Close Menu
Pineapples Update –Pineapples Update –

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    I tried 0patch as a last resort for my Windows 10 PC – here’s how it compares to its promises

    January 20, 2026

    A PC Expert Explains Why Don’t Use Your Router’s USB Port When These Options Are Present

    January 20, 2026

    New ‘Remote Labor Index’ shows AI fails 97% of the time in freelancer tasks

    January 19, 2026
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Pineapples Update –Pineapples Update –
    • Home
    • Gaming
    • Gadgets
    • Startups
    • Security
    • How-To
    • AI/ML
    • Apps
    • Web3
    Pineapples Update –Pineapples Update –
    Home»Security»Hackers now use VelociRaptor DFIR tool in ransomware attacks
    Security

    Hackers now use VelociRaptor DFIR tool in ransomware attacks

    PineapplesUpdateBy PineapplesUpdateOctober 10, 2025No Comments3 Mins Read
    Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
    Hackers now use VelociRaptor DFIR tool in ransomware attacks
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Hackers now use VelociRaptor DFIR tool in ransomware attacks

    Threat actors have begun using VelociRaptor digital forensics and incident response (DFIR) tools in attacks deploying Lockbit and Babuk ransomware.

    Cisco Talos researchers assess with moderate confidence that the attacker behind the campaigns is a China-based adversary tracked as Storm-2603.

    Velociraptor is a Open-source DFIR tool Created by Mike Cohen. The project has been acquired by Rapid7, which offers an enhanced version to its customers.

    Cybersecurity company Sophos reported on August 26 that hackers were Abusing VelociRaptor for remote accessSpecifically, threat actors took advantage of this to download and execute Visual Studio Code on the compromised host, establishing a secure communications tunnel with the command and control (C2) infrastructure.

    In a report earlier today, the ransomware security company Halcyon is estimated That Storm-2603 is linked to Chinese nation-state actors, is the same group as Warlock ransomware and CL-CRI-1040, and operates as a Lockbit affiliate.

    stealth persistent access

    Cisco Talos says the adversary used an older version of VelociRaptor that was vulnerable to a privilege escalation security issue identified as CVE-2025-6264, which could allow arbitrary command execution and take control of the host.

    In the first phase of the attack, the threat actor created local administrator accounts that were synced to the Entra ID and used them to access the VMware vSphere console, giving them persistent control over the virtual machines (VMs).

    “After gaining initial access, the actors installed an older version of VelociRaptor (version 0.73.4.0) that was exposed to a privilege escalation vulnerability (CVE-2025-6264), which could lead to arbitrary command execution and endpoint takeover.” Cisco Talos explains,

    The researchers noted that Velociraptor helped the attackers maintain persistence by launching at it multiple times, even after the host was isolated.

    He also observed the execution of impersonated smbexec-style commands to run programs remotely and the creation of scheduled tasks for batch scripts.

    The attackers disabled Defender’s real-time protection by modifying Active Directory GPOs and turned off behavior and file/program activity monitoring.

    Endpoint detection and response (EDR) solutions identified the ransomware deployed on Windows target systems as Lockbit, but the extension for encrypted files was “.xlockxlock”, which was seen in Warlock ransomware attacks.

    On VMware ESXi systems, researchers found a Linux binary that was identified as Babuk ransomware.

    Cisco Talos researchers also observed the use of a fileless PowerShell encryptor that generates random AES keys per run, which is considered the main tool for “large-scale encryption on Windows machines”.

    Before encrypting the data, the attacker used another PowerShell script to exfiltrate the files for double-extortion purposes. The script uses ‘start-sleep’ to insert a delay between uploading actions to avoid the sandbox and analysis environment.

    Cisco Talos researchers offer two sets indicators of agreement (IoCs) were observed in the attacks, which included threat actor files uploaded to compromised machines and VelociRaptor files.


    PICS BAS Summit

    attend Breach and Attack Simulation Summit and experience future of security verificationHear from top experts and see how AI-powered BAS Changing breach and attack simulations.

    Don’t miss the event that will shape the future of your security strategy

    attacks DFIR hackers Ransomware tool VelociRaptor
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    Previous ArticleDisaster Recovery and Business Continuity Effective Planning
    Next Article Is your PC drowning in photos? Microsoft’s new OneDrive app can help – try it now
    PineapplesUpdate
    • Website

    Related Posts

    Startups

    How a simple link allowed hackers to bypass Copilot’s security guardrails – and what Microsoft did about it

    January 19, 2026
    Startups

    I used Microsoft’s free Windows 11 Battery Health tool to diagnose my PC — and got useful results

    January 17, 2026
    Startups

    The Kindle I never expected to use for work is now my top productivity tool — here’s why

    December 11, 2025
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Microsoft’s new text editor is a VIM and Nano option

    May 19, 2025797 Views

    The best luxury car for buyers for the first time in 2025

    May 19, 2025724 Views

    Massives Datenleck in Cloud-Spichenn | CSO online

    May 19, 2025650 Views
    Stay In Touch
    • Facebook
    • YouTube
    • TikTok
    • WhatsApp
    • Twitter
    • Instagram
    Latest Reviews

    Subscribe to Updates

    Get the latest tech news from FooBar about tech, design and biz.

    Most Popular

    10,000 steps or Japanese walk? We ask experts if you should walk ahead or fast

    June 16, 20250 Views

    FIFA Club World Cup Soccer: Stream Palmirus vs. Porto lives from anywhere

    June 16, 20250 Views

    What do chatbott is careful about punctuation? I tested it with chat, Gemini and Cloud

    June 16, 20250 Views
    Our Picks

    I tried 0patch as a last resort for my Windows 10 PC – here’s how it compares to its promises

    January 20, 2026

    A PC Expert Explains Why Don’t Use Your Router’s USB Port When These Options Are Present

    January 20, 2026

    New ‘Remote Labor Index’ shows AI fails 97% of the time in freelancer tasks

    January 19, 2026

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    Facebook X (Twitter) Instagram Pinterest
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms And Conditions
    • Disclaimer
    © 2026 PineapplesUpdate. Designed by Pro.

    Type above and press Enter to search. Press Esc to cancel.