INC Ransomware Attack Lifecycle: Early Detection Opportunities

Summary:

INC ransomware is a financially motivated ransomware-as-a-service (RaaS) operation that has been active since mid-2023 and is assessed to be evolving into a successor strain known as Lynx. The operation poses a significant risk to medium-sized and large enterprises globally. INC operators conduct targeted, human-operated intrusions using phishing, stolen or brokered credentials, and exploitation of internet-facing vulnerabilities. Following initial access, attackers perform credential theft, lateral movement, and data exfiltration prior to deploying ransomware across Windows, Linux, and VMware ESXi environments. The group employs a double-extortion model, combining system encryption with the threat of data leakage to increase pressure on victims. Reducing operational and financial impact depends on early detection, strong identity and access controls, timely vulnerability remediation, resilient backup strategies, and well-practiced incident response capabilities.

Technical Description:

INC ransomware is a human-operated ransomware-as-a-service threat that gains initial access through phishing campaigns, credential theft, and exploitation of exposed internet-facing services. Once access is established, operators conduct hands-on reconnaissance using legitimate administrative tools to enumerate users, systems, and critical infrastructure. Credential dumping, lateral movement, and privilege escalation are used to obtain elevated or domain-level access.

Attackers rely on tools such as Mimikatz, PsExec, WMI, and remote access utilities to propagate laterally across Windows, Linux, and VMware ESXi environments. Backup systems and security controls are deliberately targeted to weaken recovery capabilities before encryption. To support double extortion, sensitive data is staged, compressed, and exfiltrated to external or cloud-based storage services before ransomware deployment. Encryption is executed across local, network-attached, and virtualized storage using partial, multi-threaded encryption. File contents are encrypted using AES-128 in CTR mode, with Curve25519 elliptic-curve cryptography used for key protection. Ransom notes and data leak threats are delivered through Tor-based infrastructure.

Delivery and Infection Chain:

INC ransomware operators obtain initial access through phishing campaigns, compromised credentials sourced from underground markets, or exploitation of exposed internet-facing vulnerabilities. Frequently exploited vulnerabilities include CVE-2023-3519 affecting Citrix NetScaler and CVE-2023-48788 impacting Fortinet

FortiClient EMS. In some cases, access is acquired from initial access brokers, allowing operators to bypass early intrusion stages and immediately initiate internal activity. The infection chain is typically observed as follows:

  • Attackers gain entry through phishing, stolen or brokered credentials, or exploitation of exposed vulnerabilities in internet-facing systems.
  • Persistence is established, and the environment is mapped using legitimate administrative tools to enumerate users, systems, and critical infrastructure.
  • Credentials are harvested from memory and backup systems, enabling escalation to privileged and domain administrator access.
  • Operators move laterally using remote execution mechanisms, locate sensitive data, and exfiltrate it to external storage for extortion leverage.
  • Ransomware is deployed across endpoints, servers, and virtualized environments, security controls are disrupted, and ransom demands are issued.

Technical Capabilities:

The technical capabilities observed in INC ransomware operations are consistent with mature, human-operated ransomware campaigns. The malware supports encryption of Windows, Linux, and VMware ESXi systems, enabling impact across heterogeneous enterprise environments. Partial encryption is employed to increase operational disruption while reducing execution time by encrypting only critical portions of files. File contents are encrypted using AES-128 in CTR mode, while Curve25519 elliptic-curve cryptography is used to protect encryption keys.

The ransomware executes in a multi-threaded manner and dynamically adjusts execution based on available CPU resources to accelerate encryption. Encrypted files are appended with extensions associated with INC or Lynx variants, and ransom notes are distributed across impacted systems. To evade detection and maintain control, operators primarily rely on legitimate administrative tools and commonly available third-party utilities. Credential dumping is performed using tools such as Mimikatz, while PsExec, WMI, and remote access utilities are used for lateral movement and persistence. Security and recovery mechanisms are deliberately degraded through termination of endpoint protection, deletion of volume shadow copies, modification of boot configurations, and theft of backup credentials. Data is exfiltrated before encryption, frequently via cloud-based file transfer services, enabling sustained double-extortion pressure during ransom negotiations.

Attribution and Evolution:

INC is assessed as a financially motivated ransomware-as-a-service operation with no verified state sponsorship. Its tactics, techniques, and operational characteristics align with those commonly observed in established human-operated ransomware ecosystems. Reports of the INC source code being offered for sale in 2024 coincided with the emergence of the Lynx ransomware variant, which exhibits notable code and behavioral overlap. This activity suggests a direct evolutionary progression rather than the appearance of an unrelated threat actor.

Active Campaign and Geographic Spread:

INC ransomware continues to target medium-sized and large organizations across manufacturing, healthcare, information technology, and professional services sectors. The majority of publicly reported incidents have occurred in the United States, the United Kingdom, Canada, Australia, and Europe, with increasing activity observed in the Middle East. Campaigns demonstrate deliberate victim selection and reconnaissance, and no confirmed incidents have been publicly reported within Russia or CIS countries.

Conclusion:

INC ransomware represents a persistent and evolving threat capable of causing significant operational and financial disruption. Its use of double extortion, deliberate targeting of domain infrastructure and backup systems, and continued evolution into the Lynx variant underscore the importance of treating these strains as a single threat family. Early detection, strong credential security, effective vulnerability management, resilient backup strategies, and rehearsed ransomware-specific incident response capabilities remain essential to minimizing impact and preventing full environment compromise.

Impact:

Successful INC ransomware attacks result in widespread system encryption, extended operational disruption, and the potential exposure of sensitive or regulated data. Double extortion significantly increases financial, legal, and reputational risk, particularly for organizations handling customer, patient, or critical infrastructure data. Targeting domain controllers and backup systems complicates recovery efforts and prolongs business interruption.

IOC and Context Details:

Topics Details
Tactic Name Initial Access, Credential Access, Lateral Movement, Exfiltration, Impact
Technique Name Phishing
Exploitation of Public-Facing Applications
Credential Dumping
Remote Services
Data Encryption for Impact
Sub Technique Name Spearphishing Attachment/Link
Exploit CVE Vulnerabilities
LSASS Memory Dumping
PsExec/WMI
Double Extortion
Attack Type Malware
Targeted Applications Citrix NetScaler, Fortinet FortiClient EMS, Active Directory, VMware ESXi, Windows/Linux Servers, Backup Software (e.g., Veeam)
Region Impacted United States, United Kingdom, Canada, Europe, Australia, Middle East
Industry Impacted Manufacturing, Healthcare, Technology, Professional Services, Industrial Enterprises
IOC’s MD5
2f000e0a52d6ee0c89f93fa5ab4c7e3c

SHA-1
6e45db2cc4648a388fbd6f3d82c7da9c8e30187d
41b9a2ca27188c967a28a9b72950380cd0fa8e20

SHA-256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Email Address
martina.lestariid1898@proton[.]me

Domain & IP
lynxblog[.]net
185.174.100.204

URLs
http[:]//lynxbllrfr5262yvbgtqoyq76s7mpztcqkv6tjjxgpilpma7nyoeohyd[.]onion
http[:]//lynxbllrfr5262yvbgtqoyq76s7mpztcqkv6tjjxgpilpma7nyoeohyd[.]onion/disclosures
http[:]//lynxblogco7r37jt7p5wrmfxzqze7ghxw6rihzkqc455qluacwotciyd[.]onion
http[:]//lynxblogijy4jfoblgix2klxmkbgee4leoeuge7qt4fpfkj4zbi2sjyd[.]onion
http[:]//lynxblogmx3rbiwg3rpj4nds25hjsnrwkpxt5gaznetfikz4gz2csyad[.]onion
http[:]//lynxblogoxllth4b46cfwlop5pfj4s7dyv37yuy7qn2ftan6gd72hsad[.]onion
http[:]//lynxblogtwatfsrwj3oatpejwxk5bngqcd5f7s26iskagfu7ouaomjad[.]onion
http[:]//lynxblogxstgzsarfyk2pvhdv45igghb4zmthnzmsipzeoduruz3xwqd[.]onion
http[:]//lynxblogxutufossaeawlij3j3uikaloll5ko6grzhkwdclrjngrfoid[.]onion
CVE CVE-2023-3519 (Citrix NetScaler)
CVE-2023-48788 (Fortinet FortiClient EMS)

Recommended Actions:

  • Enforce multi-factor authentication across all remote access services, including VPNs, RDP, and cloud platforms.
  • Regularly patch internet-facing systems, prioritizing vulnerabilities such as CVE-2023-3519 and CVE-2023-48788.
  • Restrict or segment RDP and SSH access from the internet to reduce exposure.
  • Isolate domain controllers, backup servers, and sensitive file shares using strict network segmentation and access controls.
  • Maintain offline or immutable backups with credentials isolated from primary domain accounts and regularly test restoration procedures.
  • Deploy endpoint detection and response (EDR) solutions capable of detecting credential dumping, unauthorized administrative activity, and volume shadow copy deletion.
  • Monitor for anomalous authentication patterns, off-hours logins, and abnormal privileged account activity.
  • Develop, document, and regularly exercise a ransomware-specific incident response plan, and retain a trusted incident response provider.

References :

https://www.provendata.com/blog/inc-ransomware/