Cybersecurity researchers have identified a new ransomware family dubbed Aur0ra. This malware follows the increasingly common dual-extortion model, where it not only encrypts the victim's files but also claims to have exfiltrated sensitive data to pressure victims into paying the ransom. A notable characteristic of Aur0ra is its decision not to rename or change the extension of encrypted files. This makes a visual inspection of the file system deceptive, as files appear normal but are rendered unusable. After encryption, a ransom note named !!!README!!!DO_NOT_DELETE.txt is dropped, instructing the victim to contact the attackers via a Tor website. The ransomware appears to be targeting a wide range of industries across North America, Europe, and Asia.
Aur0ra represents a continuation of the evolution in ransomware-as-a-service (RaaS) TTPs. The core components of its operation are:
.locked or .encrypted extension. This could delay incident response and allow the malware to encrypt more of the network.The wide range of targeted industries suggests an opportunistic campaign rather than a highly targeted one, which is typical for many RaaS affiliates.
The primary technique is T1486 - Data Encrypted for Impact. The unique implementation detail is the lack of file renaming. This means that detection based on file extension changes will fail. Instead, detection must rely on other indicators.
Other likely TTPs in the Aur0ra attack chain include:
T1071.001 - Web Protocols: The use of a Tor-based website for communication falls under this technique for command and control.T1567 - Exfiltration Over Web Service: To support the dual-extortion claim, the attackers must have exfiltrated data, likely using common web services or cloud storage.T1083 - File and Directory Discovery: Before encryption, the malware must scan the file system to identify target files, likely prioritizing documents, images, and databases while avoiding system files.T1490 - Inhibit System Recovery: Like most modern ransomware, Aur0ra likely attempts to delete Volume Shadow Copies or other backups to prevent easy recovery.The decision not to rename files is a tactical choice. While it makes initial visual identification harder, it also means that automated re-imaging solutions might miss encrypted data if not configured to verify file integrity. It forces a more thorough, and thus more costly, recovery process.
The impact of an Aur0ra attack is significant. Businesses face immediate operational disruption due to encrypted files. The lack of file renaming can complicate the recovery process, as it's harder to determine the scope of the encryption without file integrity checking tools. The threat of a data leak adds another layer of pressure, potentially leading to regulatory fines (e.g., under GDPR or CCPA), reputational damage, and loss of customer trust. The cost of incident response, recovery, and potential ransom payment can be crippling for small and medium-sized businesses.
file_name!!!README!!!DO_NOT_DELETE.txtSecurity teams can hunt for Aur0ra and similar ransomware. The following patterns could indicate related activity:
file_name!!!README!!!DO_NOT_DELETE.txtprocess_namevssadmin.exevssadmin.exe delete shadows which is used to prevent recovery.command_line_pattern*\Tor\tor.exelog_sourceFile I/O Monitoring!!!README!!!DO_NOT_DELETE.txt is also a high-fidelity detection method.passwords.docx or financials.xlsx on file shares. Monitor these files for any read or write access. Since legitimate users shouldn't be accessing them, any activity is highly suspicious and could be an early warning of a ransomware process scanning for files.Use EDR and antivirus solutions with behavioral detection capabilities to identify and block ransomware activity based on actions rather than just signatures.
Enable and monitor file and process auditing to detect suspicious activities like mass file modification or the creation of ransom notes.
Segmenting the network can limit the spread of ransomware if a host becomes infected, protecting critical assets.
The most critical mitigation. Regularly create and test immutable backups to ensure data can be restored without paying a ransom.
Since Aur0ra avoids common indicators like file renaming, detection must focus on its behavior through Process Analysis. EDR solutions should be tuned to monitor for a chain of malicious activities. This includes a process that first enumerates files and directories (T1083), then attempts to delete Volume Shadow Copies via vssadmin.exe (T1490), and finally initiates high-speed file read/write operations across a large number of files (T1486). By creating detection rules that correlate these behaviors occurring in a short time frame from a single parent process, security teams can create a high-fidelity alert for ransomware activity, even for new or unknown families like Aur0ra. This behavioral fingerprint is much harder for attackers to change than a simple file extension.
To detect ransomware like Aur0ra during its initial file discovery phase, organizations can deploy Decoy Objects, also known as canary files or honeypot files. These are files placed in various locations on file servers and endpoints that appear to be valuable (e.g., M&A_Targets_2026.xlsx, customer_ssn_list.csv). These files should not be accessed during normal business operations. File integrity monitoring (FIM) or EDR systems should be configured to generate a high-priority alert the instant one of these decoy files is read, modified, or encrypted. This provides a very early warning that a ransomware process is active on the network, potentially allowing security teams to isolate the affected host and terminate the process before widespread encryption occurs.
File Restoration remains the ultimate defense against any ransomware, including Aur0ra. Organizations must assume that preventative measures can fail and that a successful encryption event is possible. A robust backup and recovery strategy is therefore non-negotiable. This involves implementing the 3-2-1 rule (three copies, two media, one offsite/immutable). For Aur0ra, which attempts to inhibit recovery by deleting local backups, having an air-gapped or immutable cloud backup is critical. The recovery plan must be tested regularly—at least quarterly—to ensure its effectiveness and to validate that the Recovery Point Objective (RPO) and Recovery Time Objective (RTO) meet business requirements. Without a tested and reliable way to restore data, the organization will be forced to choose between catastrophic data loss and paying the ransom.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.