Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Takes Aim at the Ransomware Throne

0
Medium
Published: Fri Apr 17 2026 (04/17/2026, 08:36:57 UTC)
Source: AlienVault OTX General

Description

In February 2025, BlackBasta ransomware operations ceased after their internal chat logs were leaked online, leading to disbandment. However, former affiliates continued launching attacks using different ransomware families, including the relatively unknown Payouts King group that emerged in April 2025. ThreatLabz has observed continued ransomware activity consistent with former BlackBasta initial access brokers since early 2026, utilizing similar tactics including spam bombing, Microsoft Teams phishing, and Quick Assist abuse. Payouts King implements sophisticated evasion techniques including stack-based string obfuscation, API hashing, and direct system calls to terminate security processes. The ransomware leverages 4,096-bit RSA and 256-bit AES counter mode encryption, selectively encrypting files while targeting security software and employing anti-forensics techniques like shadow copy deletion and event log clearing.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/17/2026, 11:32:25 UTC

Technical Analysis

Following the disbandment of BlackBasta ransomware operations in February 2025, former affiliates have continued ransomware attacks under new groups such as Payouts King. This group uses sophisticated evasion techniques including stack-based string obfuscation, API hashing, and direct system calls to terminate security processes. It employs strong encryption algorithms (4,096-bit RSA and 256-bit AES in counter mode) to selectively encrypt victim files. The ransomware also targets security software and uses anti-forensics techniques like shadow copy deletion and event log clearing. Initial access methods include spam bombing, Microsoft Teams phishing, and Quick Assist abuse. There is no indication of a patch or official remediation, and no known exploits in the wild have been reported for this malware.

Potential Impact

Payouts King ransomware selectively encrypts files using strong encryption algorithms, potentially causing significant data loss and operational disruption. Its targeting of security software and use of anti-forensics techniques complicate detection and recovery efforts. The use of phishing and social engineering for initial access increases the risk of compromise in organizations lacking adequate user awareness or controls. However, no known exploits in the wild have been reported, and the threat is currently assessed as medium severity.

Mitigation Recommendations

No official patch or remediation is available for this ransomware. Organizations should focus on user education to recognize phishing attempts, especially those leveraging Microsoft Teams and Quick Assist. Implementing robust email filtering and monitoring for spam bombing activity can help reduce initial access risk. Security teams should be aware of the ransomware's evasion techniques and monitor for suspicious process terminations and shadow copy deletions. Since this is malware rather than a software vulnerability, standard endpoint protection and backup strategies remain critical for mitigation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.zscaler.com/blogs/security-research/payouts-king-takes-aim-ransomware-throne"]
Adversary
Payouts King
Pulse Id
69e1f1296b63ec46a94782ce
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash335ad12a950f885073acdfebb250c93fb28ca3f374bbba5189986d9234dcbff4
hashd68ce82e82801cd487f9cd2d24f7b30e353cafd0704dcdf0bb8f12822d4227c2

Threat ID: 69e216a482d89c981fce57d0

Added to database: 4/17/2026, 11:16:52 AM

Last enriched: 4/17/2026, 11:32:25 AM

Last updated: 4/17/2026, 6:43:44 PM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses