Pay2Key's Resurgence: Iranian Cyber Warfare Targets the West
Pay2Key, an Iranian-backed ransomware-as-a-service operation, has re-emerged as Pay2Key.I2P, targeting Western organizations. Linked to the Fox Kitten APT group and collaborating with Mimic ransomware, the campaign has collected over $4 million in ransom payments in four months. The group offers an 80% profit share to affiliates supporting Iran or attacking its enemies, blending financial motivations with geopolitical objectives. Pay2Key.I2P employs sophisticated evasion techniques, including anti-analysis checks and obfuscation methods. The operation's strategic marketing on darknet forums and social media platforms indicates a planned rollout, with the addition of Linux-targeted ransomware expanding their attack surface.
AI Analysis
Technical Summary
Pay2Key.I2P represents the resurgence of the Iranian-backed ransomware-as-a-service (RaaS) operation known as Pay2Key, which has been linked to the Fox Kitten advanced persistent threat (APT) group. This campaign targets Western organizations with a dual motivation: financial gain and geopolitical objectives aligned with Iranian interests. The operation has reportedly amassed over $4 million in ransom payments within a four-month period, demonstrating both its effectiveness and scale. Pay2Key.I2P distinguishes itself through sophisticated evasion techniques, including anti-analysis checks and code obfuscation, which complicate detection and forensic analysis. The group’s strategic marketing efforts on darknet forums and social media platforms indicate a well-planned and ongoing rollout. Notably, the ransomware has expanded its attack surface by incorporating Linux-targeted payloads, increasing the range of potential victims beyond traditional Windows environments. The collaboration with Mimic ransomware suggests a coordinated approach to maximize impact and ransom collection. The tactics, techniques, and procedures (TTPs) associated with this campaign include credential dumping, process injection, obfuscation, defense evasion, and ransomware deployment, as indicated by the referenced MITRE ATT&CK techniques (e.g., T1489, T1553.002, T1140, T1036, T1055, T1486). Although no specific affected software versions or patches are identified, the campaign’s operational sophistication and geopolitical backing make it a persistent threat to critical infrastructure and enterprises in the West.
Potential Impact
For European organizations, Pay2Key.I2P poses a significant risk due to its ransomware capabilities combined with geopolitical motivations. The financial impact includes ransom payments, operational downtime, and potential loss of sensitive data. The ransomware’s ability to target Linux systems broadens the scope to include organizations relying on Linux-based infrastructure, such as web servers, cloud environments, and industrial control systems. The campaign’s evasion techniques increase the likelihood of successful infiltration and prolonged undetected presence, which can lead to extensive data encryption and disruption of critical services. Given the geopolitical context, organizations involved in sectors such as energy, finance, healthcare, and government may face targeted attacks aiming to destabilize or extract intelligence. The collaboration with Mimic ransomware operators further amplifies the threat, potentially leading to multi-vector attacks that complicate incident response. Additionally, the campaign’s profit-sharing model incentivizes affiliates to attack entities aligned against Iran, increasing the risk profile for European companies engaged in geopolitical activities or partnerships contrary to Iranian interests.
Mitigation Recommendations
European organizations should implement a multi-layered defense strategy tailored to the specific tactics of Pay2Key.I2P. This includes deploying advanced endpoint detection and response (EDR) solutions capable of identifying obfuscated code and anti-analysis behaviors. Network segmentation and strict access controls can limit lateral movement and credential abuse. Regularly updated threat intelligence feeds should be integrated to detect indicators of compromise related to Pay2Key and Mimic ransomware. Organizations should conduct thorough audits of Linux systems and apply security hardening practices, including minimizing exposed services and enforcing least privilege principles. Incident response plans must be updated to address ransomware scenarios involving both Windows and Linux environments, emphasizing rapid containment and recovery. Employee training should focus on recognizing phishing and social engineering tactics that may serve as initial infection vectors. Given the geopolitical nature of the threat, organizations should collaborate with national cybersecurity agencies and share intelligence through trusted platforms to enhance collective defense. Finally, maintaining offline, immutable backups and testing restoration procedures are critical to mitigating the impact of successful ransomware encryption.
Affected Countries
Germany, France, United Kingdom, Italy, Netherlands, Belgium, Poland, Sweden
Indicators of Compromise
- hash: 06807d8d7282959ce062f92a708d382f
- hash: 45ddf68aa972951e22fad44817ee4e17
- hash: 7abce96681b4a74a67be918ab655e8a52040c128
- hash: ff2d55a844c1fd37b3841cefa7e2d21de5fa8bac
- hash: 17fc4df8ef9a92c972684cba707c3976b91bcd7f0251f42f1b63e4de0e688d6c
- hash: 188c215fa32a445d7ffa90dc51c58bddcd62a714a8f6eac89b92574c349bf901
- hash: 1c3f2530b2764754045039066d2c277dff4efabd4f15f2944e30b10e82f443c0
- hash: 1c70d4280835f18654422cec1b209eec856f90344b8f02afca82716555346a55
- hash: 1d0ec8e34703a7589533462be62c020004cfe0f7b20204f9e6c79b84cbfafc9b
- hash: 242fa471582c2f37c17717dc260cb108584c44e86b8831382f7b2f5fc63aeb6b
- hash: 2fefb69e4b2310be5e09d329e8cf1bebd1f9e18884c8c2a38af8d7ea46bd5e01
- hash: 39d3ba87a27eae69a01666b0ecbb8c60259be4b3decf4cdd1d950c98c6c0b08c
- hash: 3ba64d08edbfadec8e301673df8b36f9f7475c83587930fc9577ea366ec06839
- hash: 60ec008c8515934c3c8d89f84bbcc8fac9144e642c0143d8230f465f4e66f62c
- hash: 65be56f46b2aa6bb64b9e560a083a77a80a1b5a459bcba8d385aa62f8e7b153f
- hash: 6f0b01ceb4e2cfbdfe8b92729f18eb7f4953bf9859085dc3ac81983274065d6c
- hash: 7336b865f232f7fccb9b85524d5ebdc444344de363f77e1b1c3eaeeb3428e1a5
- hash: 791bb67fe91e9bd129607a94714e9e79afe304271d839b369aab8813d2da4ac1
- hash: 89ad2164717bd5f5f93fbb4cebf0efeb473097408fddfc7fc7b924d790514dc5
- hash: 9c06ea83553c6dab3d831e1046cee237a9c1b1ed79b3b2e37ed9f3c8a38643eb
- hash: a05c18e81911608cf2edb19907092d542548abb695e48e3217dfbec2f3dfcd04
- hash: a8bfa1389c49836264cfa31fc4410b88897a78d9c2152729d28eca8c12171b9e
- hash: b64305852ddb317b7839b39db602fcdda60e7658f391ff4ba52fce4dbca89089
- hash: bd4635d582413f84ac83adbb4b449b18bac4fc87ca000d0c7be84ad0f9caf68e
- hash: d61a55d368a1dcf570f633c7a23ae12361749c2d7000178dd9e353528c325907
- hash: d8e423c8644b686ad3376f38f3e4df55a152ee4cac2af3079651263f002d8c26
- hash: e237cf378e2848f687a494ab67faf9e7ec784d00090cd598a9f1e3291c97181f
- hash: f947771556e0a0d900b21de6a37abd04c1d2e0e84d0062f61c49d792ffedeec5
- domain: gos-usa.xyz
Pay2Key's Resurgence: Iranian Cyber Warfare Targets the West
Description
Pay2Key, an Iranian-backed ransomware-as-a-service operation, has re-emerged as Pay2Key.I2P, targeting Western organizations. Linked to the Fox Kitten APT group and collaborating with Mimic ransomware, the campaign has collected over $4 million in ransom payments in four months. The group offers an 80% profit share to affiliates supporting Iran or attacking its enemies, blending financial motivations with geopolitical objectives. Pay2Key.I2P employs sophisticated evasion techniques, including anti-analysis checks and obfuscation methods. The operation's strategic marketing on darknet forums and social media platforms indicates a planned rollout, with the addition of Linux-targeted ransomware expanding their attack surface.
AI-Powered Analysis
Technical Analysis
Pay2Key.I2P represents the resurgence of the Iranian-backed ransomware-as-a-service (RaaS) operation known as Pay2Key, which has been linked to the Fox Kitten advanced persistent threat (APT) group. This campaign targets Western organizations with a dual motivation: financial gain and geopolitical objectives aligned with Iranian interests. The operation has reportedly amassed over $4 million in ransom payments within a four-month period, demonstrating both its effectiveness and scale. Pay2Key.I2P distinguishes itself through sophisticated evasion techniques, including anti-analysis checks and code obfuscation, which complicate detection and forensic analysis. The group’s strategic marketing efforts on darknet forums and social media platforms indicate a well-planned and ongoing rollout. Notably, the ransomware has expanded its attack surface by incorporating Linux-targeted payloads, increasing the range of potential victims beyond traditional Windows environments. The collaboration with Mimic ransomware suggests a coordinated approach to maximize impact and ransom collection. The tactics, techniques, and procedures (TTPs) associated with this campaign include credential dumping, process injection, obfuscation, defense evasion, and ransomware deployment, as indicated by the referenced MITRE ATT&CK techniques (e.g., T1489, T1553.002, T1140, T1036, T1055, T1486). Although no specific affected software versions or patches are identified, the campaign’s operational sophistication and geopolitical backing make it a persistent threat to critical infrastructure and enterprises in the West.
Potential Impact
For European organizations, Pay2Key.I2P poses a significant risk due to its ransomware capabilities combined with geopolitical motivations. The financial impact includes ransom payments, operational downtime, and potential loss of sensitive data. The ransomware’s ability to target Linux systems broadens the scope to include organizations relying on Linux-based infrastructure, such as web servers, cloud environments, and industrial control systems. The campaign’s evasion techniques increase the likelihood of successful infiltration and prolonged undetected presence, which can lead to extensive data encryption and disruption of critical services. Given the geopolitical context, organizations involved in sectors such as energy, finance, healthcare, and government may face targeted attacks aiming to destabilize or extract intelligence. The collaboration with Mimic ransomware operators further amplifies the threat, potentially leading to multi-vector attacks that complicate incident response. Additionally, the campaign’s profit-sharing model incentivizes affiliates to attack entities aligned against Iran, increasing the risk profile for European companies engaged in geopolitical activities or partnerships contrary to Iranian interests.
Mitigation Recommendations
European organizations should implement a multi-layered defense strategy tailored to the specific tactics of Pay2Key.I2P. This includes deploying advanced endpoint detection and response (EDR) solutions capable of identifying obfuscated code and anti-analysis behaviors. Network segmentation and strict access controls can limit lateral movement and credential abuse. Regularly updated threat intelligence feeds should be integrated to detect indicators of compromise related to Pay2Key and Mimic ransomware. Organizations should conduct thorough audits of Linux systems and apply security hardening practices, including minimizing exposed services and enforcing least privilege principles. Incident response plans must be updated to address ransomware scenarios involving both Windows and Linux environments, emphasizing rapid containment and recovery. Employee training should focus on recognizing phishing and social engineering tactics that may serve as initial infection vectors. Given the geopolitical nature of the threat, organizations should collaborate with national cybersecurity agencies and share intelligence through trusted platforms to enhance collective defense. Finally, maintaining offline, immutable backups and testing restoration procedures are critical to mitigating the impact of successful ransomware encryption.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://www.morphisec.com/blog/pay2key-resurgence-iranian-cyber-warfare/"]
- Adversary
- Pay2Key.I2P
- Pulse Id
- 687006f1977201220fba17a2
- Threat Score
- null
Indicators of Compromise
Hash
Value | Description | Copy |
---|---|---|
hash06807d8d7282959ce062f92a708d382f | — | |
hash45ddf68aa972951e22fad44817ee4e17 | — | |
hash7abce96681b4a74a67be918ab655e8a52040c128 | — | |
hashff2d55a844c1fd37b3841cefa7e2d21de5fa8bac | — | |
hash17fc4df8ef9a92c972684cba707c3976b91bcd7f0251f42f1b63e4de0e688d6c | — | |
hash188c215fa32a445d7ffa90dc51c58bddcd62a714a8f6eac89b92574c349bf901 | — | |
hash1c3f2530b2764754045039066d2c277dff4efabd4f15f2944e30b10e82f443c0 | — | |
hash1c70d4280835f18654422cec1b209eec856f90344b8f02afca82716555346a55 | — | |
hash1d0ec8e34703a7589533462be62c020004cfe0f7b20204f9e6c79b84cbfafc9b | — | |
hash242fa471582c2f37c17717dc260cb108584c44e86b8831382f7b2f5fc63aeb6b | — | |
hash2fefb69e4b2310be5e09d329e8cf1bebd1f9e18884c8c2a38af8d7ea46bd5e01 | — | |
hash39d3ba87a27eae69a01666b0ecbb8c60259be4b3decf4cdd1d950c98c6c0b08c | — | |
hash3ba64d08edbfadec8e301673df8b36f9f7475c83587930fc9577ea366ec06839 | — | |
hash60ec008c8515934c3c8d89f84bbcc8fac9144e642c0143d8230f465f4e66f62c | — | |
hash65be56f46b2aa6bb64b9e560a083a77a80a1b5a459bcba8d385aa62f8e7b153f | — | |
hash6f0b01ceb4e2cfbdfe8b92729f18eb7f4953bf9859085dc3ac81983274065d6c | — | |
hash7336b865f232f7fccb9b85524d5ebdc444344de363f77e1b1c3eaeeb3428e1a5 | — | |
hash791bb67fe91e9bd129607a94714e9e79afe304271d839b369aab8813d2da4ac1 | — | |
hash89ad2164717bd5f5f93fbb4cebf0efeb473097408fddfc7fc7b924d790514dc5 | — | |
hash9c06ea83553c6dab3d831e1046cee237a9c1b1ed79b3b2e37ed9f3c8a38643eb | — | |
hasha05c18e81911608cf2edb19907092d542548abb695e48e3217dfbec2f3dfcd04 | — | |
hasha8bfa1389c49836264cfa31fc4410b88897a78d9c2152729d28eca8c12171b9e | — | |
hashb64305852ddb317b7839b39db602fcdda60e7658f391ff4ba52fce4dbca89089 | — | |
hashbd4635d582413f84ac83adbb4b449b18bac4fc87ca000d0c7be84ad0f9caf68e | — | |
hashd61a55d368a1dcf570f633c7a23ae12361749c2d7000178dd9e353528c325907 | — | |
hashd8e423c8644b686ad3376f38f3e4df55a152ee4cac2af3079651263f002d8c26 | — | |
hashe237cf378e2848f687a494ab67faf9e7ec784d00090cd598a9f1e3291c97181f | — | |
hashf947771556e0a0d900b21de6a37abd04c1d2e0e84d0062f61c49d792ffedeec5 | — |
Domain
Value | Description | Copy |
---|---|---|
domaingos-usa.xyz | — |
Threat ID: 68703822a83201eaacaa3af4
Added to database: 7/10/2025, 10:01:06 PM
Last enriched: 7/10/2025, 10:17:20 PM
Last updated: 7/11/2025, 1:45:14 AM
Views: 4
Related Threats
Deploying NetSupport RAT via WordPress & ClickFix
MediumAnalysis of APT-C-55 (Kimsuky) Organization's HappyDoor Backdoor Attack Based on VMP Strong Shell
MediumAtomic macOS Stealer includes a backdoor for persistent access
MediumGoogle and Microsoft Trusted Them. 2.3 Million Users Installed Them. They Were Malware.
MediummacOS.ZuRu Resurfaces | Modified Khepri C2 Hides Inside Doctored Termius App
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.