Leveling Up with NightSpire Ransomware

NightSpire ransomware, first discovered in February 2025, presents a categorization challenge regarding whether it operates as Ransomware-as-a-Service (RaaS). Analysis of two incidents from December 2025 and March 2026 reveals significant variations in tactics, techniques, and procedures between attacks. The March 2026 incident involved threat actors installing Chrome Remoting Desktop and AnyDesk for persistence, using Everything and 7Zip for data staging, MEGASync for exfiltration, and deploying VMWare Workstation and WPS Office. The attacker accessed systems via RDP days before detection. Comparison with the December 2025 incident shows evolution in the ransomware encryptor, including modified ransom note filenames and contents. These variations in TTPs and indicators suggest either operational evolution or involvement of multiple affiliates, demonstrating that ransomware indicators aren't consistent across campaigns.

Pulse ID: 69d61cc749755c1135d6faa9
Pulse Link: https://otx.alienvault.com/pulse/69d61cc749755c1135d6faa9
Pulse Author: AlienVault
Created: 2026-04-08 09:15:51

Be advised, this data is unverified and should be considered preliminary. Always do further verification.

#7Zip #AnyDesk #Chrome #CyberSecurity #ICS #InfoSec #OTX #Office #OpenThreatExchange #RAT #RDP #RaaS #RansomWare #RansomwareAsAService #VMware #ZIP #bot #AlienVault

LevelBlue - Open Threat Exchange

Learn about the latest cyber threats. Research, collaborate, and share threat intelligence in real time. Protect yourself and the community against today's emerging threats.

LevelBlue Open Threat Exchange