Threat Advisories:
🎧 Podcast: This Month's Threats in 10 Min! Emerging Threat Intel Audio Briefing - Listen & Defend Now →
👥 Play Count: Loading...

Crypto24 Ransomware Disrupts Businesses Using Custom EDR Bypass

Red | Attack Report
Download PDF

Crypto24 Ransomware Threat Advisory 2025

Global Ransomware Surge Targeting Critical Industries

Crypto24 ransomware, first detected in September 2024, has rapidly evolved into a global cybersecurity threat. This ransomware operation has targeted industries across Asia, Europe, Egypt, Canada, the United States, Argentina, and Colombia. Victims span critical sectors such as banking, defense, healthcare, aerospace, telecommunications, manufacturing, logistics, and IT services. By exploiting legitimate IT tools alongside custom-built malware, the group has become one of the most adaptive ransomware actors in 2025.


Attack Overview

Stealth, Multi-Stage Ransomware Campaigns

Crypto24 leverages a multi-stage attack chain that blends in with legitimate IT operations. Tactics include:

  • Using PSExec for lateral movement and AnyDesk for persistence.

  • Employing keyloggers for credential theft and multiple backdoors for deeper infiltration.

  • Exploiting Google Drive for covert data exfiltration.

  • Abusing gpscript.exe to uninstall endpoint protection (Trend Vision One).

Its activity surged in July–August 2025, marking the most aggressive campaign, striking Malaysia, the U.S., and Italy with sector-wide disruptions.


Targeted Regions and Industries

Widespread Impact Across Multiple Countries
  • Asia – Attacks concentrated in Malaysia, hitting manufacturing, transportation, and tech.

  • United States – Healthcare, education, and telecom were prime victims.

  • Europe – Aerospace, defense, and agriculture sectors in Italy were heavily impacted.

Industries most at risk include banking, insurance, pharmaceuticals, logistics, technology, human resources, food services, and gaming.


Persistence and Defense Evasion

Living Off the Land with Weaponized IT Tools

Crypto24 maintains persistence by:

  • Enabling or creating Windows admin accounts.

  • Running malicious services like WinMainSvc (keylogger) and MSRuntime (ransomware loader).

  • Deploying scheduled tasks for stealth persistence.

The ransomware evades detection by abusing trusted system tools and disguising malicious actions within legitimate workflows.


Recommendations for Organizations

Best Practices for Ransomware Defense
  1. Strengthen Account & Access Controls – Audit privileged accounts, disable unused ones, and enforce MFA.

  2. Harden Remote Access – Restrict RDP and tools like PsExec and AnyDesk.

  3. Enhance Monitoring – Detect suspicious use of native Windows utilities and abnormal outbound traffic.

  4. Backup & Recovery – Implement the 3-2-1 backup strategy with immutable and offsite storage.

  5. Incident Preparedness – Continuously validate defenses against ransomware TTPs.


MITRE ATT&CK Techniques

Crypto24’s Attack Tactics and Techniques

Crypto24 maps to multiple MITRE ATT&CK TTPs, including:

  • Initial Access (TA0001) via external remote services.

  • Persistence (TA0003) with malicious Windows services and local accounts.

  • Defense Evasion (TA0005) by disabling EDR and firewall protections.

  • Lateral Movement (TA0008) using PSExec and remote tools.

  • Exfiltration (TA0010) to cloud storage (Google Drive).

  • Impact (TA0040) with ransomware payload encryption.


Indicators of Compromise (IOCs)

Hashes, Emails, and Malicious Domains
  • SHA256 Samples – Multiple unique ransomware payload signatures.

  • Emails – crypto24support[@]pm[.]me, noreply[@]crypto24lab[.]com

  • TOR Address – j5o5y2feotmhvr7c[…]ad[.]onion

  • Compromised Domains – palmgold-mgmt.com, cms.law/en/int/, karndean.com, soubeiranchobet.com.ar, larimart.it, arianadx.com.


References

Research Sources on Crypto24 Ransomware

What’s new on HivePro

Get through updates and upcoming events, and more directly in your inbox