Cybersecurity firm CYFIRMA has reported the discovery of a new ransomware family dubbed BARADAI. This file-encrypting malware targets Windows systems, restricting access to data on local and network shares before demanding a ransom. The campaign appears to be global, with victims identified in the USA, Brazil, France, Australia, and other countries. Attackers are targeting a range of industries, including education, manufacturing, retail, and logistics, with ransom demands reported between $10,000 and $80,000. The malware ensures its persistence through registry modifications and employs defense evasion techniques. No free decryption tool is currently available, posing a significant data recovery challenge for victims.
BARADAI ransomware operates as a conventional file-encrypting threat. Upon execution, it systematically scans the victim's machine and any accessible network shares for files to encrypt. Once encrypted, files are appended with a unique extension, rendering them inaccessible. A ransom note is then created on the system, providing an email address for the victim to contact the operators and negotiate payment for a decryption key. The note includes a common threat that attempting to use third-party recovery tools will result in the permanent destruction of the data. The initial access vector has not been specified but likely involves common ransomware delivery methods such as phishing emails or exploitation of exposed remote services.
BARADAI's functionality is straightforward but effective. Key technical aspects align with common ransomware TTPs:
T1486 - Data Encrypted for Impact). It targets both local files and data on network shares (T1489 - Service Stop may be used to unlock files held by databases or applications).HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run registry key, a classic persistence method (T1547.001 - Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder).HKCU\SOFTWARE to store data and may manipulate internet settings and policy keys. This could be part of an effort to inhibit system recovery or evade detection (T1112 - Modify Registry).While not yet observed, it is highly probable that future versions will incorporate data exfiltration (T1041 - Exfiltration Over C2 Channel) before encryption to engage in double extortion, a tactic now standard for most ransomware groups.
For affected organizations, the primary impact is business disruption due to the unavailability of critical data and systems. The financial impact includes the cost of the ransom (if paid), recovery and remediation efforts, and lost revenue during downtime. The targeted sectors—manufacturing, retail, and logistics—are particularly vulnerable to operational halts. While currently not a data exfiltration threat, the potential for future versions to leak stolen data adds a layer of reputational and regulatory risk (e.g., GDPR, HIPAA) for victims.
No specific technical Indicators of Compromise (IOCs) such as IP addresses, domains, or file hashes were mentioned in the source articles.
Security teams can hunt for BARADAI and similar ransomware activity using these generic but effective patterns:
registry_keyHKCU\Software\Microsoft\Windows\CurrentVersion\Runfile_name*.baradai (or other unique extension)file_nameransom_note.txt (or similar)readme.txt, decrypt_me.txt in multiple directories is a hallmark of ransomware.process_namevssadmin), and modification of registry run keys. D3FEND's D3-FCR - File Content Rules can be used to detect the creation of ransom notes.M1053 - Data Backup). Follow the 3-2-1 rule: three copies of your data, on two different media types, with one copy stored offline and immutable. Implement a strong security awareness training program (M1017 - User Training) to educate employees about phishing.M1026 - Privileged Account Management). Ensure all software, especially on internet-facing systems like VPNs and RDP gateways, is fully patched (M1051 - Update Software). Use email filtering and web gateways to block malicious attachments and links. Disable RDP on external-facing devices or secure it behind a VPN with MFA.Regularly backing up data to offline and immutable storage is the most effective defense, allowing for recovery without paying a ransom.
Training users to recognize and report phishing attempts can prevent the initial access that often leads to ransomware infection.
Using email and web filtering solutions to block malicious attachments, links, and scripts is a critical preventative measure.
Modern EDR and antivirus solutions with behavioral analysis can detect and block ransomware activity based on its actions, such as rapid file encryption.
The ultimate defense against ransomware like BARADAI is ensuring data recoverability. Implementing a robust Remote Backup strategy is paramount. This involves more than just backing up data; it requires following the 3-2-1 rule: maintain at least three copies of data, on two different storage media, with at least one copy located off-site and offline or immutable. For BARADAI, which targets network shares, it's critical that backups are not accessible via the same credentials as the production network. Use separate authentication, pull-based backup mechanisms, and leverage cloud storage with object lock (immutability) features. Regularly test the restoration process to ensure backups are viable. This D3FEND technique neutralizes the primary leverage of encryption-only ransomware by making the ransom demand irrelevant.
To limit the blast radius of a BARADAI infection, strict enforcement of User Account Permissions is essential. The principle of least privilege must be applied rigorously. Standard user accounts should not have administrative rights. More importantly, access to network shares should be tightly controlled. Users and service accounts should only have read/write access to the specific folders they absolutely need for their job function. Avoid using broad access groups like 'Everyone' or 'Authenticated Users'. By segmenting network file access, an infection on one user's machine will be contained, unable to encrypt data across the entire organization. This directly counters BARADAI's ability to traverse and encrypt 'accessible network shares'.
A high-fidelity detection for ransomware like BARADAI can be achieved using File Content Rules, often deployed as 'honeyfiles' or 'canary files'. This involves strategically placing hidden files with specific, non-standard extensions (e.g., .canary) across file shares. An EDR or FIM solution is then configured to monitor these files for any modification, particularly rename operations. Since ransomware encrypts files indiscriminately, it will inevitably rename a canary file. This action should trigger an immediate, high-priority alert and, ideally, an automated response, such as isolating the source host from the network. This D3FEND technique provides a very early warning that an encryption process has begun, allowing for rapid response to minimize the overall damage.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.