Cyware Social will be sunset on April 15, 2026. The service is being replaced by Cyware's Daily Threat Intel Briefs,
offering curated security advisories on the latest threats. Enterprise users can contact us here → for more details.

Egregor ransomware has now compromised more than 150 victims since its first appearance in September 2020. The FBI recently released a security alert warning private sector firms about this ransomware.

Quick info

Egregor ransomware uses several mechanisms to target business networks, such as compromising business networks and personal accounts of employees sharing access with business networks or devices. 
  • The most targeted sectors by this ransomware include enterprise, manufacturing, education, transport, and retail. In addition, the affected regions include South and North Americas and Western Europe.
  • Email phishing is believed to be the initial method of infection used by the Egregor operators. Phishing emails laden with attachments and exposed RDP or VPNs are some of the attack vectors used by Egregor to gain access into the victim’s network.
  • In addition, the ransomware uses a post-exploitation tool such as Cobalt Strike, Qakbot/Qbot malware, Advanced IP Scanner, along with AdFind, for lateral network movement and privilege escalation.

RaaS with former Maze affiliates

Egregor operates as a RaaS and has worked with former Maze affiliates that hacked networks to deploy ransomware payloads. In addition, the Egregor group shares ransom payment earnings with its operators in a 70/30 split.

Recent attacks


Conclusion

In the light of rising ransomware attacks, security teams must strongly consider backing-up critical data offline more often than ever, install and regularly update anti-virus or anti-malware software on all hosts, use two-factor authentication, and configure RDP by restricting access.
Cyware Publisher

Publisher

Cyware