
CrazyHunter Ransomware
CrazyHunter is a ransomware campaign targeting healthcare that weakens endpoint defenses and escalates privileges before encrypting systems at scale.

The Remexi Backdoor malware has been observed since at least 2014, and is believed to be employed by Iranian adversaries. Originally, the malware's function was relatively limited, allowing for traditional reverse shell backdoor functions.
Overtime the malware has grown far more capable, including as an information theft tool. The malware is now known to be able to capture clipboard data, perform file discovery across a system, capturing ket strokes through keylogging, and screen capture for windows of interest.
Targeting has included government, including diplomatic agencies, as well as other industries of interest for the Iranian government.
The malware has been observed being delivered via targeted spear phishing operations, as well, as manual placement post-compromise.
The malware is able to establish persistence using Registry Run Keys, and Winlogon Helper DLL.
The malware has been observed using BITSAdmin for its C2 channel.
Remexi Threat Hunting Packages

CrazyHunter is a ransomware campaign targeting healthcare that weakens endpoint defenses and escalates privileges before encrypting systems at scale.

DevMan Ransomware is a newly emerging ransomware operation observed in 2025 that has been assessed as a derivative of the DragonForce ransomware family.

Gootloader resurfaced with enhanced capabilities, building on the multi-stage loader malware first seen in 2020.
Stay informed with our weekly executive update, sending you the latest news and timely data on the threats, risks, and regulations affecting your organization.