INC Ransomware is a ransomware strain that has been used by the INC Ransom group since at least 2023 against multiple industry sectors worldwide. INC Ransomware can employ partial encryption combined with multi-threading to speed encryption.[1][2][3]
| Domain | ID | Name | Use | |
|---|---|---|---|---|
| Enterprise | T1047 | Windows管理规范 |
INC Ransomware has the ability to use wmic.exe to spread to multiple endpoints within a compromised environment.[2][3] |
|
| Enterprise | T1140 | 反混淆/解码文件或信息 |
INC Ransomware can run |
|
| Enterprise | T1120 | 外围设备发现 |
INC Ransomware can identify external USB and hard drives for encryption and printers to print ransom notes.[4] |
|
| Enterprise | T1486 | 数据加密以实现影响 |
INC Ransomware can encrypt data on victim systems, including through the use of partial encryption and multi-threading to speed encryption.[1][2][4][5][1] |
|
| Enterprise | T1083 | 文件和目录发现 |
INC Ransomware can receive command line arguments to encrypt specific files and directories.[4][1] |
|
| Enterprise | T1489 | 服务停止 |
INC Ransomware can issue a command to kill a process on compromised hosts.[4] |
|
| Enterprise | T1106 | 本机API |
INC Ransomware can use the API |
|
| Enterprise | T1570 | 横向工具传输 |
INC Ransomware can push its encryption executable to multiple endpoints within compromised infrastructure.[2] |
|
| Enterprise | T1491 | .001 | 篡改: Internal Defacement |
INC Ransomware has the ability to change the background wallpaper image to display the ransom note.[4][3] |
| Enterprise | T1082 | 系统信息发现 |
INC Ransomware can discover and mount hidden drives to encrypt them.[4] |
|
| Enterprise | T1490 | 系统恢复抑制 |
INC Ransomware can delete volume shadow copy backups from victim machines.[4] |
|
| Enterprise | T1135 | 网络共享发现 |
INC Ransomware has the ability to check for shared network drives to encrypt.[4] |
|
| Enterprise | T1652 | 设备驱动程序探测 |
INC Ransomware can verify the presence of specific drivers on compromised hosts including Microsoft Print to PDF and Microsoft XPS Document Writer.[4] |
|
| Enterprise | T1057 | 进程发现 |
INC Ransomware can use the Microsoft Win32 Restart Manager to kill processes with a specific handle or that are accessing resources it wants to encrypt.[4] |
|
| Enterprise | T1566 | 钓鱼 |
INC Ransomware campaigns have used spearphishing emails for initial access.[1] |
|
| ID | Name | References |
|---|---|---|
| G1032 | INC Ransom |