Article

Ransomware Realities: Additional Risks During the Crisis

May 31, 2024

Arete Analysis

Cybersecurity Trends

Red digital warning symbol glowing on a circuit board interface, representing active ransomware exploitation of the VMware ESXi CVE 2025 22225 vulnerability and hypervisor compromise.

Upon identification of a ransomware incident, many individuals may experience some level of stress or panic. However, while minimizing business interruption by restoring data from backups or other means, other post-incident factors must be considered so organizations can take proper precautions and avoid further security compromises.

Three’s a Crowd – Having Multiple Actors in Your Environment

In rare cases, continued use of initial access brokers (IABs) by ransomware groups can lead to multiple threat actors within an environment simultaneously. IABs sometimes sell the same access to multiple actors to increase profits, leading to re-encryption of the environment or, in some cases, multi-encryption events from multiple ransomware executables. Unsurprisingly, recovery in these scenarios is extremely difficult.

Malvertising is another way multiple actors can inadvertently end up within a victim’s environment. Malvertising is a malicious attack that involves injecting code into a legitimate advertising site. Various threat actors operate campaigns where they distribute backdoored or otherwise malicious versions of commonly used information security tools like Putty and WinSCP. When a victim downloads these tools, they may give the threat actors access to the environment, leading to threats as serious as ransomware. However, some threat actors also use simple Google searches to find and download legitimate tools they abuse to facilitate their operations. In some cases, threat actors may accidentally download an application backdoored by a different threat actor, meaning two threat actors are now operational within the victim environment.

The threat of having multiple actors within any given network demonstrates the importance of proper forensic analysis and top-tier endpoint detection and response (EDR) deployment following a security incident. Whether an organization chooses to recover from backups or pay for decryption, it is imperative that incident response companies can acquire adequate logs surrounding the time of the incident to conduct their analysis. Failure to do so can lead to increased costs associated with analysis, gaps in the timeline, and in the worst-case scenario, threat actors maintaining persistence in the victim environment, leading to events such as re-encryption.

Non-Reputable Companies and Software

In the critical moments following the identification of a ransomware incident, an overwhelming number of choices must be made. Ideally, the victim organization has a detailed incident response plan, practiced it several times in mock engagements, and printed out the plan in several physical locations which can be enacted with calm and purpose during the incident to decrease frenzy surrounding decision making. Of the many decisions to be made during the incident response process, one of the most important is choosing which organizations to partner with in the legal and recovery efforts. Pre-selection of data privacy counsel specializing in these events and a digital forensic incident response company are ideal, but not typically the case.

In cases where a ransom payment is required, most organizations will enlist a third-party organization registered as a money service business (MSB) to facilitate the ransom payment.  The use of an unregistered third-party leads to higher organizational risks surrounding ransom payments, including potential regulatory action and the possibility of losing the ransom fund itself to a scam or otherwise, necessitating a second payment sum.

Additionally, when receiving a decryptor, whether from a third-party resource or a threat actor, the decryptor should be validated to ensure there are no hidden malicious functions. If a commercial decryptor is not properly vetted prior to being used to decrypt the victim’s more valuable files, it could lead to the inability to recover the files.

Conclusion

The best precaution against ancillary threats following a ransomware incident is an existing and tested incident response plan and immediate implementation of the remediation instructions provided by reputable vendors retained to respond to the incident. From increased security to financial risks, an organization’s choices following an incident can have a lasting impact on their ability to recover successfully.

For more information visit Arete’s Advisory Services

Sources

Back to Blog Posts

Red digital warning symbol glowing on a circuit board interface, representing active ransomware exploitation of the VMware ESXi CVE 2025 22225 vulnerability and hypervisor compromise.
Red digital warning symbol glowing on a circuit board interface, representing active ransomware exploitation of the VMware ESXi CVE 2025 22225 vulnerability and hypervisor compromise.

Article

Mar 9, 2026

Ransomware Trends & Data Insights: February 2026

After a slight lull in January, Akira and Qilin returned to dominating ransomware activity in February, collectively accounting for almost half of all engagements that month. The rest of the threat landscape remained relatively diverse, with a mix of persistent threats like INC and PLAY, older groups like Cl0p and LockBit, and newer groups like BravoX and Payouts King. Given current trends, the first quarter of 2026 will likely remain relatively predictable, with the top groups from the second half of 2025 continuing to operate at fairly consistent levels month to month.

Figure 1. Activity from the top 5 threat groups in February 2026

Throughout the month of February, analysts at Arete identified several trends behind the threat actors perpetrating cybercrime activities: 

  • In February, Arete observed Qilin actively targeting WatchGuard Firebox devices, especially those vulnerable to CVE-2025-14733, to gain initial access to victim environments. CVE-2025-14733 is a critical vulnerability in WatchGuard Fireware OS that allows a remote, unauthenticated threat actor to execute arbitrary code. In addition to upgrading WatchGuard devices to the latest Firebox OS version, which patches the bug, administrators are urged to rotate all shared secrets on affected devices that may have been compromised and may be used in future campaigns.


  • Reports from February suggest that threat actors are increasingly exploring AI-enabled tools and services to scale malicious activities, demonstrating how generative AI is being integrated into both espionage and financially motivated threat operations. The Google Threat Intelligence Group indicated that state-backed threat actors are leveraging Google’s Gemini AI as a force multiplier to support all stages of the cyberattack lifecycle, from reconnaissance to post-compromise operations. Separate reporting from Amazon Threat Intelligence identified a threat actor leveraging commercially available generative AI services to conduct a large-scale campaign against FortiGate firewalls, gaining access through weak or reused credentials protected only by single-factor authentication.


  • The Interlock ransomware group recently introduced a custom process-termination utility called “Hotta Killer,” designed to disable endpoint detection and response solutions during active intrusions. This tool exploits a zero-day vulnerability (CVE-2025-61155) in a gaming anti-cheat driver, marking a significant adaptation in the group’s operations against security tools like FortiEDR. Arete is actively monitoring this activity, which highlights the growing trend of Bring Your Own Vulnerable Driver (BYOVD) attacks, in which threat actors exploit legitimate, signed drivers to bypass and disable endpoint security controls.

Sources

  • Arete Internal

Read More

Red digital warning symbol glowing on a circuit board interface, representing active ransomware exploitation of the VMware ESXi CVE 2025 22225 vulnerability and hypervisor compromise.
Red digital warning symbol glowing on a circuit board interface, representing active ransomware exploitation of the VMware ESXi CVE 2025 22225 vulnerability and hypervisor compromise.

Article

Mar 3, 2026

ClickFix Campaign Delivers Custom RAT

Security researchers identified a sophisticated evolution of the ClickFix campaign that aims to compromise legitimate websites before delivering a five-stage malware chain, culminating in the deployment of MIMICRAT. MIMICRAT is a custom remote access trojan (RAT) written in the C/C++ programming language that offers various capabilities early in the attack lifecycle. The attack begins with victims visiting compromised websites, where JavaScript plugins load a fake Cloudflare verification that tricks users into executing a malicious PowerShell script, further displaying the prominence and effectiveness of ClickFix and its user interaction techniques. 

Not Your Average RAT 

MIMICRAT displays above-average defense evasion and sophistication, including: 

  • A five-stage PowerShell sequence beginning with Event Tracing for Windows and Anti-Malware Scan Interface bypasses, which are commonly used in red teaming for evading detection by EDR and AV toolsets.  

  • The malware later uses a lightweight scripting language that is scripted into memory, allowing malicious actions without files that could easily be detected by an EDR tool.  

  • MIMICRAT uses malleable Command and Control profiles, allowing for a constantly changing communication infrastructure. 

  • The campaign uses legitimate compromised infrastructure, rather than attacker-owned tools, and is prepped to use 17 different languages, which increases global reach and defense evasion. 

Analyst Comments 

The ClickFix social engineering technique remains an effective means for threat actors to obtain compromised credentials and initial access to victim environments, enabling them to deploy first-stage malware. Coupled with the sophisticated MIMICRAT RAT, the effectiveness of this campaign could increase. Arete will continue monitoring for changes to the ClickFix techniques, the deployment of MIMICRAT in other campaigns, and other pertinent information relating to the ongoing campaign. 

Sources 

  • MIMICRAT: ClickFix Campaign Delivers Custom RAT via Compromised Legitimate Websites

Read More

Red digital warning symbol glowing on a circuit board interface, representing active ransomware exploitation of the VMware ESXi CVE 2025 22225 vulnerability and hypervisor compromise.
Red digital warning symbol glowing on a circuit board interface, representing active ransomware exploitation of the VMware ESXi CVE 2025 22225 vulnerability and hypervisor compromise.

Article

Feb 20, 2026

Threat Actors Leveraging Gemini AI for All Attack Stages

State-backed threat actors are leveraging Google’s Gemini AI as a force multiplier to support all stages of the cyberattack lifecycle, from reconnaissance to post-compromise operations. According to the Google Threat Intelligence Group (GTIG), threat actors linked to the People’s Republic of China (PRC), Iran, North Korea, and other unattributed groups have misused Gemini to accelerate target profiling, synthesize open-source intelligence, identify official email addresses, map organizational structures, generate tailored phishing lures, translate content, conduct vulnerability testing, support coding tasks, and troubleshoot malware development. Cybercriminals are increasingly exploring AI-enabled tools and services to scale malicious activities, including social engineering campaigns such as ClickFix, demonstrating how generative AI is being integrated into both espionage and financially motivated threat operations. 

What’s Notable and Unique 

  • Threat actors are leveraging Gemini beyond basic reconnaissance, using it to generate polished, culturally nuanced phishing lures and sustain convincing multi-turn social engineering conversations that minimize traditional red flags.  

  • In addition, threat actors rely on Gemini for vulnerability research, malware debugging, code generation, command-and-control development, and technical troubleshooting, with PRC groups emphasizing automation and vulnerability analysis, Iranian actors focusing on social engineering and malware development, and North Korean actors prioritizing high-fidelity target profiling. 

  • Beyond direct operational support, adversaries have abused public generative AI platforms to host deceptive ClickFix instructions, tricking users into pasting malicious commands that deliver macOS variants of ATOMIC Stealer.  

  • AI is also being integrated directly into malware development workflows, as seen with CoinBait’s AI-assisted phishing kit capabilities and HonestCue’s use of the Gemini API to dynamically generate and execute in-memory C# payloads.  

  • Underground forums show strong demand for AI-powered offensive tools, with offerings like Xanthorox falsely marketed as custom AI but actually built on third-party commercial models integrated through open-source frameworks such as Crush, Hexstrike AI, LibreChat-AI, and Open WebUI, including Gemini. 

Analyst Comments 

The increasing misuse of generative AI platforms like Gemini highlights a rapidly evolving threat landscape in which state-backed and financially motivated actors leverage AI as a force multiplier for reconnaissance, phishing, malware development, and post-compromise operations. At the same time, large-scale model extraction attempts and API abuse demonstrate emerging risks to AI service integrity, intellectual property, and the broader AI-as-a-Service ecosystem. While these developments underscore the scalability and sophistication of AI-enabled threats, continued enforcement actions, strengthened safeguards, and proactive security testing by providers reflect ongoing efforts to mitigate abuse and adapt defenses in response to increasingly AI-driven adversaries. 

Sources 

  • GTIG AI Threat Tracker: Distillation, Experimentation, and (Continued) Integration of AI for Adversarial Use 

Read More

Red digital warning symbol glowing on a circuit board interface, representing active ransomware exploitation of the VMware ESXi CVE 2025 22225 vulnerability and hypervisor compromise.
Red digital warning symbol glowing on a circuit board interface, representing active ransomware exploitation of the VMware ESXi CVE 2025 22225 vulnerability and hypervisor compromise.

Article

Feb 12, 2026

2025 VMware ESXi Vulnerability Exploited by Ransomware Groups

Ransomware groups are actively exploiting CVE‑2025‑22225, a VMware ESXi arbitrary write vulnerability that allows attackers to escape the VMX sandbox and gain kernel‑level access to the hypervisor. Although VMware (Broadcom) patched this flaw in March 2025, threat actors had already exploited it in the wild, and CISA recently confirmed that threat actors are exploiting CVE‑2025‑22225 in active campaigns.

What’s Notable and Unique

  • Chinese‑speaking threat actors abused this vulnerability at least a year before disclosure, via a compromised SonicWall VPN chain. 

  • Threat researchers have observed sophisticated exploit toolkits, possibly developed well before public disclosure, that chain this bug with others to achieve full VM escape. Evidence points to targeted activity, including exploitation via compromised VPN appliances and automated orchestrators.

  • Attackers with VMX level privileges can trigger a kernel write, break out of the sandbox, and compromise the ESXi host. Intrusions observed in December 2025 showed lateral movement, domain admin abuse, firewall rule manipulation, and staging of data for exfiltration. 

  • CISA has now added CVE-2025-22225 to its Known Exploited Vulnerabilities (KEV) catalog, underscoring ongoing use by ransomware attackers.

Analyst Comments

Compromise of ESXi hypervisors significantly amplifies operational impact, allowing access to and potential encryption of dozens of VMs simultaneously. Organizations running ESXi 7.x and 8.x remain at high risk if patches and mitigations have not been applied. Therefore, clients are recommended to apply VMware patches from VMSA‑2025‑0004 across all ESXi, Workstation, and Fusion deployments. Enterprises are advised to assess their setups in order to reduce risk, as protecting publicly accessible management interfaces is a fundamental security best practice.

Sources

  • CVE-2025-22225 in VMware ESXi now used in active ransomware attacks

  • The Great VM Escape: ESXi Exploitation in the Wild

  • VMSA-205-004: VMware ESXi, Workstation, and Fusion updates address multiple vulnerabilities (CVE-205-22224, CVE-2025-22225, CVE-2025-22226)

Read More