Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Osiris: New Ransomware, Experienced Attackers?

0
Medium
Published: Fri Jan 23 2026 (01/23/2026, 10:08:47 UTC)
Source: AlienVault OTX General

Description

A new ransomware called Osiris was used in an attack on a major food service franchisee operator in Southeast Asia in November 2025. The ransomware shares similarities with previous Inc ransomware attacks, including the use of Wasabi buckets for data exfiltration and a specific version of Mimikatz. Osiris has typical ransomware functions, uses a hybrid encryption scheme, and drops a ransom note. The attack chain involved data exfiltration using Rclone, deployment of dual-use tools, and the use of a malicious driver called Abyssworker or Poortry. The attackers employed bring-your-own-vulnerable-driver (BYOVD) techniques to disable security software. While the impact of Osiris on the ransomware landscape remains uncertain, it appears to be wielded by experienced attackers with potential links to Inc ransomware or its affiliates.

AI-Powered Analysis

AILast updated: 01/23/2026, 10:35:15 UTC

Technical Analysis

Osiris is a recently observed ransomware variant first detected in a targeted attack against a major food service franchisee operator in Southeast Asia in November 2025. It shares notable similarities with the Inc ransomware family, including the use of Wasabi cloud storage buckets for exfiltrating stolen data and a specialized version of Mimikatz for credential harvesting. The ransomware employs a hybrid encryption scheme, encrypting victim files and dropping ransom notes to demand payment. The attack chain is complex, involving data exfiltration via Rclone, deployment of dual-use tools, and the use of a malicious kernel-mode driver named Abyssworker or Poortry. These drivers are leveraged through bring-your-own-vulnerable-driver (BYOVD) techniques, allowing attackers to disable or bypass security software by exploiting legitimate but vulnerable signed drivers. The attackers also use advanced tactics such as process injection, persistence via service creation, obfuscation, and credential dumping, as indicated by the referenced MITRE ATT&CK techniques (e.g., T1055, T1543.003, T1003.001). The presence of these sophisticated tools and methods suggests the threat actors behind Osiris are experienced and possibly affiliated with or inspired by the Inc ransomware group or its affiliates. Although the ransomware’s broader impact remains uncertain, its use of cloud-based exfiltration and kernel driver exploitation represents a significant evolution in ransomware tactics, complicating detection and mitigation efforts.

Potential Impact

For European organizations, Osiris poses a significant threat, particularly to sectors with extensive supply chains and customer-facing operations such as food service, hospitality, and logistics. The ransomware’s ability to exfiltrate data to cloud storage before encryption increases the risk of data breaches and regulatory penalties under GDPR. The use of BYOVD techniques to disable security software can render traditional endpoint protections ineffective, increasing the likelihood of successful compromise and prolonged dwell time. Credential theft capabilities facilitate lateral movement and privilege escalation, potentially allowing attackers to compromise multiple systems and disrupt business continuity. The hybrid encryption scheme and ransom demands can cause operational downtime, financial losses, and reputational damage. Organizations relying on vulnerable signed drivers or lacking robust cloud monitoring are particularly at risk. Given the sophistication of the attack chain, incident response and recovery may require significant resources and expertise.

Mitigation Recommendations

European organizations should implement targeted measures to mitigate Osiris ransomware risks. First, conduct thorough inventories of all signed drivers in use and apply strict whitelisting to prevent loading of vulnerable or unauthorized drivers, mitigating BYOVD exploitation. Deploy advanced endpoint detection and response (EDR) solutions capable of detecting suspicious driver behavior and process injection techniques. Monitor outbound network traffic for unusual connections to cloud storage services such as Wasabi, and implement strict controls and logging on cloud storage access. Harden credential management by enforcing multi-factor authentication, limiting administrative privileges, and monitoring for credential dumping activities. Regularly update and patch all software, including drivers, to reduce vulnerabilities. Conduct phishing awareness training to reduce the risk of initial infection via social engineering (T1204.002). Establish robust backup and recovery procedures, ensuring backups are isolated and immutable to prevent ransomware encryption. Finally, integrate threat intelligence feeds to detect emerging indicators related to Osiris and related Inc ransomware activity.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.security.com/threat-intelligence/new-ransomware-osiris"]
Adversary
Osiris
Pulse Id
697348b0134b41c432693dc5
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash316a534a8f17de17c38ee3f7c37eedf4
hash8e024a4c90f17f1aedc7fc53d5ca23c6
hash94d53edb65a089cd1491b4b2e46714aa
hashc29dbcc9742f3464c890882a5aec889e
hashd634c9a618a48ce2b892b9992f7ccbd7
hashf33ed8098974bba785a0c86e629e1622
hashfda664fc5e941ce6ff9c7ff30094af96
hash10770be56c62b66af3ff2d48a0ae36c61218e7ac
hash3511c07428fef55e2ff2f3b38442a91b6422e10b
hash40367efb18e13a4a62f1a9a47dedec2f55a8b8f9
hash44f3067c0ae0f5bb46b1c5455f881eb646fba782
hashc026aa8c56c11ca7b385739a4d722c28e1b4bbb9
hashc4da0ec252fdfefee9ccccf72aeab726a0f903a9
hashfc0be142a0d7da29257e8bd112f9ac1ce705f425
hash231e6bee1ee77d70854c1e3600342d8a69c18442f601cd201e033fa13cb8d5a5
hash39a0565f0c0adc4dc5b45c67134b3b488ddb9d67b417d32e9588235868316fac
hash44748c22baec61a0a3bd68b5739736fa15c479a3b28c1a0f9324823fc4e3fe34
hash44e007741f7650d1bd04cca3cd6dfd4f32328c401f95fb2d6d1fafce624cc99e
hash534bd6b99ed0e40ccbefad1656f03cc56dd9cc3f6d990cd7cb87af4cceebe144
hash5bd82a1b2db1bdc8ff74cacb53823edd8529dd9311a4248a86537a5b792939f8
hash5c2f663c8369af70f727cccf6e19248c50d7c157fe9e4db220fbe2b73f75c713
hash79bd876918bac1af641be10cfa3bb96b42c30d18ffba842e0eff8301e7659724
hash824e16f0664aaf427286283d0e56fdc0e6fa8698330fa13998df8999f2a6bb61
hash8c378f6200eec750ed66bde1e54c29b7bd172e503a5874ca2eead4705dd7b515
hashc189595c36996bdb7dce6ec28cf6906a00cbb5c5fe182e038bf476d74bed349e
hashc74509fcae41fc9f63667dce960d40907f81fae09957bb558d4c3e6a786dde7d
hashce719c223484157c7f6e52c71aadaf496d0dad77e40b5fc739ca3c51e9d26277
hashd524ca33a4f20f70cb55985289b047defc46660b6f07f1f286fa579aa70cf57a
hashd78f7d9b0e4e1f9c6b061fb0993c2f84e22c3e6f32d9db75013bcfbba7b64bc3
hashfc39cca5d71b1a9ed3c71cca6f1b86cfe03466624ad78cdb57580dba90847851
hashfff586c95b510e6c8c0e032524026ef22297869a86d14075cd601ca8e20d4a16

Domain

ValueDescriptionCopy
domainausare.net
domainwesir.net

Threat ID: 69734b8c4623b1157c2daa7f

Added to database: 1/23/2026, 10:21:00 AM

Last enriched: 1/23/2026, 10:35:15 AM

Last updated: 1/24/2026, 5:21:46 AM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats