THREAT ACTOR

Lynx

7.5
THREAT LEVEL
EMERGENCE DATE
Jul 2024
CATEGORY
Ransomware-as-a-Service
AFFILIATIONS

INC Ransomware (predecessor), RAMP forum ecosystem

DEscription

Emerging in July 2024 as a Ransomware-as-a-Service (RaaS) operation, Lynx quickly established itself through aggressive double-extortion tactics targeting manufacturing, legal services, and energy sectors. Operating as a direct rebrand of the INC ransomware group with over 90% code similarity, the operation has compromised numerous organizations globally as of June 2025.

CRITICALITY
Assesses the importance of the potential target, including their size/scale, data's value, and operational impact.
lethality
Evaluates the potential for damage from the attack, including the ability to disrupt operations, and cause financial loss, damage public brand image.
AGGRESSIVENESS
Assesses the psychological and tactical intensity of the group’s behavior, including targeted harassment, violent language, blackmail, and political motives.

Classifications & Affiliations

Type: Ransomware-as-a-Service (RaaS)

Direct successor to INC Ransomware, sharing substantial codebase overlap and operational infrastructure. The group maintains a closed affiliate model with selective recruitment through Russian-language forums, excluding operators from CIS countries and China.

Current Status: Active and expanding operations

Threat Level:
7.5

Origins and Methodology

Lynx represents a calculated evolution in ransomware operations, emerging from the dissolution of INC Ransomware whose source code was reportedly sold for $300,000 on the RAMP forum in May 2024. Demonstrating high operational organization through its structured affiliate program, the group offers generous revenue share to partners while maintaining centralized control over infrastructure and victim negotiations.

The threat actor has cultivated a reputation for technical competence and aggressive tactics, including unique features like sending ransom notes to all connected printers and implementing drip data leaks to pressure victims. Despite claims to avoid socially important organizations, confirmed attacks on energy infrastructure and utilities contradict these assertions.

What is the Evolution of Lynx Ransomware?
0.1
Formation

Lynx formed in July 2024 following the acquisition of INC ransomware source code, with first public samples appearing mid-month. The transition from INC to Lynx was rapid, with INC activity ceasing by September 2024.

0.2
EVOLUTION

Demonstrating continuous technical refinement, the group introduced multi-mode encryption options (fast/medium/slow/entire) to balance speed and impact. Cross-platform capabilities expanded to include Linux variants supporting ARM, MIPS, and PPC architectures, alongside ESXi targeting for virtualized environments.

0.3
Lineage/Connections

BinDiff analysis confirms 70.8% functional code similarity between Lynx and INC ransomware, with shared encryption methods and desktop wallpaper modification routines.

Which Unique Techniques Does Lynx Use?

TECHNIQUE

DETAILS

Infection Vectors

Primary access occurs through spearphishing campaigns (T1566.001/T1566.002) and exploitation of unpatched vulnerabilities in public-facing applications. The group actively targets Remote Desktop Protocol (RDP) endpoints through brute-force attacks and credential stuffing.

Target Selection

Lynx prioritizes small-to-medium businesses (SMBs) in manufacturing, legal services, and energy sectors. Geographic focus centers on North America and Europe, with emerging activity in Asia-Pacific regions.

Operational Complexity

The group demonstrates advanced capabilities through multi-threaded encryption using Windows I/O Completion Ports, BYOVD (Bring Your Own Vulnerable Driver) attacks to disable security tools, and sophisticated privilege escalation via the SeTakeOwnershipPrivilege token manipulation.

Key Features & Technical Details

The technical architecture represents an evolution of established ransomware capabilities, building upon INC Ransomware foundations while incorporating modern operational techniques.

FEATURE

DETAILS

Encryption Methods

AES-128 in CTR mode with Curve25519 Donna for key exchange; implements partial encryption (1MB per 6MB) for speed optimization

Double Extortion

Exfiltrates data pre-encryption (average 500GB+); implements dripping leak strategy on Tor-hosted sites

Cross-Platform

Windows (x86/x64), Linux (ARM/MIPS/PPC), ESXi variants in "All-in-One Archive" distribution

Monetization

Bitcoin and Monero payments via Tor portals; revenue split favoring affiliates

Communication

Command-line interface with extensive customization flags (--file, --dir, --encrypt-network, --mode)

Behavioral Patterns

Printer targeting for physical ransom notes; desktop wallpaper modification; shadow copy deletion via DeviceIoControl

Activities

Maintaining steady operational tempo since emergence, Lynx experienced confirmed attacks growing consistently from initial operations in July 2024 through June 2025. A significant surge in August 2024 established the group as a major player in the ransomware ecosystem. Current operations span multiple countries with continued focus on English-speaking targets.

Which Industries Are Most Vulnerable to Lynx?

Manufacturing organizations face disproportionate targeting due to operational disruption potential and typically weaker security postures compared to financial services. Legal services attract attention for high-value intellectual property and client data suitable for double extortion. Energy and utility sectors, despite claimed avoidance, remain vulnerable due to critical infrastructure status and pressure for rapid ransom payment.

Modus Operandi

Lynx employs a systematic approach to compromise, beginning with reconnaissance of vulnerable systems and culminating in coordinated encryption across networked resources. The group demonstrates patience in establishing persistence before executing ransomware deployment.

Details

Spearphishing campaigns deploy phishing emails with malicious attachments and links to harvest credentials (T1566.001/T1566.002), while RDP brute-forcing (T1021) targets exposed endpoints using compromised credentials from credential stuffing and leaked databases.

Active exploitation focuses on unpatched vulnerabilities in Internet-facing systems including CVE-2024-54085 and CVE-2024-0769, with systematic scanning for exposed RDP services.

Details

Network reconnaissance combines SMB enumeration via WNetOpenEnumW API calls with SMB file share scanning and Nmap for network topology mapping.

Active Directory enumeration reveals domain structure and privileged accounts while running process analysis identifies security tools and system services, enabling targeted credential harvesting and backup system identification.

Details

Persistent access leverages RDP for system control and command execution alongside AnyDesk and other legitimate RMM tools that blend with administrative traffic. Custom backdoors provide redundant channels resilient to detection.

Details

Evasion tactics employ BYOVD attacks with vulnerable drivers, polymorphic code generation, and file obfuscation including XOR string obfuscation to defeat detection. Security process termination via Restart Manager API targets AV and EDR solutions while access token manipulation (T1134) and service privilege exploitation achieve SYSTEM-level access through SeTakeOwnershipPrivilege token manipulation.

Firewall rule modification enables malicious communications as UAC bypass techniques (T1548.002) circumvent Windows security controls. Shadow copy deletion via DeviceIoControl eliminates recovery options while anti-analysis techniques hinder investigation.

Details

Mimikatz (T1003) extracts credentials from LSASS process memory enabling pass-the-hash attacks with captured NTLM hashes. Browser credential theft harvests saved passwords and session cookies while registry credential mining targets stored Windows authentication data.

Domain account abuse leverages compromised administrative credentials as both custom and public tools systematically harvest cached domain credentials and password stores.

Details

C2 infrastructure operates exclusively through Tor hidden services with no persistent IP infrastructure, utilizing negotiation and data leak portals for operations. C2 channel data transfer facilitates exfiltration to attacker-controlled servers before encryption through fully encrypted communications.

Details

Movement leverages SMB/Admin shares for tool distribution and RDP session hijacking with stolen credentials across network segments. SMB protocol exploitation enables file system access and remote execution while WMI/PowerShell remoting (T1021.006) provides stealthy cross-system command execution accelerated by credential reuse.

Details

Pre-encryption theft averaging 500GB per victim occurs through C2 channel transfers to attacker-controlled servers and cloud account exploitation of legitimate services. High-value target prioritization focuses on financial records, intellectual property, and HR files with staged exfiltration avoiding detection systems.

Details

Persistence establishes scheduled tasks (T1053) and registry modifications for autostart entries alongside malicious service creation for recurring payload deployment, ensuring redundant access despite remediation attempts.

Details

Attacks achieve complete operational disruption through file encryption, data breach exposure via exfiltration, extended recovery from shadow copy deletion and backup destruction.

Details

Multi-threaded encryption deploys AES-128 in CTR mode with Curve25519 key exchange, implementing partial encryption (1MB per 6MB) through Windows I/O Completion Ports for rapid network-wide encryption. Selective file targeting preserves system files while applying .LYNX extension across multiple encryption modes.

Details

Extortion employs printer spamming to all connected printers, wallpaper defacement on infected systems, and drip data leaks on Tor-hosted sites releasing stolen data incrementally within 72 hours to pressure payment.

Details

Post-encryption routines execute shadow copy deletion via vssadmin and wmic commands, backup file deletion, system restore disablement, and recovery tool termination to prevent restoration.

Windows event log clearing (T1070.001) removes forensic artifacts while boot configuration modification and anti-forensics scripts complicate incident response.

Indicators of Compromise (IOCs)

Key indicators help identify Lynx operations within networks, particularly specific file hashes, Tor infrastructure, and behavioral patterns tied to the ransomware ecosystem.

INDICATOR

DETAILS

File Hashes

c02b014d88da4319e9c9f9d1da23a743a61ea88be1a389fd6477044a53813c72 (DNSC-validated sample)
b378b7ef0f906358eec595777a50f9bb5cc7bb6635e0f031d65b818a26bdc4ee (MalwareBazaar)
eaa0e773eb593b0046452f420b6db8a47178c09e6db0fa68f6a2d42c3f48e3bc (Fortinet)

IP Addresses

No persistent C2 IPs documented; relies on Tor infrastructure

Domains/URLs

hxxp://lynxblog[.]net/ (Clearnet C2)
hxxp://lynxch2k5xi35j7hlbmwl7d6u2oz4vp2wqp6qkwol624cod3d6iqiyqd[.]onion (Payment)
hxxp://lynxbllrfr5262yvbgtqoyq76s7mpztcqkv6tjjxgpilpma7nyoeohyd[.]onion (Leak site)

File Paths

%TEMP%\background-image.jpg (Wallpaper staging)
README.txt (Ransom note in all directories)
HKCU\Control Panel\Desktop (Registry modification)

Exploits and Vulnerabilities

Lynx actively exploits known vulnerabilities in enterprise infrastructure, particularly targeting remote access systems and management interfaces for initial compromise.

EXPLOITS AND VULNERABILITIES

CVE

CVSS

DESCRIPTION

AMI MegaRAC Auth Bypass

CVE-2024-54085

9.8

Authentication spoofing in baseboard management

D-Link DIR-859 Path Traversal

CVE-2024-0769

8.8

Unauthorized file access vulnerability

FortiOS Hard-Coded Credentials

CVE-2019-6693

9.1

Admin privilege escalation via static credentials