Malware & RansomwareHIGH

Pay2Key Ransomware - Iran-Linked Group Resurfaces with Tactics

IMInfosecurity Magazine
Pay2KeyIranransomwareTeamViewerMimikatz
🎯

Basically, an Iranian hacker group is back, using new tricks to steal data and hold it for ransom.

Quick Summary

The Iranian Pay2Key ransomware group is back, targeting US healthcare providers with advanced tactics. Their resurgence amid geopolitical tensions raises significant risks for various sectors. Organizations must stay vigilant and proactive to defend against these evolving threats.

How It Works

The Pay2Key ransomware group has returned with enhanced evasion techniques and execution capabilities. They are known for targeting organizations aligned with Iranian interests. Recent reports indicate that their activities have intensified, particularly following heightened tensions between the US and Iran. In a recent attack, they exploited vulnerabilities in a US healthcare provider's network. The group utilized tools like TeamViewer for remote access and Mimikatz for credential harvesting. This allowed them to navigate through the victim's network with ease.

Once they gained a foothold, the attackers employed various tools to scan for additional hosts and validate credentials. This included using Advanced IP Scanner and ns.exe to identify systems within the network. Their approach appears to be strategic, as they sought to avoid detection by mimicking legitimate administrative activities. This careful planning enabled them to prepare for a swift ransomware deployment.

Who's Being Targeted

The resurgence of Pay2Key has raised alarms among security experts, especially as they have targeted critical sectors like healthcare. Since July 2025, they have reportedly received over $8 million in ransom payments from approximately 170 victims. This indicates a broad impact, affecting various organizations that may be vulnerable to their tactics. The group's focus on US entities, particularly during geopolitical tensions, suggests a politically motivated agenda.

Their targeting strategy raises concerns about the potential for collateral damage. Organizations that may not directly align with Iranian interests could still find themselves in the crosshairs. The group's methods are not solely about financial gain; they also aim to disrupt and damage systems for strategic purposes.

Signs of Infection

Organizations should be vigilant for signs of infection from the Pay2Key group. Indicators may include unusual network activity, unauthorized access attempts, or the presence of known tools like Mimikatz and TeamViewer. The rapid encryption of files and the use of self-extracting archives for ransomware deployment are also key signs. In the latest attack, the entire infrastructure was compromised and encrypted within just three hours.

Moreover, the group has demonstrated a capability to remove traces of their activities, complicating detection efforts. Their use of a 'No Defender' evasion toolkit highlights the sophistication of their operations. Organizations must remain proactive in monitoring their networks for these signs to mitigate the risk of a successful attack.

How to Protect Yourself

To defend against the Pay2Key ransomware group, organizations should adopt a multi-layered security approach. This includes regular security audits, employee training on recognizing phishing attempts, and implementing robust access controls. Keeping software and systems updated with the latest patches is crucial to close vulnerabilities that attackers may exploit.

Additionally, organizations should develop an incident response plan that includes backup strategies. Regularly backing up data can help mitigate the impact of a ransomware attack. It is also essential to share threat intelligence within the security community to stay informed about emerging tactics and techniques used by groups like Pay2Key. By staying vigilant and prepared, organizations can better defend against this unpredictable and politically motivated threat.

🔒 Pro insight: Pay2Key's resurgence highlights the need for continuous monitoring and adaptive defenses against politically motivated ransomware threats.

Original article from

Infosecurity Magazine

Read Full Article

Related Pings

HIGHMalware & Ransomware

Coruna iOS Kit - New Mass Attacks Using Triangulation Code

The Coruna iOS exploit kit is using old Triangulation code for new mass attacks. Millions of iPhone users are at risk as cybercriminals exploit these vulnerabilities. Stay updated and vigilant to protect your devices.

The Hacker News·
HIGHMalware & Ransomware

Malware - Researchers Discover WebRTC Payment Skimmer

A new WebRTC skimmer has been discovered, allowing attackers to steal payment data while bypassing traditional security measures. E-commerce sites are at risk, making it crucial for businesses to enhance their defenses against this sophisticated malware.

Security Affairs·
HIGHMalware & Ransomware

RedLine Infostealer - Suspected Admin Extradited to US

A suspect in the RedLine infostealer malware case has been extradited to the US. Hambardzum Minasyan faces serious charges for his role in the operation. This highlights ongoing efforts to combat cybercrime globally. Stay vigilant against such threats.

BleepingComputer·
HIGHMalware & Ransomware

RedLine Malware - Alleged Administrator Extradited to US

Hambardzum Minasyan has been extradited to the US for his role in the RedLine malware operation. This malware steals sensitive information from users. His actions highlight the ongoing threat posed by infostealer malware in today's digital landscape.

SecurityWeek·
HIGHMalware & Ransomware

Kiss Loader Malware - New Threat Using APC Injection Detected

Kiss Loader malware has been detected, using advanced techniques to infiltrate Windows systems. Users are at risk if they open unverified files. Security teams must act quickly to mitigate this threat.

Cyber Security News·
HIGHMalware & Ransomware

WebRTC Skimmer - Bypasses CSP to Steal Payment Data

A new WebRTC skimmer is stealing payment data from e-commerce sites by bypassing security controls. This malware exploits vulnerabilities in Magento, affecting many online stores. Site owners must act quickly to protect their customers and secure their platforms.

The Hacker News·