Yurei the New Ransomware Group on the Scene
Yurei, a newly emerged ransomware group, targeted a Sri Lankan food manufacturing company on September 5, 2025. The group employs a double-extortion model, encrypting files and exfiltrating sensitive data. Check Point Research discovered that Yurei's ransomware is based on the open-source Prince-Ransomware, with minor modifications. The ransomware, written in Go, contains a flaw allowing partial recovery through Shadow Copies. Since its first victim, Yurei has quickly expanded to three victims across Sri Lanka, India, and Nigeria. The investigation suggests the threat actor may originate from Morocco. Yurei's operation demonstrates how open-source malware lowers the entry barrier for cybercriminals, enabling less-skilled actors to launch ransomware attacks.
AI Analysis
Technical Summary
Yurei is a recently identified ransomware group that surfaced in September 2025, initially targeting a food manufacturing company in Sri Lanka. This group employs a double-extortion ransomware model, which involves both encrypting victim files and exfiltrating sensitive data to pressure victims into paying ransoms. The ransomware used by Yurei is a derivative of the open-source Prince-Ransomware, written in the Go programming language, with minor modifications. Notably, the ransomware contains a flaw that allows partial recovery of encrypted data through the use of Windows Shadow Copies, which are snapshots of system files. Since its emergence, Yurei has expanded its operations to at least three victims across Sri Lanka, India, and Nigeria. The threat actor is suspected to originate from Morocco. The use of open-source ransomware lowers the technical barrier for entry, enabling less-skilled cybercriminals to launch effective ransomware campaigns. The malware leverages multiple tactics and techniques mapped to MITRE ATT&CK, including credential dumping, data exfiltration, process discovery, and defense evasion. Indicators of compromise include multiple file hashes and a Tor onion domain used for ransom communications. Although no known exploits are reported in the wild beyond these incidents, the rapid expansion and double-extortion approach highlight the operational risk posed by Yurei.
Potential Impact
For European organizations, the emergence of Yurei ransomware represents a growing threat, especially to sectors similar to those initially targeted, such as manufacturing and food production. The double-extortion model increases the risk of data breaches and reputational damage, as stolen sensitive data may be leaked if ransoms are not paid. The ransomware's partial recoverability via Shadow Copies may reduce total data loss but does not eliminate operational disruption or data confidentiality risks. European organizations with supply chain links to South Asia or Africa could be indirectly affected through third-party compromises. Additionally, the use of open-source ransomware variants like Yurei lowers the entry barrier for attackers, potentially increasing the frequency of attacks across Europe. The threat actor's suspected Moroccan origin and targeting patterns suggest potential geopolitical motivations or opportunistic targeting, which could extend to European entities. The medium severity rating reflects moderate impact potential but also indicates that effective mitigation and incident response can reduce damage.
Mitigation Recommendations
European organizations should implement targeted defenses against Yurei ransomware by: 1) Ensuring robust and frequent backups with offline or immutable storage to mitigate encryption impact, while also verifying backup integrity regularly. 2) Enabling and protecting Windows Shadow Copies, as they may allow partial recovery from this ransomware variant. 3) Implementing strict network segmentation and least privilege access to limit lateral movement and credential theft. 4) Deploying advanced endpoint detection and response (EDR) solutions capable of detecting behaviors associated with credential dumping, data exfiltration, and ransomware execution, especially those leveraging Go-based malware. 5) Monitoring for indicators of compromise such as the provided file hashes and suspicious Tor domain communications. 6) Conducting regular user awareness training focused on phishing and social engineering, which remain common initial infection vectors. 7) Applying timely security patches and disabling unnecessary services to reduce attack surface. 8) Collaborating with threat intelligence sharing platforms to stay updated on Yurei activity and emerging tactics. 9) Preparing and testing incident response plans that include ransomware-specific scenarios and data breach notification procedures.
Affected Countries
France, Germany, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland
Indicators of Compromise
- hash: 32d489eef7cbbdf51dc41d07648d7d8f
- hash: 5b7b229d5db833a075c21e9f0b8bbb74
- hash: cce52f8d5fcdf83d6f89de141b62115c
- hash: 0e57736f291d5953bfc01ea8ebdc625d0b61484c
- hash: 570a0e5e82568202d25c951596db8e3f563d8446
- hash: b39e4c22c6e27e20c391b995e44b23b8a925fc4a
- hash: 0303f89829763e734b1f9d4f46671e59bfaa1be5d8ec84d35a203efbfcb9bb15
- hash: 1ea37e077e6b2463b8440065d5110377e2b4b4283ce9849ac5efad6d664a8e9e
- hash: 89a54d3a38d2364784368a40ab228403f1f1c1926892fe8355aa29d00eb36819
- hash: d2539173bdc81503bf1b842a21d9599948e957cadc76a283a52f5849323d8e04
- domain: fewcriet5rhoy66k6c4cyvb2pqrblxtx4mekj3s5l4jjt4t4kn4vheyd.onion
Yurei the New Ransomware Group on the Scene
Description
Yurei, a newly emerged ransomware group, targeted a Sri Lankan food manufacturing company on September 5, 2025. The group employs a double-extortion model, encrypting files and exfiltrating sensitive data. Check Point Research discovered that Yurei's ransomware is based on the open-source Prince-Ransomware, with minor modifications. The ransomware, written in Go, contains a flaw allowing partial recovery through Shadow Copies. Since its first victim, Yurei has quickly expanded to three victims across Sri Lanka, India, and Nigeria. The investigation suggests the threat actor may originate from Morocco. Yurei's operation demonstrates how open-source malware lowers the entry barrier for cybercriminals, enabling less-skilled actors to launch ransomware attacks.
AI-Powered Analysis
Technical Analysis
Yurei is a recently identified ransomware group that surfaced in September 2025, initially targeting a food manufacturing company in Sri Lanka. This group employs a double-extortion ransomware model, which involves both encrypting victim files and exfiltrating sensitive data to pressure victims into paying ransoms. The ransomware used by Yurei is a derivative of the open-source Prince-Ransomware, written in the Go programming language, with minor modifications. Notably, the ransomware contains a flaw that allows partial recovery of encrypted data through the use of Windows Shadow Copies, which are snapshots of system files. Since its emergence, Yurei has expanded its operations to at least three victims across Sri Lanka, India, and Nigeria. The threat actor is suspected to originate from Morocco. The use of open-source ransomware lowers the technical barrier for entry, enabling less-skilled cybercriminals to launch effective ransomware campaigns. The malware leverages multiple tactics and techniques mapped to MITRE ATT&CK, including credential dumping, data exfiltration, process discovery, and defense evasion. Indicators of compromise include multiple file hashes and a Tor onion domain used for ransom communications. Although no known exploits are reported in the wild beyond these incidents, the rapid expansion and double-extortion approach highlight the operational risk posed by Yurei.
Potential Impact
For European organizations, the emergence of Yurei ransomware represents a growing threat, especially to sectors similar to those initially targeted, such as manufacturing and food production. The double-extortion model increases the risk of data breaches and reputational damage, as stolen sensitive data may be leaked if ransoms are not paid. The ransomware's partial recoverability via Shadow Copies may reduce total data loss but does not eliminate operational disruption or data confidentiality risks. European organizations with supply chain links to South Asia or Africa could be indirectly affected through third-party compromises. Additionally, the use of open-source ransomware variants like Yurei lowers the entry barrier for attackers, potentially increasing the frequency of attacks across Europe. The threat actor's suspected Moroccan origin and targeting patterns suggest potential geopolitical motivations or opportunistic targeting, which could extend to European entities. The medium severity rating reflects moderate impact potential but also indicates that effective mitigation and incident response can reduce damage.
Mitigation Recommendations
European organizations should implement targeted defenses against Yurei ransomware by: 1) Ensuring robust and frequent backups with offline or immutable storage to mitigate encryption impact, while also verifying backup integrity regularly. 2) Enabling and protecting Windows Shadow Copies, as they may allow partial recovery from this ransomware variant. 3) Implementing strict network segmentation and least privilege access to limit lateral movement and credential theft. 4) Deploying advanced endpoint detection and response (EDR) solutions capable of detecting behaviors associated with credential dumping, data exfiltration, and ransomware execution, especially those leveraging Go-based malware. 5) Monitoring for indicators of compromise such as the provided file hashes and suspicious Tor domain communications. 6) Conducting regular user awareness training focused on phishing and social engineering, which remain common initial infection vectors. 7) Applying timely security patches and disabling unnecessary services to reduce attack surface. 8) Collaborating with threat intelligence sharing platforms to stay updated on Yurei activity and emerging tactics. 9) Preparing and testing incident response plans that include ransomware-specific scenarios and data breach notification procedures.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Author
- AlienVault
- Tlp
- white
- References
- ["https://research.checkpoint.com/2025/yurei-the-ghost-of-open-source-ransomware"]
- Adversary
- Yurei
- Pulse Id
- 68c43d61b51a94ee89fc81a7
- Threat Score
- null
Indicators of Compromise
Hash
| Value | Description | Copy |
|---|---|---|
hash32d489eef7cbbdf51dc41d07648d7d8f | — | |
hash5b7b229d5db833a075c21e9f0b8bbb74 | — | |
hashcce52f8d5fcdf83d6f89de141b62115c | — | |
hash0e57736f291d5953bfc01ea8ebdc625d0b61484c | — | |
hash570a0e5e82568202d25c951596db8e3f563d8446 | — | |
hashb39e4c22c6e27e20c391b995e44b23b8a925fc4a | — | |
hash0303f89829763e734b1f9d4f46671e59bfaa1be5d8ec84d35a203efbfcb9bb15 | — | |
hash1ea37e077e6b2463b8440065d5110377e2b4b4283ce9849ac5efad6d664a8e9e | — | |
hash89a54d3a38d2364784368a40ab228403f1f1c1926892fe8355aa29d00eb36819 | — | |
hashd2539173bdc81503bf1b842a21d9599948e957cadc76a283a52f5849323d8e04 | — |
Domain
| Value | Description | Copy |
|---|---|---|
domainfewcriet5rhoy66k6c4cyvb2pqrblxtx4mekj3s5l4jjt4t4kn4vheyd.onion | — |
Threat ID: 68c4753f61b7885b88584381
Added to database: 9/12/2025, 7:32:15 PM
Last enriched: 9/12/2025, 7:32:32 PM
Last updated: 10/29/2025, 9:30:42 AM
Views: 163
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
YouTube Ghost Network Utilizes Spooky Tactics to Target Users
MediumResearchers Expose GhostCall and GhostHire: BlueNoroff's New Malware Chains
MediumNew Android Trojan 'Herodotus' Outsmarts Anti-Fraud Systems by Typing Like a Human
MediumThreatFox IOCs for 2025-10-28
MediumEverest Ransomware Leaks AT&T Carrier Records, Demands $1M for Dublin Airport Passenger Data
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.