Warlock Ransomware: Old Actor, New Tricks?
The Warlock ransomware, first appearing in June 2025, is linked to a China-based actor with a history dating back to 2019. It gained prominence by exploiting the ToolShell vulnerability in Microsoft SharePoint. The group, known as Storm-2603, uses multiple ransomware payloads and a custom C&C framework called ak47c2. Warlock is likely a rebrand of the older Anylock ransomware and may have connections to the retired Black Basta operation. The actors behind Warlock have been involved in diverse activities, including espionage and cybercrime, suggesting they may be contractors. Their toolset includes defense evasion tools and the use of stolen digital certificates, linking them to earlier attacks by groups like CamoFei and ChamelGang.
Pulse ID: 68fa481ef76460d342e4d0c5
Pulse Link: https://otx.alienvault.com/pulse/68fa481ef76460d342e4d0c5
Pulse Author: AlienVault
Created: 2025-10-23 15:22:06
Be advised, this data is unverified and should be considered preliminary. Always do further verification.
#BlackBasta #CandC #China #CyberCrime #CyberSecurity #Espionage #InfoSec #Microsoft #OTX #OpenThreatExchange #RAT #RansomWare #Vulnerability #bot #AlienVault
