Loading cryptocurrency prices...

Storm-2603 Exploits Velociraptor DFIR in Multi-Ransomware Attacks

Storm-2603 exploits SharePoint vulnerability and misuses Velociraptor for sophisticated multi-ransomware operations linked to Chinese state actors

  • Threat actors linked to Storm-2603 are misusing Velociraptor, an open-source forensic tool, in Ransomware attacks.
  • They exploited SharePoint vulnerabilities named ToolShell to gain initial access.
  • The attackers used an outdated Velociraptor version vulnerable to privilege escalation (CVE-2025-6264) for endpoint control.
  • Storm-2603 deployed Warlock, LockBit, and Babuk ransomware, showing operational sophistication and possible ties to Chinese state actors.
  • The group demonstrates rapid ransomware development, multi-family deployment, and advanced evasion techniques.

Storm-2603, a ransomware group active in 2025, has been found using Velociraptor, an open-source digital forensics and incident response (DFIR) tool, in ransomware campaigns. The attacks exploited on-premises SharePoint flaws known as ToolShell to break into systems and deliver an older Velociraptor version (0.73.4.0). This version had a known privilege escalation vulnerability (CVE-2025-6264), which allowed the attackers to execute arbitrary commands and take control of affected endpoints.

- Advertisement -

According to Cisco Talos, the attackers escalated privileges by creating domain administrator accounts and used lateral movement tools like Smbexec to spread within networks. Before deploying ransomware such as Warlock, LockBit, and Babuk, the group altered Active Directory Group Policy Objects (GPOs) and disabled real-time system defenses to avoid detection. This is the first documented link between Storm-2603 and Babuk ransomware.

Rapid7, the tool’s maintainer since 2021, acknowledged that tools like Velociraptor can be misused by adversaries when in the wrong hands. Christiaan Beek, Rapid7’s senior director of threat analytics, described this as, “a misuse pattern rather than a software flaw: adversaries simply repurpose legitimate collection and orchestration capabilities.”

Halcyon reported that Storm-2603 shows connections to Chinese nation-state actors based on early access to the ToolShell exploit and the professional quality of ransomware samples. The group’s use of multiple ransomware families aims to confuse attribution and evade defenses. Warlock, launched in June 2025, was designed to deploy several ransomware variants quickly, demonstrating sophisticated resources and structured workflows. This includes operational security measures like removing timestamps and compiling ransomware during specific hours aligned with China Standard Time.

Additional findings show Storm-2603 established infrastructure for the AK47 command-and-control framework in March 2025 and rapidly shifted from LockBit-only attacks to dual deployments involving LockBit and Warlock within 48 hours. After registering as a LockBit affiliate, the group continued developing its ransomware, deploying Babuk ransomware in July 2025 using the ToolShell zero-day exploit.

- Advertisement -

Halcyon highlighted the group’s quick adaptation and technical expertise, describing their tactics as, “operational flexibility, detection evasion capabilities, attribution confusion tactics, and sophisticated builder expertise using leaked and open-source ransomware frameworks.”

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

OpenAI to Allow Erotic Content in ChatGPT for Verified Adults

OpenAI will allow verified adults to generate erotic and romantic content on ChatGPT starting...

Ethereum Launches Protocols to Empower Decentralised AI Agents

Ethereum developers advance protocols that integrate Artificial Intelligence agents on the blockchain.A new standard,...

Celsius Secures $299.5M Tether Settlement Over Early BTC Liquidation

Celsius Network has reached a $299.5 million settlement with Tether after nearly three years...

US Sanctions Prince Group, Seizes $15B in Bitcoin Linked to Scams

The U.S. imposed 146 sanctions on Cambodia’s Prince Group and requested the forfeiture of...

NYC Mayor Adams Launches Digital Assets, Blockchain Office

New York City Mayor Eric Adams has established a municipal office focused on digital...
- Advertisement -

Must Read

How to Buy Dedicated Hosting With Crypto

In this article I am going to show you how to buy dedicated hosting with crypto from one of the best European hosting providers...