- Osiris
- Pulse Id
- 697348b0134b41c432693dc5
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash316a534a8f17de17c38ee3f7c37eedf4 | — | |
hash8e024a4c90f17f1aedc7fc53d5ca23c6 | — | |
hash94d53edb65a089cd1491b4b2e46714aa | — | |
hashc29dbcc9742f3464c890882a5aec889e | — | |
hashd634c9a618a48ce2b892b9992f7ccbd7 | — | |
hashf33ed8098974bba785a0c86e629e1622 | — | |
hashfda664fc5e941ce6ff9c7ff30094af96 | — | |
hash10770be56c62b66af3ff2d48a0ae36c61218e7ac | — | |
hash3511c07428fef55e2ff2f3b38442a91b6422e10b | — | |
hash40367efb18e13a4a62f1a9a47dedec2f55a8b8f9 | — | |
hash44f3067c0ae0f5bb46b1c5455f881eb646fba782 | — | |
hashc026aa8c56c11ca7b385739a4d722c28e1b4bbb9 | — | |
hashc4da0ec252fdfefee9ccccf72aeab726a0f903a9 | — | |
hashfc0be142a0d7da29257e8bd112f9ac1ce705f425 | — | |
hash231e6bee1ee77d70854c1e3600342d8a69c18442f601cd201e033fa13cb8d5a5 | — | |
hash39a0565f0c0adc4dc5b45c67134b3b488ddb9d67b417d32e9588235868316fac | — | |
hash44748c22baec61a0a3bd68b5739736fa15c479a3b28c1a0f9324823fc4e3fe34 | — | |
hash44e007741f7650d1bd04cca3cd6dfd4f32328c401f95fb2d6d1fafce624cc99e | — | |
hash534bd6b99ed0e40ccbefad1656f03cc56dd9cc3f6d990cd7cb87af4cceebe144 | — | |
hash5bd82a1b2db1bdc8ff74cacb53823edd8529dd9311a4248a86537a5b792939f8 | — | |
hash5c2f663c8369af70f727cccf6e19248c50d7c157fe9e4db220fbe2b73f75c713 | — | |
hash79bd876918bac1af641be10cfa3bb96b42c30d18ffba842e0eff8301e7659724 | — | |
hash824e16f0664aaf427286283d0e56fdc0e6fa8698330fa13998df8999f2a6bb61 | — | |
hash8c378f6200eec750ed66bde1e54c29b7bd172e503a5874ca2eead4705dd7b515 | — | |
hashc189595c36996bdb7dce6ec28cf6906a00cbb5c5fe182e038bf476d74bed349e | — | |
hashc74509fcae41fc9f63667dce960d40907f81fae09957bb558d4c3e6a786dde7d | — | |
hashce719c223484157c7f6e52c71aadaf496d0dad77e40b5fc739ca3c51e9d26277 | — | |
hashd524ca33a4f20f70cb55985289b047defc46660b6f07f1f286fa579aa70cf57a | — | |
hashd78f7d9b0e4e1f9c6b061fb0993c2f84e22c3e6f32d9db75013bcfbba7b64bc3 | — | |
hashfc39cca5d71b1a9ed3c71cca6f1b86cfe03466624ad78cdb57580dba90847851 | — | |
hashfff586c95b510e6c8c0e032524026ef22297869a86d14075cd601ca8e20d4a16 | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainausare.net | — | |
domainwesir.net | — |
Threat ID: 69734b8c4623b1157c2daa7f
Added to database: 1/23/2026, 10:21:00 AM
Last enriched: 1/23/2026, 10:35:15 AM
Last updated: 1/24/2026, 5:21:46 AM
Views: 20
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
ThreatFox IOCs for 2026-01-23
MediumWatering Hole Attack Targets EmEditor Users With Information-Stealing Malware
MediumSandworm behind cyberattack on Poland's power grid in late 2025
MediumPhishing Attack Uses Stolen Credentials to Install LogMeIn RMM for Persistent Access
MediumIn Other News: €1.2B GDPR Fines, Net-NTLMv1 Rainbow Tables, Rockwell Security Notice
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.