top of page

Osiris Ransomware Evolves, Leveraging BYOVD to Disarm Security Tools

  • Jan 25
  • 2 min read

Key Findings


  • Symantec and VMware Carbon Black researchers have uncovered a new ransomware strain called Osiris, used in a November 2025 attack against a major Southeast Asian food service franchise operator.

  • Osiris leverages the POORTRY driver in a bring-your-own-vulnerable-driver (BYOVD) attack to disable security software on targeted systems.

  • The new ransomware has full-featured capabilities, including the ability to stop services and processes, select files and folders to encrypt, and leave a ransom note.

  • It employs hybrid ECC and AES-128-CTR encryption with a unique key per file, and manages async I/O via completion ports.

  • The attackers used common dual-use tools for network discovery and access, plus a modified RustDesk remote tool disguised as "WinZip Remote Desktop" to hide its true purpose.


Background


While Osiris shares a name with a 2016 ransomware variant of Locky, there is no indication of any link between the two families. The developers of the new Osiris ransomware, as well as whether it is offered as a Ransomware-as-a-Service (RaaS) model, remain unknown.


However, researchers found signs linking the Osiris attackers to the INC (Warble) ransomware group, based on the reuse of tools and tactics similar to past INC operations.


Osiris Ransomware Capabilities


Osiris is a full-featured ransomware with the following key capabilities:


  • Stops services and processes

  • Selects files and folders to encrypt

  • Appends a ".Osiris" extension to encrypted files

  • Deletes VSS snapshots

  • Terminates database, backup, and productivity processes


The malware uses a hybrid encryption approach, combining ECC and AES-128-CTR, with a unique key per file. It also manages async I/O via completion ports.


Attack Chain and Tactics


The attack chain began with the attackers quietly stealing data using Rclone and uploading it to a Wasabi cloud storage bucket, days before the ransomware deployment. This method, along with the reuse of tools like a Mimikatz variant named kaz.exe, mirrors past INC ransomware operations.


The attackers also deployed other dual-use tools like Netscan, Netexec, and MeshAgent, as well as a custom version of the Rustdesk remote monitoring and management (RMM) tool, disguised as "WinZip Remote Desktop".


To disable security defenses, the Osiris attackers deployed the POORTRY (Abyssworker) driver, posing as a Malwarebytes component, in a BYOVD attack. They also used the KillAV tool for this purpose.


Finally, the attackers enabled RDP to maintain remote access before launching the ransomware.


Conclusion


The emergence of the new Osiris ransomware, with its sophisticated techniques and possible links to the INC ransomware group, underscores the constant evolution of the ransomware landscape. Cybersecurity professionals must remain vigilant and stay up-to-date on the latest threats to effectively protect their organizations.


Sources


  • https://securityaffairs.com/187279/security/osiris-ransomware-emerges-leveraging-byovd-technique-to-kill-security-tools.html

  • https://x.com/shah_sheikh/status/2015140986758766696

  • https://www.socdefenders.ai/item/26c1fcac-804e-4173-8631-98bab01e9154

  • https://thehackernews.com/2026/01/new-osiris-ransomware-emerges-as-new.html

Recent Posts

See All
Defeating AI with AI

Key Findings Generative AI and agentic AI are increasingly used by threat actors to conduct faster and more targeted attacks. One capability that AI improves for threat actors is the ability to profil

 
 
 

Comments


  • Youtube

© 2025 by Explain IT Again. Powered and secured by Wix

bottom of page