Lynx ransomware analysis from March predicted RAF contractor breach - post-exploitation tool misidentified as phishing malware
Lynx勒索软件最初被认为通过钓鱼攻击传播并实施双重勒索,但二进制分析显示其不具备网络外泄功能且为后渗透工具。近期同一团伙入侵英国国防部承包商Dodd Group,在三周内窃取4TB数据后部署加密器,印证了该软件的特性。 2025-10-19 19:51:31 Author: www.reddit.com(查看原文) 阅读量:8 收藏

Back in March I reversed Lynx ransomware (SHA256: 0315dbb...) after seeing multiple vendor reports claiming phishing distribution with built-in double extortion.

Binary analysis contradicted this: - Zero network imports - No exfiltration code - CLI operator flags (--kill, --stop-processes, --encrypt-network) - Verbose logging to stderr - Zero obfuscation (trivial to reverse, but also instant AV detection)

Conclusion: Post-exploitation tool, not phishing payload.

Fast forward to last week: Same group breaches Dodd Group (UK MoD contractor), 4TB exfil over 3+ weeks, then deploys encryptor. Exactly the deployment model the binary characteristics suggested.


文章来源: https://www.reddit.com/r/ReverseEngineering/comments/1oaz90n/lynx_ransomware_analysis_from_march_predicted_raf/
如有侵权请联系:admin#unsafe.sh