top of page

Osiris Ransomware Campaign Using BYOVD for Defense Evasion and Double Extortion

February 6th, 2026

High

Our Cyber Threat Intelligence Unit is monitoring Osiris, a ransomware family first documented in January 2026 and linked to a confirmed attack on a major food-service franchise in Southeast Asia in November 2025. The campaign targets Windows environments and follows a hands-on intrusion model characterized by reconnaissance, credential access, pre-encryption data exfiltration, defense impairment, and selective deployment of ransomware. Activities observed include the use of dual-purpose administrative tools, pre-encryption data exfiltration to cloud storage, and kernel-level defense evasion via a malicious driver associated with the Poortry (Abyssworker) family. The operators also deployed a modified remote management tool disguised as legitimate software to maintain access. Tactics such as Wasabi-based data exfiltration and specific tooling conventions overlap with patterns previously associated with INC ransomware operations, indicating possible operational emulation or affiliate crossover. This threat is significant for its stealth, abuse of trusted components, and double-extortion model, highlighting the continued evolution of ransomware campaigns toward low-noise, high-impact intrusions. 

Technical Details

  • Severity: High

  • Threat Type: Ransomware & Double extortion (data exfiltration + encryption)

  • Observed Techniques:

    • Bring Your Own Vulnerable Driver (BYOVD)–style defense impairment

    • Kernel-level security control termination

    • Credential theft

    • Lateral movement using dual-use tools

    • Pre-encryption data exfiltration

    • Remote access persistence

  • Affected Platforms: Windows environments

  • Components Impacted:

    • Endpoint security software (via kernel-level termination)

    • Enterprise hosts and services affected by ransomware encryption

    • Sensitive data repositories subject to exfiltration

  • Attack Chain Summary:

    • Initial Access / Remote Access:

      • Reporting confirms RDP was enabled within the impacted environment, likely providing remote access for attacker operations.

      • No definitive initial access vector (e.g., phishing, vulnerability exploitation) has been publicly confirmed.

    • Reconnaissance:

      • Post-access discovery was conducted using legitimate and dual-use tools, including:

        • Netscan

        • Netexec

        • MeshAgent

    • These tools were leveraged to enumerate hosts, users, and network paths.

  • Credential Access:

    • Mimikatz, often renamed (e.g., kaz.exe), was deployed to extract credentials from memory.

    • Harvested credentials were used to expand access within the environment.

  • Data Exfiltration (Pre-Encryption):

    • Sensitive data was exfiltrated prior to encryption using Rclone.

    • Exfiltrated data was transferred to Wasabi cloud storage, consistent with a double-extortion strategy.

  • Defense Impairment (BYOVD-Style Technique):

    • A malicious kernel-mode driver associated with Poortry (also tracked as Abyssworker) was introduced to impair endpoint security controls.

    • The driver masqueraded as a legitimate Malwarebytes anti-exploit driver.

    • A loader component referred to as Stonestop was used to install the driver and issue execution instructions.

    • Kernel-level access was leveraged to terminate security processes.

  • Security Control Neutralization:

    • Endpoint security services were forcibly terminated.

    • Utilities such as KillAV were used to assist with disabling EDR, antivirus, and monitoring components.

  • Persistence and Remote Control:

    • A modified Rustdesk remote management tool was deployed to maintain persistent access.

    • The tool was disguised with WinZip branding to appear legitimate and evade detection.

  • Ransomware Deployment:

    • Osiris ransomware was executed across selected systems.

    • Files were encrypted using ECC combined with AES-128-CTR, with unique encryption keys per file.

    • Encrypted files were renamed with the “.Osiris” extension.

    • Critical services and applications were stopped to maximize operational disruption.

  • Ransom Note and Extortion:

    • A ransom note named Osiris-MESSAGE.txt was dropped on impacted systems.

    • Victims were notified of both file encryption and prior data exfiltration, with payment demands issued to prevent data disclosure.

Image by ThisisEngineering

Impact

  • Loss of access to critical systems and data due to widespread file encryption

  • Unauthorized exfiltration of sensitive or regulated information, increasing compliance and legal exposure

  • Disruption of business operations caused by service termination and system downtime

  • Elevated risk of lateral movement and broader enterprise compromise due to credential theft

  • Financial impact from incident response, recovery efforts, potential extortion payments, and regulatory penalties

  • Reputational damage and erosion of customer and partner trust

Detection Method

Organizations should monitor for the following indicators and behaviors:

  • Abnormal outbound data transfers, particularly to cloud storage providers such as Wasabi

  • Anomalous or unauthorized RDP authentication activity

  • Execution of credential theft, reconnaissance, or lateral movement tools, including:

    • kaz.exe (Mimikatz)

    • nxc.exe (Netexec)

    • netscan.exe

    • meshagent.exe, meshagent64-philip.exe, mesh.exe

    • rclone.exe

  • Driver load events involving unusual or abused signed drivers, including:

    • multia.sys

    • Activity consistent with the Poortry / Abyssworker driver family

  • Execution of security-disabling utilities such as KillAV

  • Mass file renaming events involving the “.Osiris” extension

  • Creation of ransom notes named Osiris-MESSAGE.txt

Indicators of Compromise

SHA256 Hash 

Associated File Name(s) 

Notes 

fff586c95b510e6c8c0e032524026ef22297869a86d14075cd601ca8e20d4a16 

33.exe 

Initial payload 

c74509fcae41fc9f63667dce960d40907f81fae09957bb558d4c3e6a786dde7d 

payload.dll 

Loader component 

fc39cca5d71b1a9ed3c71cca6f1b86cfe03466624ad78cdb57580dba90847851 

kaz.exe 

Mimikatz (credential theft) 

d78f7d9b0e4e1f9c6b061fb0993c2f84e22c3e6f32d9db75013bcfbba7b64bc3 

meshagent64-philip.exe 

MeshAgent RAT 

824e16f0664aaf427286283d0e56fdc0e6fa8698330fa13998df8999f2a6bb61 

payload.dll 

Secondary payload 

231e6bee1ee77d70854c1e3600342d8a69c18442f601cd201e033fa13cb8d5a5 

windows.exe 

Masqueraded executable 

44748c22baec61a0a3bd68b5739736fa15c479a3b28c1a0f9324823fc4e3fe34 

multia.sys 

Malicious driver (Poortry/Abyssworker) 

ce719c223484157c7f6e52c71aadaf496d0dad77e40b5fc739ca3c51e9d26277 

chromesetup.exe 

Dropper 

8c378f6200eec750ed66bde1e54c29b7bd172e503a5874ca2eead4705dd7b515 

nxc.exe 

Netexec 

79bd876918bac1af641be10cfa3bb96b42c30d18ffba842e0eff8301e7659724 

rclone.exe 

Data exfiltration 

44e007741f7650d1bd04cca3cd6dfd4f32328c401f95fb2d6d1fafce624cc99e 

winzip.exe 

Rustdesk disguised as WinZip 

5bd82a1b2db1bdc8ff74cacb53823edd8529dd9311a4248a86537a5b792939f8 

netscan.exe 

Network discovery 

534bd6b99ed0e40ccbefad1656f03cc56dd9cc3f6d990cd7cb87af4cceebe144 

buildx86.exe 

Supporting tool 

39a0565f0c0adc4dc5b45c67134b3b488ddb9d67b417d32e9588235868316fac 

chromesetup.exe 

Alternate dropper 

C189595c36996bdb7dce6ec28cf6906a00cbb5c5fe182e038bf476d74bed349e 

rclone.exe 

Exfiltration utility 

 

Type 

Indicator 

Domain 

ausare[.]net 

Domain 

wesir[.]net 

 

mix of red, purple, orange, blue bubble shape waves horizontal for cybersecurity and netwo

Recommendations

  • Immediately isolate affected systems to prevent lateral movement and preserve forensic evidence

  • Restrict or disable unnecessary RDP exposure and enforce multi-factor authentication (MFA) on all remote access services

  • Apply the latest operating system, driver, and security updates across the environment

  • Enforce driver block rules, application control policies, and least-privilege access

  • Monitor authentication, endpoint, and network logs for signs of credential misuse or unauthorized driver loading

  • Secure, test, and validate offline and immutable backups to ensure reliable restoration capability

Conclusion

Osiris ransomware poses a high-severity threat, characterized by kernel-level defense evasion, pre-encryption data theft, and targeted ransomware deployment. Its use of BYOVD-style techniques and overlap with established ransomware tradecraft highlights a broader shift toward stealthier, more destructive intrusion-led extortion campaigns. We urge organizations to treat this activity as an immediate operational risk and prioritize proactive detection, access-control hardening, and incident-response readiness to minimize potential impact.

bottom of page