Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Web Shells, Tunnels, and Ransomware: Dissecting a Warlock Attack

0
Medium
Published: Mon Mar 16 2026 (03/16/2026, 11:01:03 UTC)
Source: AlienVault OTX General

Description

The Warlock ransomware group has enhanced its attack chain by exploiting unpatched Microsoft SharePoint servers to gain initial access, primarily targeting technology, manufacturing, and government sectors. They employ advanced persistence and lateral movement techniques, including TightVNC for persistent remote access and Yuze for SOCKS5 proxy connections. A novel BYOVD (Bring Your Own Vulnerable Driver) technique abuses the NSecKrnl. sys driver to disable security products, increasing evasion capabilities. For command and control (C2) communications, Warlock uses tools like Velociraptor, VS Code tunnels, and Cloudflare Tunnel, complicating detection and response. The group’s toolkit expansion and use of multiple tunneling methods enable stealthy operations and effective lateral movement within compromised networks. The US, Germany, and Russia are the most affected countries, reflecting the group’s focus on high-value targets in critical sectors. Indicators include multiple file hashes, IP addresses, domains, and URLs associated with the malware and infrastructure. Although no CVSS score exists, the threat is assessed as medium severity due to its impact and complexity.

AI-Powered Analysis

AILast updated: 03/16/2026, 19:13:19 UTC

Technical Analysis

Warlock ransomware group has significantly evolved its attack methodology by integrating advanced tools and techniques to enhance persistence, lateral movement, and evasion within targeted environments. Initial access is primarily achieved through exploitation of unpatched Microsoft SharePoint servers, a common vector for web shell deployment and remote code execution. Post-compromise, Warlock deploys TightVNC, a legitimate remote desktop tool, to maintain persistent access, allowing attackers to control infected systems remotely. The group also uses Yuze, a tool for establishing SOCKS5 proxy tunnels, facilitating stealthy communication and lateral movement across networks. A notable innovation is the use of a BYOVD technique leveraging the NSecKrnl.sys vulnerable driver to terminate security products, effectively disabling endpoint protections and evading detection. For command and control, Warlock employs Velociraptor, an open-source endpoint monitoring tool, alongside VS Code tunnels and Cloudflare Tunnel, which provide encrypted and obfuscated channels for C2 traffic, complicating network-based detection. The attack chain reflects a sophisticated blend of legitimate tools and custom techniques, targeting primarily technology, manufacturing, and government sectors, with a geographic focus on the US, Germany, and Russia. Indicators of compromise include a variety of file hashes, IP addresses, domains, and URLs linked to the group’s infrastructure. The absence of known exploits in the wild suggests targeted operations rather than widespread automated campaigns. The medium severity rating reflects the threat’s capability to disrupt critical operations through ransomware deployment, combined with advanced evasion and persistence mechanisms.

Potential Impact

Organizations in technology, manufacturing, and government sectors face significant risks from Warlock attacks, including data encryption and loss due to ransomware, prolonged unauthorized access, and disruption of critical services. The exploitation of unpatched SharePoint servers can lead to widespread compromise within enterprise networks, enabling attackers to move laterally and escalate privileges. The BYOVD technique to disable security products increases the likelihood of successful attacks by reducing detection and response capabilities. Persistent remote access via TightVNC and tunneling through Yuze, VS Code, and Cloudflare complicates incident response and forensic investigations. The use of encrypted and obfuscated C2 channels can delay detection and containment, potentially leading to extensive data exfiltration and operational downtime. The impact is heightened in countries with high adoption of Microsoft SharePoint and critical infrastructure in targeted sectors, potentially affecting national security and economic stability. Overall, the threat can result in financial losses, reputational damage, regulatory penalties, and operational disruption.

Mitigation Recommendations

Organizations should prioritize patching and hardening Microsoft SharePoint servers to eliminate initial access vectors, including applying all relevant security updates and disabling unnecessary features. Implement strict network segmentation to limit lateral movement and restrict remote desktop tools like TightVNC to authorized users and systems only. Deploy endpoint detection and response (EDR) solutions capable of detecting BYOVD techniques and monitor for unusual driver loading or termination of security services. Monitor network traffic for anomalous SOCKS5 proxy connections and unusual tunneling activity, including VS Code and Cloudflare Tunnel usage, using advanced network analytics and threat hunting. Employ multi-factor authentication (MFA) and robust credential management to reduce the risk of credential theft and misuse. Maintain comprehensive logging and regularly review logs for indicators of compromise, including the provided file hashes, IPs, domains, and URLs. Conduct regular threat intelligence updates and red team exercises to simulate Warlock tactics and improve detection and response capabilities. Finally, develop and test incident response plans specifically addressing ransomware and advanced persistent threat scenarios to minimize operational impact.

Affected Countries

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Author
AlienVault
Tlp
white
References
["https://www.trendmicro.com/en_us/research/26/c/dissecting-a-warlock-attack.html"]
Adversary
Warlock
Pulse Id
69b7e2efd7e29c4058daf6d6
Threat Score
null

Indicators of Compromise

Hash

ValueDescriptionCopy
hash7535154acf4ef4611acbcdd9a3189e06
hash78cd87dfa9ba0f9b533310ca98b54489
hash80961850786d6531f075b8a6f9a756ad
hash7cbe4243c09f299b2dbfdc10f63846541367dcef
hash8b77260672fce04bca02a2ea9d3c40a70799c34d
hashb0b912a3fd1c05d72080848ec4c92880004021a1
hash06142acc825e0d799d12ff0a03fd714b119c69dce868c98bb5def165b2425454
hash129eec0c999653e30a659f6a336c76d3b6ce810d459a7f860bacbc06fd556277
hash206f27ae820783b7755bca89f83a0fe096dbb510018dd65b63fc80bd20c03261
hash34b2a6c334813adb2cc70f5bd666c4afbdc4a6d8a58cc1c7a902b13bbd2381f4
hash9a3b6cf6aec6df3e5b43dc024d288d06ae03d2a909f188f38ba275a5ac6d3bf0
hashef1b604bf2e2d598437d97af38cbed4e6dbdb3fde771eaaf8389b46c86391a0d
hash09401e712d4ffa5e497787978fe90c1557a0092b

Ip

ValueDescriptionCopy
ip198.13.158.193

Domain

ValueDescriptionCopy
domaincode.translatevv.com

Url

ValueDescriptionCopy
urlhttp://auth.qgtxtebl.workers.dev
urlhttps://litter.catbox.moe/zqqxb3.txt
urlhttps://files.catbox.moe/wzsjlw.dll
urlhttp://auth.qgtxtebl.workers.dev
urlhttps://litter.catbox.moe/zqqxb3.txt
urlhttps://files.catbox.moe/wzsjlw.dll

Threat ID: 69b8529a771bdb1749224218

Added to database: 3/16/2026, 6:57:30 PM

Last enriched: 3/16/2026, 7:13:19 PM

Last updated: 3/16/2026, 11:32:00 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

External Links

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses