Article Details
Scrape Timestamp (UTC): 2025-10-09 19:38:40.613
Original Article Text
Click to Toggle View
Hackers now use Velociraptor DFIR tool in ransomware attacks. Threat actors have started to use the Velociraptor digital forensics and incident response (DFIR) tool in attacks that deploy LockBit and Babuk ransomware. Cisco Talos researchers assess with medium confidence that the attacker behind the campaigns is a China-based adversary tracked as Storm-2603. Velociraptor is an open-source DFIR tool created by Mike Cohen. The project has been acquired by Rapid7, which provides an enhanced version to its customers. Cybersecurity company Sophos reported on August 26 that hackers were abusing Velociraptor for remote access. Specifically, the threat actors leveraged it to download and execute Visual Studio Code on compromised hosts, establishing a secure communication tunnel with the command and control (C2) infrastructure. In a report earlier today, ransomware protection company Halcyon assesses that Storm-2603 is connected with Chinese nation-state actors, is the same group as Warlock ransomware and CL-CRI-1040, and acted as a LockBit affiliate. Stealthy persistent access Cisco Talos says that the adversary used an outdated version of Velociraptor that was vulnerable to a privilege escalation security issue identified as CVE-2025-6264, which could allow arbitrary command execution and take control of the host. In the first stage of the attack, the threat actor created local admin accounts that were synced to Entra ID and used them to access the VMware vSphere console, giving them persistent control over the virtual machines (VMs). “After gaining initial access the actors installed an outdated version of Velociraptor (version 0.73.4.0) that was exposed to a privilege escalation vulnerability (CVE-2025-6264) that could lead to arbitrary command execution and endpoint takeover,” explains Cisco Talos. The researchers noted that Velociraptor helped the attackers maintain persistence, launching it multiple times, even after the host was isolated. They also observed the execution of Impacket smbexec-style commands to run programs remotely and the creation of scheduled tasks for batch scripts. Attackers disabled Defender real-time protection by modifying Active Directory GPOs and turned off behavior and file/program activity monitoring. Endpoint detection and response (EDR) solutions identified the ransomware deployed on Windows target systems as LockBit, but the extension for the encrypted files was “.xlockxlock,” seen in Warlock ransomware attacks. On VMware ESXi systems, the researchers found a Linux binary that was detected as Babuk ransomware. Cisco Talos researchers also observed the use of a fileless PowerShell encryptor that generated random AES keys per run, which is believed to be the main tool for "mass encryption on the Windows machines." Before encrypting the data, the attacker used another PowerShell script to exfiltrate files for double-extortion purposes. The script uses ‘Start-Sleep’ to insert delays between uploading actions to evade sandbox and analysis environments. Cisco Talos researchers provide two sets of indicators of compromise (IoCs) observed in the attacks, which include files the threat actor uploaded to the compromised machines and Velociraptor files. The Security Validation Event of the Year: The Picus BAS Summit Join the Breach and Attack Simulation Summit and experience the future of security validation. Hear from top experts and see how AI-powered BAS is transforming breach and attack simulation. Don't miss the event that will shape the future of your security strategy
Daily Brief Summary
Threat actors are leveraging the Velociraptor DFIR tool to deploy LockBit and Babuk ransomware, according to Cisco Talos and Sophos reports.
Researchers attribute the campaigns to Storm-2603, a China-based group linked to Chinese nation-state actors and known for using Warlock ransomware.
Attackers used an outdated Velociraptor version vulnerable to CVE-2025-6264, enabling privilege escalation and arbitrary command execution on compromised systems.
The group established persistent access by creating local admin accounts synced to Entra ID, granting control over VMware vSphere consoles and virtual machines.
Endpoint detection solutions identified ransomware on Windows systems as LockBit, with encrypted files bearing the ".xlockxlock" extension, while Babuk was found on VMware ESXi systems.
Attackers used PowerShell scripts for data exfiltration prior to encryption, employing techniques to evade detection and analysis environments.
Cisco Talos provided indicators of compromise, including files uploaded by the attackers and Velociraptor-related files, aiding in threat detection and response efforts.