
CrazyHunter Ransomware
CrazyHunter is a ransomware campaign targeting healthcare that weakens endpoint defenses and escalates privileges before encrypting systems at scale.

Ryuk is a prolific and dangerous ransomware strain that was first observed in mid-August 2018. Ryuk is known to be a derivative of the commercially available HERMES ransomware.
The ransomware uses the WindowsCrypto API for encryption, and encrypts files with AES256 encryption algorithm.
The ransomware avoids encrypting files with the following file extensions:
.dll, .lnk, .hrmlog, .ini, *.exe.
The ransomware will also attempt to encrypt any attached Network Shares.
Ryuk operations are suspected to be carried out by an actor that Crowdstrike refers to as WIZARD SPIDER. The actor is known for employing a tactic referred to as "Big Game Hunting" or the routine targeting of very large enterprise organizations.
Ryuk has been observed being delivered using the following methods:
The Ryuk dropper has been observed performing a validation against the operating system's MajorVersion.
If the Operating System matches Windows 2000, Windows XP, or Windows Server 2003, then the ransomware drops the payload into C:\Documents and Settings\Default User.
If the operating system matches anything other than the above, it drops the executable in C:\Users\Public.
The file will be named using 5 random characters.
Once the dropper has successfully downloaded the dropper will use the command line to delete itself after it successfully executes the ransomware payload.
Ryuk has been observed achieving persistence using HKCU CurrentVersion\Run
*HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\
The value for the key is set to the executable file dropped and detailed in the Installation section.
Get the Free Hunt Packages!
Check Out Other Emerging Threats >

CrazyHunter is a ransomware campaign targeting healthcare that weakens endpoint defenses and escalates privileges before encrypting systems at scale.

DevMan Ransomware is a newly emerging ransomware operation observed in 2025 that has been assessed as a derivative of the DragonForce ransomware family.

Gootloader resurfaced with enhanced capabilities, building on the multi-stage loader malware first seen in 2020.
Stay informed with our weekly executive update, sending you the latest news and timely data on the threats, risks, and regulations affecting your organization.