Article Details
Scrape Timestamp (UTC): 2024-10-11 23:01:42.694
Source: https://www.theregister.com/2024/10/11/inc_ransomware_lynx/
Original Article Text
Click to Toggle View
INC ransomware rebrands to Lynx – same code, new name, still up to no good. Researchers point to evidence that scumbags visited the strategy boutique. Researchers at Palo Alto's Unit 42 believe the INC ransomware crew is no more and recently rebranded itself as Lynx over a three-month period. INC was never a ransomware market leader, but since spinning up in October 2023 it made something of a name for itself with headline-grabbing attacks on the UK's Leicester City Council and NHS Scotland, to name a few. Lynx, on the other hand, was first spotted in July 2024, and Unit 42's researchers note that the number of detected Lynx samples has outpaced that of INC samples since then. Graph depicting the number of ransomware sample detections of both Lynx and INC gangs over the previous 12 months, courtesy of Unit 42 – click to enlarge After two months of Lynx being more prevalent than INC, detections of the latter fell to zero in September, although this alone doesn't necessarily mean it's gone for good. The same number of INC detections (zero) were also noted in January, February, and May, for example. However, code comparisons often provide better support for suspicions of rebranding and the same is true in this case. Running samples from both ransomware groups through BinDiff revealed a 70.8 percent match in shared functions. "This significant overlap in shared functions strongly suggests that the developers of Lynx ransomware have borrowed and repurposed a considerable portion of the INC codebase to create their own malicious software," Unit 42 states in a blog. "Reusing code between different ransomware families is common among cybercriminals. By leveraging preexisting code and building upon the foundations laid by other successful ransomware, threat actors can save time and resources in the development of their own attacks. This can ultimately lead to more successful and widespread campaigns." The researchers also observe that INC's source code was made available on cybercrime forums from March this year, so in theory there could be all manner of INC iterations released by anyone and a code analysis alone would most likely yield similar results. INC is still posting victims: new entries to its online leak site were made as recently as October 4, and a cursory examination suggests that it wasn't a repost of an old attack. A comparison of the two brands' leak sites reveals noticeable similarities. For starters, both INC and Lynx are among a very small cohort of cybercrime groups that have clear web presences – both have TOR and regular leak sites. The next obvious similarity is the format of the websites. Typically, ransomware gangs have vastly different approaches to designing their leak blogs. It's not often that one gang will have a site that closely resembles that of a rival, but Lynx and INC's sites are laid out in an almost identical fashion. Comparison of INC and Lynx's leak blogs – click to enlarge The left-hand toolbar, near-identical section names, presence on the clear web, and rhyming group names suggest that the same individuals may be behind both operations, or that they are at least trying to give that impression. A statement posted to Lynx's blog states that it refuses to target the likes of hospitals, governments, or other kinds of nonprofits "as these sectors play vital roles in society." This certainly wasn't the case with INC given its attacks on the NHS and Leicester City Council. Perhaps they turned over a new leaf. Perhaps they're just a bunch of criminals who lie about everything.
Daily Brief Summary
Researchers at Palo Alto's Unit 42 observed that the INC ransomware group has been rebranded as Lynx after a three-month transition period.
Since its emergence in July 2024, Lynx has shown a higher number of ransomware sample detections compared to INC, suggesting a rise in activity.
A significant code overlap between INC and Lynx was found, with a 70.8 percent similarity in shared functions, indicating the repurposing of INC’s codebase.
Despite a decrease in detections, INC is still active, having posted new entries on its online leak site as recently as October 4, indicating ongoing operations.
Both INC and Lynx operate similar web-based leak platforms, which are nearly identical in design and accessibility, supporting speculations that they might be managed by the same individuals or group.
Unit 42 cited the availability of INC's source code on cybercrime forums since March, which could lead to various adaptations of INC ransomware by other parties.
Lynx publicly states it avoids targeting critical sectors like hospitals and governments, although its sincerity is questionable given INC’s past targets such as NHS Scotland and Leicester City Council.