Osiris Ransomware New Strain

BLUF

 A new, sophisticated ransomware family, Osiris, has been detected targeting a major Southeast Asian conglomerate, utilizing the "Poortry" driver to disable security software.

Executive Cost Summary

This cost analysis was developed by the CyberDax team using expert judgment and assisted analytical tools to support clarity and consistency.

For organizations affected by the Osiris ransomware strain leveraging defense-disabling drivers and double extortion tactics:

·       Low-end total cost: $2.5M – $5.0M

o   (limited spread, rapid containment, minimal sensitive data exposure)

·       Typical expected range: $5.0M – $15M

o   (multi-system encryption, moderate downtime, confirmed data exfiltration)

·       Upper-bound realistic scenarios: $15M – $35M

o   (enterprise-wide disruption, prolonged recovery, regulatory and legal escalation)

Key Cost Drivers

·       Duration of operational downtime affecting revenue-generating systems

·       Scope of encrypted endpoints and shared infrastructure requiring rebuild

·       Volume and sensitivity of data exfiltrated prior to encryption

·       Backup integrity and speed of restoration

·       Insurance coverage limits, exclusions, and post-incident premium impacts

Targeted Sectors

·       Manufacturing

·       Conglomerates

Affected Countries

·       Southeast Asia

Date First Reported

·       January 22, 2026

Date Last Updated

January 22, 2026

CVE & CVSS

·       Not applicable at this time.

Nessus ID

·       Not applicable at this time

Is this on the KEV List

·       Not applicable at this time

Mitigation

·       Update EDR signatures

·       Implement strict driver blocklists (e.g., Poortry).

APT Names

·       This is not associated with APT groups at this time

Criminal Organization Names

·       Potentially linked to Inc ransomware group

IOCs

Host-Based Indicators & Behavior

Persistence

Manipulates the execution behavior of images by adding entries to

·       HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\.

File Encryption

·       Appends the .osiris extension to targeted files.

Shadow Copy Deletion

·       Like many modern variants, it attempts to delete volume shadow copies to prevent local recovery.

Tools used in campaign

·       Poortry driver

o   Living-off-the-land techniques.

TTPs

Initial Access

·       T1566 Phishing

o    Often uses phishing emails with malicious attachments or links to compromise the initial system.

·       T1078 Valid Accounts

o    Exploitation of compromised or misused valid accounts, including anomalous logon patterns across endpoints.

Execution

·       T1059 Command and Scripting Interpreter

o   Use of PowerShell to execute commands, often with hidden or encoded command lines.

·       T1204 User Execution

o   Social engineering lures, such as fake IT support calls, to persuade victims to run malicious applications.

Persistence & Privilege Escalation

·       T1053 Scheduled Task/Job

o   Leveraging the Windows Task Scheduler to deploy ransomware payloads and establish persistence.

·       T1047 Windows Management Instrumentation

o    Use of WMI to execute binaries or monitor target processes.

Defense Evasion

·       T1562 Impair Defenses

o    Actively disabling security measures, such as removing antivirus software, upon successful infiltration.

·       T1027 Obfuscated Files or Information

o    Use of high-entropy files and cryptographic strings to hide malicious content from traditional security software.

Credential Access

·       T1003 OS Credential Dumping

o   Use of tools like Mimikatz to extract login credentials from compromised systems.

Exfiltration & Impact

·       T1486 Data Encrypted for Impact

o   Recursive encryption of user and system directories to disrupt availability.

·       T1020 Automated Exfiltration

o   Use of "double extortion" tactics, where data is stolen and posted to a TOR-hidden leak site before encryption to demand ransom.

·       T1490 Inhibit System Recovery

o   Deletion of shadow copies or tampering with registries to prevent data restoration.

Malware Name

Osiris Ransomware

Malware sample

sha256

27d90611f005db3a25a4211cf8f69fb46097c6c374905d7207b30e87d296e1b3

Malware Family

A variant of the Locky ransomware family.

Known Decoding Key

·       No public decryption key is available for modern Osiris variants as of early 2026.

o   Historical Locky-Osiris variants also lacked a universal free decryptor due to strong RSA-2048 and AES-128 encryption.

Verdict

·       Malicious

o   It is categorized as advanced crypto-ransomware capable of data exfiltration and double extortion.

Primary Objectives

·       Financial Gain

o   Demanding ransom payments in cryptocurrency (e.g., Bitcoin) for data decryption.

·       Data Exfiltration

o   Stealing sensitive corporate data to use as leverage in double extortion (threatening to leak data if payment is not made).

·       Disruption

o   Impairing business operations by encrypting critical files and backups.

Behavior Analysis

Initial Access

·       Delivered via sophisticated phishing, exploitation of public-facing vulnerabilities (e.g., RDP, VPN), or initial access brokers.

Evasion

·       Uses "Living-off-the-Land" (LotL) tactics, such as employing legitimate Windows components (e.g., Rundll32.exe) and malicious drivers like Poortry to disable security software.

Encryption

·       Scans local and network drives, encrypting a wide range of file types and appending the .osiris extension.

Backup Sabotage

·       Actively targets and deletes Volume Shadow Copies (VSS) to prevent easy recovery.

Persistence

·       Establishes persistence via registry modifications or scheduled tasks.

Suggested Rules / potential hunts

As a reminder, these are indicator rules. They are likely to be noisy.

For best results consider creating a data model and reviewing the traffic as a report.

Suricata

Identify Exfiltration to Wasabi/Cloud Storage: Osiris has been observed exfiltrating data to Wasabi cloud.

alert http $HOME_NET any -> $EXTERNAL_NET any (msg:"Osiris Ransomware Potential Data Exfil to Wasabi"; content:".wasabisys.com"; http_host; sid:2026001; rev:1;)

 

Detect C2 Communication via OAuth/Connected Apps: Newer variants leverage malicious Salesforce apps to gain lateral access.

alert tcp $HOME_NET any -> $EXTERNAL_NET 443 (msg:"Osiris Ransomware Potential Salesforce OAuth Hijack Activity"; flow:established,to_server; content:"://login.salesforce.com"; sid:2026002; rev:1;)

SentinelOne

Detect Malicious Driver Loading (Poortry): Osiris uses the Poortry driver to disable security software.

Process.Name = "System" AND Module.Name contains "Poortry" OR File.Name = "Poortry.sys"

 

Shadow Copy Deletion

Registry.Value contains "vssadmin" AND Command.Line contains "delete shadows".

 

Process Termination of Security Agents: Identify attempts to kill AV/EDR processes.

Indicator.Name = "KillSecurityProcess" AND Target.Process.Name contains "SentinelAgent"

Splunk

Hunt for Large-Scale File Extension Changes: Detect the appending of the Osiris extension

index=logs sourcetype=filesystem_monitor

| stats count by dest, file_extension

| where file_extension=".Osiris" AND count > 50

 

Detect Volume Shadow Copy Deletion (via Event Code 4688)

index=windows_logs EventCode=4688 (CommandLine="*vssadmin*" AND CommandLine="*delete*" AND CommandLine="*shadows*")

 

Identify spikes in egress traffic to cloud providers like Wasabi

index=network_logs (dest_host="*.wasabisys.com" OR dest_host="*.amazonaws.com")

| stats sum(bytes_out) as total_egress by src_ip

| where total_egress > 100000000

Delivery Method

·       Not known at this time

o   Based on previous variant it is suspected to be spear-phishing or a VPN exploit

Email example

Sample Email Content

(Corporate Phishing):

From: [Spoofed Name] <[Legitimate Company Vendor Email]>

Subject: Invoice Discrepancy - INV-55402

Hello,

Please review the attached invoice regarding the recent services rendered. We noticed a discrepancy in the final amount compared to the purchase order.

Could you please review and confirm?

Best regards,

[Name]

Attachment: Invoice_55402.zip (Contains malicious script)

Common Subject Lines

·       Updated Q4 Project Requirements

·       Action Required: Invoicing Discrepancy INV-[Random Number]

·       Confidential: Revised Compensation Structure

·       HR Documentation: Employee Policy Update

URL References

VirusTotal

·       hxxps://www.virustotal.com/gui/file/27d90611f005db3a25a4211cf8f69fb46097c6c374905d7207b30e87d296e1b3

SiliconAngle Technical Deep-Dive

·       hxxps://siliconangle.com/2026/01/22/new-osiris-ransomware-reveals-sophisticated-tactics-experienced-attackers/

Red Piranha Threat Intelligence

·       hxxps://redpiranha.net/news/threat-intelligence-report-december-16-december-22-2025

WatchGuard Ransomware Tracker

·       hxxps://www.watchguard.com/wgrd-security-hub/ransomware-tracker/Osiris

Previous
Previous

KONNI Developer Phishing (AI-Enhanced Backdoor)

Next
Next

CVE-2026-20045 Cisco Unified Communications Products Code Injection Vulnerability