On December 28, 2025, the DevMan ransomware group added U.S. financial firm Sharinc Inc. to its list of victims on its dark web leak site. The group claims to have breached the company's network and exfiltrated sensitive data, specifically citing "Financial, Customer data." DevMan is employing a double extortion tactic, threatening to publish the stolen information to pressure the victim into paying a ransom. This attack highlights the significant and ongoing risk that ransomware operations present to the financial sector, where data confidentiality is paramount.
The DevMan ransomware group, while perhaps not as prolific as some top-tier gangs, represents the persistent threat from numerous small to mid-sized ransomware operations. These groups often use similar tactics, techniques, and procedures (TTPs) as their larger counterparts, typically gaining initial access through common vectors like phishing, exploitation of public-facing vulnerabilities, or compromised credentials purchased from initial access brokers.
By targeting Sharinc Inc., a financial organization, DevMan is aiming for a high-impact attack. The threat to leak customer and financial data is designed to inflict maximum pressure, leveraging the victim's regulatory obligations and the potential for severe reputational damage. This is a classic double extortion strategy: data is encrypted for disruption (T1486 - Data Encrypted for Impact) and stolen for coercion (T1041 - Exfiltration Over C2 Channel).
While specific details of the intrusion at Sharinc Inc. are not public, attacks by groups like DevMan typically follow a recognizable pattern based on the ransomware-as-a-service (RaaS) model:
T1566 - Phishing campaigns, exploiting vulnerabilities in remote services like RDP or VPNs (T1133 - External Remote Services), or purchasing access from initial access brokers.T1003 - OS Credential Dumping).T1562.001 - Disable or Modify Tools).A successful ransomware attack on a financial firm like Sharinc Inc. can have devastating consequences:
General observables for detecting ransomware activity include:
| Type | Value | Description |
|---|---|---|
| command_line_pattern | vssadmin.exe delete shadows /all /quiet |
Command used to delete Volume Shadow Copies to hinder system recovery. |
| process_name | wmic.exe |
Often used by ransomware for remote process execution and lateral movement. |
| network_traffic_pattern | Large outbound transfers to cloud storage (Mega, Dropbox, etc.) | Indicates data exfiltration prior to encryption. |
| file_name | *.devman |
A hypothetical file extension that could be used by the ransomware. Monitor for mass file renaming. |
Enforce MFA on all remote access services and sensitive accounts to prevent credential-based intrusions.
Maintain and test immutable, offline backups to ensure recovery capabilities without paying a ransom.
Segment networks to contain ransomware spread and protect critical assets from being reached from compromised endpoints.
Restrict administrative privileges and use just-in-time access to limit an attacker's ability to escalate privileges and move laterally.
To defend against ransomware groups like DevMan, which frequently gain initial access through compromised credentials, implementing Multi-Factor Authentication (MFA) is one of the most effective controls. For a financial firm like Sharinc Inc., MFA should be mandated for all external access points, including VPNs, RDP gateways, and cloud services (e.g., Office 365, AWS). Internally, MFA should be required for access to critical systems, especially for privileged accounts. This creates a significant barrier for attackers, as a stolen password alone is insufficient to gain access. This single control drastically reduces the risk of the most common initial access vectors used by ransomware gangs.
A robust and tested backup strategy is the ultimate safety net against the 'impact' phase of a ransomware attack. Sharinc Inc. and other financial firms must ensure they have a comprehensive backup plan that follows the 3-2-1 rule (three copies of data, on two different media, with one copy off-site). Crucially, at least one copy of the backups must be immutable or stored offline (air-gapped), making it inaccessible to attackers on the network. This prevents ransomware from encrypting or deleting the backups. Regular, automated testing of the restoration process is non-negotiable to ensure that data can be recovered quickly and reliably, allowing the business to restore operations without considering a ransom payment.
To detect ransomware activity before widespread encryption, organizations should employ Endpoint Detection and Response (EDR) tools capable of advanced process analysis. For an attack like the one on Sharinc Inc., this means monitoring for a chain of behaviors indicative of ransomware. For example, an EDR should alert when a process attempts to disable security software, followed by commands to delete Volume Shadow Copies (vssadmin.exe), and then begins rapid file I/O operations across many files. By analyzing the sequence of actions rather than just a single signature, EDR can identify and terminate the ransomware process in its early stages, significantly limiting the damage.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats