Storm-2603 Exploits Velociraptor DFIR in Multi-Ransomware Attacks

Storm-2603 exploits SharePoint vulnerability and misuses Velociraptor for sophisticated multi-ransomware operations linked to Chinese state actors

  • Threat actors linked to Storm-2603 are misusing Velociraptor, an open-source forensic tool, in Ransomware attacks.
  • They exploited SharePoint vulnerabilities named ToolShell to gain initial access.
  • The attackers used an outdated Velociraptor version vulnerable to privilege escalation (CVE-2025-6264) for endpoint control.
  • Storm-2603 deployed Warlock, LockBit, and Babuk ransomware, showing operational sophistication and possible ties to Chinese state actors.
  • The group demonstrates rapid ransomware development, multi-family deployment, and advanced evasion techniques.

Storm-2603, a ransomware group active in 2025, has been found using Velociraptor, an open-source digital forensics and incident response (DFIR) tool, in ransomware campaigns. The attacks exploited on-premises SharePoint flaws known as ToolShell to break into systems and deliver an older Velociraptor version (0.73.4.0). This version had a known privilege escalation vulnerability (CVE-2025-6264), which allowed the attackers to execute arbitrary commands and take control of affected endpoints.

- Advertisement -

According to Cisco Talos, the attackers escalated privileges by creating domain administrator accounts and used lateral movement tools like Smbexec to spread within networks. Before deploying ransomware such as Warlock, LockBit, and Babuk, the group altered Active Directory Group Policy Objects (GPOs) and disabled real-time system defenses to avoid detection. This is the first documented link between Storm-2603 and Babuk ransomware.

Rapid7, the tool’s maintainer since 2021, acknowledged that tools like Velociraptor can be misused by adversaries when in the wrong hands. Christiaan Beek, Rapid7’s senior director of threat analytics, described this as, “a misuse pattern rather than a software flaw: adversaries simply repurpose legitimate collection and orchestration capabilities.”

Halcyon reported that Storm-2603 shows connections to Chinese nation-state actors based on early access to the ToolShell exploit and the professional quality of ransomware samples. The group’s use of multiple ransomware families aims to confuse attribution and evade defenses. Warlock, launched in June 2025, was designed to deploy several ransomware variants quickly, demonstrating sophisticated resources and structured workflows. This includes operational security measures like removing timestamps and compiling ransomware during specific hours aligned with China Standard Time.

Additional findings show Storm-2603 established infrastructure for the AK47 command-and-control framework in March 2025 and rapidly shifted from LockBit-only attacks to dual deployments involving LockBit and Warlock within 48 hours. After registering as a LockBit affiliate, the group continued developing its ransomware, deploying Babuk ransomware in July 2025 using the ToolShell zero-day exploit.

- Advertisement -

Halcyon highlighted the group’s quick adaptation and technical expertise, describing their tactics as, “operational flexibility, detection evasion capabilities, attribution confusion tactics, and sophisticated builder expertise using leaked and open-source ransomware frameworks.”

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Chrome zero-days exploited, Google patches actively

Google urgently released patches for two high-severity Chrome vulnerabilities already being actively exploited in...

US Debt Hits $578B Quarter, BRICS Sell-Off Sparks Alarm

The U.S. Department of the Treasury projects borrowing $578 billion in Q1 2026, a...

Crypto trader loses $50M in swap, gets only 324 tokens

A crypto trader executing a $50 million swap for AAVE tokens on Cow Swap...

Struggling Bitcoin Miners May Pivot to AI: Wintermute

Diminishing returns from Bitcoin mining are forcing miners to explore new revenue avenues, such...

Global Botnet SocksEscort Dismantled by FBI, Europol

An international law enforcement operation called Operation Lightning has dismantled the SocksEscort proxy service,...

Must Read

Top 10 Best DeFi Tokens to Invest in 2022

Decentralized Finance (Defi), is one of the most talked-about topics in the crypto space alongside NFTs. So if you want to know the best...