Article Details

Scrape Timestamp (UTC): 2026-01-22 18:08:48.545

Source: https://thehackernews.com/2026/01/new-osiris-ransomware-emerges-as-new.html

Original Article Text

Click to Toggle View

New Osiris Ransomware Emerges as New Strain Using POORTRY Driver in BYOVD Attack. Cybersecurity researchers have disclosed details of a new ransomware family called Osiris that targeted a major food service franchisee operator in Southeast Asia in November 2025. The attack leveraged a malicious driver called POORTRY as part of a known technique referred to as bring your own vulnerable driver (BYOVD) to disarm security software, the Symantec and Carbon Black Threat Hunter Team said. It's worth noting that Osiris is assessed to be a brand-new ransomware strain, sharing no similarities with another variant of the same name that emerged in December 2016 as an iteration of the Locky ransomware. It's currently not known who the developers of the locker are, or if it's advertised as a ransomware-as-a-service (RaaS). However, the Broadcom-owned cybersecurity division said it identified clues that suggest the threat actors who deployed the ransomware may have been previously associated with INC ransomware (aka Warble). "A wide range of living off the land and dual-use tools were used in this attack, as was a malicious POORTRY driver, which was likely used as part of a bring your own vulnerable driver (BYOVD) attack to disable security software," the company said in a report shared with The Hacker News. "The exfiltration of data by the attackers to Wasabi buckets, and the use of a version of Mimikatz that was previously used, with the same filename (kaz.exe), by attackers deploying the INC ransomware, point to potential links between this attack and some attacks involving INC." Described as an "effective encryption payload" that's likely wielded by experienced attackers, Osiris makes use of a hybrid encryption scheme and a unique encryption key for each file. It's also flexible in that it can stop services, specify which folders and extensions need to be encrypted, terminate processes, and drop a ransom note. By default, it's designed to kill a long list of processes and services related to Microsoft Office, Exchange, Mozilla Firefox, WordPad, Notepad, Volume Shadow Copy, and Veeam, among others. First signs of malicious activity on the target's network involved the exfiltration of sensitive data using Rclone to a Wasabi cloud storage bucket prior to the ransomware deployment. Also utilized in the attack were a number of dual-use tools like Netscan, Netexec, and MeshAgent, as well as a custom version of the Rustdesk remote desktop software. POORTRY is a little different from traditional BYOVD attacks in that it uses a bespoke driver expressly designed for elevating privileges and terminating security tools, as opposed to deploying a legitimate-but-vulnerable driver to the target network. "KillAV, which is a tool used to deploy vulnerable drivers for terminating security processes, was also deployed on the target's network," the Symantec and Carbon Black Threat Hunter Team noted. "RDP was also enabled on the network, likely to provide the attackers with remote access." The development comes as ransomware remains a significant enterprise threat, with the landscape constantly shifting as some groups close their doors and others quickly rise from their ashes or move in to take their place. According to an analysis of data leak sites by Symantec and Carbon Black, ransomware actors claimed a total of 4,737 attacks during 2025, up from 4,701 in 2024, a 0.8% increase. The most active players during the past year were Akira (aka Darter or Howling Scorpius), Qilin (aka Stinkbug or Water Galura), Play (aka Balloonfly), INC, SafePay, RansomHub (aka Greenbottle), DragonForce (aka Hackledorb), Sinobi, Rhysida, and CACTUS. Some of the other notable developments in the space are listed below - To protect against targeted attacks, organizations are advised to monitor the use of dual-use tools, restrict access to RDP services, enforce multi-factor authentication (2FA), use application allowlisting where applicable, and implement off-site storage of backup copies. "While attacks involving encrypting ransomware remain as prevalent as ever and still pose a threat, the advent of new types of encryptionless attacks adds another degree of risk, creating a wider extortion ecosystem of which ransomware may become just one component," Symantec and Carbon Black said.

Daily Brief Summary

CYBERCRIME // Osiris Ransomware Targets Southeast Asian Food Service Operator

A new ransomware strain, Osiris, targeted a major food service franchisee in Southeast Asia in November 2025, using a BYOVD attack to disable security defenses.

The attack utilized the POORTRY driver, specifically crafted to elevate privileges and terminate security tools, marking a shift from traditional BYOVD methods.

Osiris employs a hybrid encryption scheme and can halt services, encrypt specific files, and drop ransom notes, demonstrating advanced capabilities.

Attackers exfiltrated sensitive data to Wasabi cloud storage using Rclone before deploying the ransomware, indicating a sophisticated, multi-stage attack.

The attackers leveraged dual-use tools such as Netscan and MeshAgent, and enabled RDP for remote access, showcasing a diverse toolkit.

Potential links to previous INC ransomware activities were noted, suggesting experienced threat actors may be involved.

Organizations are advised to monitor dual-use tools, restrict RDP access, enforce multi-factor authentication, and maintain off-site backups to mitigate such threats.

The ransomware landscape continues to evolve, with a slight increase in attacks reported in 2025, highlighting the persistent threat to enterprises.