Researchers at CYFIRMA have identified a new ransomware family dubbed Benzona. This malware is designed to encrypt files across multiple operating systems, including Windows, macOS, and Linux. Upon encryption, it appends the .benzona extension to the filenames and creates a ransom note named RECOVERY_INFO.txt. This note directs victims to a TOR-based chat portal to negotiate payment for a decryption key. The operators of Benzona appear to be financially motivated and may leverage a diverse set of tactics for initial access, including exploiting vulnerabilities in enterprise software from vendors like SAP, Oracle, and Citrix.
Benzona is a new entrant in the crowded ransomware landscape. Its core functionality is to encrypt victim files using strong cryptographic algorithms, making them irrecoverable without the attacker's private key.
RECOVERY_INFO.txt, is created in each directory containing encrypted files..onion site (accessible via the TOR browser), where the victim can communicate with the attackers to negotiate the ransom payment.The malware is a cross-platform threat, suggesting it is likely written in a language like Go or Rust that can be easily compiled for different operating systems. The use of a TOR-based portal for communication is a standard tactic among modern ransomware groups to maintain anonymity.
T1486 - Data Encrypted for Impact: The primary technique used to deny access to victim data.T1190 - Exploit Public-Facing Application: A likely initial access vector, targeting vulnerabilities in software from vendors like Atlassian and Citrix.T1078 - Valid Accounts: May be used for initial access or lateral movement if credentials are stolen.T1566 - Phishing: A common method to deliver the initial payload.T1110.004 - Credential Stuffing: Could be used to gain access to exposed services.The primary impact of a Benzona attack is operational disruption due to the inaccessibility of critical files and systems. The financial cost includes the potential ransom payment, recovery efforts, and business downtime. As with most modern ransomware, there is also a risk of data theft (double extortion), although this was not explicitly mentioned in the initial reports. Organizations should assume that any ransomware incident also involves a data breach.
RECOVERY_INFO.txt or the appearance of files with the .benzona extension.Outbound Traffic Filtering.Standard ransomware defenses are the most effective mitigation against Benzona:
M1051 - Update Software.M1017 - User Training.M1032 - Multi-factor Authentication.Maintaining offline, immutable backups is the most effective way to recover from a ransomware attack without paying the ransom.
Use EDR or anti-ransomware tools to detect and block the characteristic file encryption behavior of ransomware.
Promptly patching vulnerabilities in software from vendors like Oracle, Atlassian, and Citrix can prevent initial access.
Mapped D3FEND Techniques:
Deploy an Endpoint Detection and Response (EDR) or a dedicated anti-ransomware solution that uses behavioral analysis to detect ransomware activity. Specifically for Benzona, configure the EDR to monitor for processes that perform rapid, widespread file I/O operations (reading, encrypting, writing, and renaming). Create a specific rule to detect the creation of files named RECOVERY_INFO.txt or the renaming of files to include the .benzona extension. When this behavior is detected, the EDR should be configured to automatically terminate the offending process to halt the encryption and isolate the host from the network to prevent lateral spread. This behavioral detection is crucial for stopping new or unknown ransomware strains like Benzona before they can cause significant damage.
Since Benzona requires victims to connect to a TOR-based portal for negotiations, blocking TOR traffic at the network edge is an effective countermeasure. Configure perimeter firewalls and web proxies to deny all outbound connections to known TOR entry nodes. This prevents a compromised system from communicating with the attacker's infrastructure and stops a victim from being able to access the payment portal. While this does not prevent the initial encryption, it disrupts the attacker's extortion lifecycle and can be an important part of a defense-in-depth strategy. It also serves as a valuable detection signal; any internal host attempting to connect to the TOR network should trigger an immediate security alert.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats