CYFIRMA Discovers New BARADAI Ransomware Strain Targeting Windows Systems Across Multiple Sectors

New 'BARADAI' Ransomware Emerges, Demanding Up to $80,000

HIGH
May 8, 2026
5m read
RansomwareMalware

Related Entities

Organizations

Products & Tech

Other

BARADAI Ransomware

Full Report

Executive Summary

Cybersecurity firm CYFIRMA has reported the discovery of a new ransomware family dubbed BARADAI. This file-encrypting malware targets Windows systems, restricting access to data on local and network shares before demanding a ransom. The campaign appears to be global, with victims identified in the USA, Brazil, France, Australia, and other countries. Attackers are targeting a range of industries, including education, manufacturing, retail, and logistics, with ransom demands reported between $10,000 and $80,000. The malware ensures its persistence through registry modifications and employs defense evasion techniques. No free decryption tool is currently available, posing a significant data recovery challenge for victims.

Threat Overview

BARADAI ransomware operates as a conventional file-encrypting threat. Upon execution, it systematically scans the victim's machine and any accessible network shares for files to encrypt. Once encrypted, files are appended with a unique extension, rendering them inaccessible. A ransom note is then created on the system, providing an email address for the victim to contact the operators and negotiate payment for a decryption key. The note includes a common threat that attempting to use third-party recovery tools will result in the permanent destruction of the data. The initial access vector has not been specified but likely involves common ransomware delivery methods such as phishing emails or exploitation of exposed remote services.

Technical Analysis

BARADAI's functionality is straightforward but effective. Key technical aspects align with common ransomware TTPs:

  • Execution & Impact: The core of the attack is data encryption for impact (T1486 - Data Encrypted for Impact). It targets both local files and data on network shares (T1489 - Service Stop may be used to unlock files held by databases or applications).
  • Persistence: To survive a reboot, BARADAI creates an autorun entry in the HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run registry key, a classic persistence method (T1547.001 - Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder).
  • Defense Evasion: The report notes that the malware interacts with registry paths under HKCU\SOFTWARE to store data and may manipulate internet settings and policy keys. This could be part of an effort to inhibit system recovery or evade detection (T1112 - Modify Registry).

While not yet observed, it is highly probable that future versions will incorporate data exfiltration (T1041 - Exfiltration Over C2 Channel) before encryption to engage in double extortion, a tactic now standard for most ransomware groups.

Impact Assessment

For affected organizations, the primary impact is business disruption due to the unavailability of critical data and systems. The financial impact includes the cost of the ransom (if paid), recovery and remediation efforts, and lost revenue during downtime. The targeted sectors—manufacturing, retail, and logistics—are particularly vulnerable to operational halts. While currently not a data exfiltration threat, the potential for future versions to leak stolen data adds a layer of reputational and regulatory risk (e.g., GDPR, HIPAA) for victims.

IOCs — Directly from Articles

No specific technical Indicators of Compromise (IOCs) such as IP addresses, domains, or file hashes were mentioned in the source articles.

Cyber Observables — Hunting Hints

Security teams can hunt for BARADAI and similar ransomware activity using these generic but effective patterns:

Type
registry_key
Value
HKCU\Software\Microsoft\Windows\CurrentVersion\Run
Description
Monitor for new, unauthorized programs being added to this key for persistence.
Type
file_name
Value
*.baradai (or other unique extension)
Description
The appearance of a large number of files with a new, unknown extension is a strong indicator of ransomware.
Type
file_name
Value
ransom_note.txt (or similar)
Description
The creation of files with names like readme.txt, decrypt_me.txt in multiple directories is a hallmark of ransomware.
Type
process_name
Value
High volume of file read/write/rename operations from a single process.
Description
EDR solutions can detect the characteristic behavior of a process rapidly encrypting files across the file system.

Detection & Response

  • Detection: Deploy EDR solutions with ransomware-specific behavioral detection capabilities. This includes monitoring for rapid file encryption activity (canary files), deletion of volume shadow copies (vssadmin), and modification of registry run keys. D3FEND's D3-FCR - File Content Rules can be used to detect the creation of ransom notes.
  • Response: Upon detection of ransomware activity, immediately isolate the infected endpoints from the network to prevent lateral spread. If possible, power down affected systems to halt the encryption process, though this may complicate forensic analysis. Do not delete the encrypted files or the ransom note. Engage an incident response team to assess the scope and begin recovery from offline, immutable backups.

Mitigation

  • Strategic: The most effective mitigation against ransomware is a robust, multi-layered backup strategy (M1053 - Data Backup). Follow the 3-2-1 rule: three copies of your data, on two different media types, with one copy stored offline and immutable. Implement a strong security awareness training program (M1017 - User Training) to educate employees about phishing.
  • Tactical: Restrict user permissions to follow the principle of least privilege (M1026 - Privileged Account Management). Ensure all software, especially on internet-facing systems like VPNs and RDP gateways, is fully patched (M1051 - Update Software). Use email filtering and web gateways to block malicious attachments and links. Disable RDP on external-facing devices or secure it behind a VPN with MFA.

Timeline of Events

1
May 8, 2026
This article was published

MITRE ATT&CK Mitigations

Regularly backing up data to offline and immutable storage is the most effective defense, allowing for recovery without paying a ransom.

Training users to recognize and report phishing attempts can prevent the initial access that often leads to ransomware infection.

Using email and web filtering solutions to block malicious attachments, links, and scripts is a critical preventative measure.

Modern EDR and antivirus solutions with behavioral analysis can detect and block ransomware activity based on its actions, such as rapid file encryption.

D3FEND Defensive Countermeasures

The ultimate defense against ransomware like BARADAI is ensuring data recoverability. Implementing a robust Remote Backup strategy is paramount. This involves more than just backing up data; it requires following the 3-2-1 rule: maintain at least three copies of data, on two different storage media, with at least one copy located off-site and offline or immutable. For BARADAI, which targets network shares, it's critical that backups are not accessible via the same credentials as the production network. Use separate authentication, pull-based backup mechanisms, and leverage cloud storage with object lock (immutability) features. Regularly test the restoration process to ensure backups are viable. This D3FEND technique neutralizes the primary leverage of encryption-only ransomware by making the ransom demand irrelevant.

To limit the blast radius of a BARADAI infection, strict enforcement of User Account Permissions is essential. The principle of least privilege must be applied rigorously. Standard user accounts should not have administrative rights. More importantly, access to network shares should be tightly controlled. Users and service accounts should only have read/write access to the specific folders they absolutely need for their job function. Avoid using broad access groups like 'Everyone' or 'Authenticated Users'. By segmenting network file access, an infection on one user's machine will be contained, unable to encrypt data across the entire organization. This directly counters BARADAI's ability to traverse and encrypt 'accessible network shares'.

A high-fidelity detection for ransomware like BARADAI can be achieved using File Content Rules, often deployed as 'honeyfiles' or 'canary files'. This involves strategically placing hidden files with specific, non-standard extensions (e.g., .canary) across file shares. An EDR or FIM solution is then configured to monitor these files for any modification, particularly rename operations. Since ransomware encrypts files indiscriminately, it will inevitably rename a canary file. This action should trigger an immediate, high-priority alert and, ideally, an automated response, such as isolating the source host from the network. This D3FEND technique provides a very early warning that an encryption process has begun, allowing for rapid response to minimize the overall damage.

Sources & References

Weekly Intelligence Report – 08 May 2026
CYFIRMA (cyfirma.com) May 8, 2026

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

RansomwareBARADAICYFIRMAMalwareWindowsData Encryption

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.