Cybersecurity researchers at CYFIRMA have discovered a new strain of Windows-based ransomware named Milkyway. While currently assessed to be in an early stage of development, the malware demonstrates aggressive extortion tactics designed to maximize pressure on victims. After encrypting files and appending a .milkyway extension, the ransomware displays a full-screen ransom note. This note goes beyond typical data leak threats, warning victims that non-payment will result in the attackers reporting the organization to tax authorities, law enforcement, and security services. The attackers also threaten to inform the victim's clients and partners about the breach. Researchers warn that Milkyway has the potential to evolve, possibly incorporating more advanced features and transitioning to a Ransomware-as-a-Service (RaaS) model, which would enable widespread distribution.
Milkyway is a new ransomware family targeting Windows environments. Its core functionality is similar to other ransomware strains, but its psychological tactics are notably aggressive.
.milkyway extension, making them unusable. This is a standard implementation of T1486 - Data Encrypted for Impact.T1657 - Financial Cryptanalysis): As Milkyway is in an early development stage, its technical sophistication is currently considered moderate. However, researchers anticipate its evolution. Potential future enhancements could include:
T1562 - Impair Defenses).Even in its current state, an attack from Milkyway can be highly damaging.
| Type | Value | Description |
|---|---|---|
| file_name | *.milkyway |
The file extension appended to encrypted files. |
| Type | Value | Description | Context | Confidence |
|---|---|---|---|---|
| file_name | *.milkyway |
The presence of files with this extension is a definitive indicator of a Milkyway infection. | File Integrity Monitoring, EDR | high |
| process_name | High volume of file read/write/rename operations from an unknown process. | Behavior consistent with a ransomware encryption routine. | EDR, Behavioral Analysis | high |
| file_name | Ransom note file dropped onto the desktop or in multiple directories. | The file containing the ransom demand and threats. | File Integrity Monitoring, EDR | high |
Early detection is key to limiting the damage from a ransomware attack.
D3-PA: Process Analysis..milkyway extension or the appearance of ransom notes. This can provide an early warning that an attack is in progress.Standard anti-ransomware best practices are effective against emerging threats like Milkyway.
M1053 - Data Backup.M1017 - User Training).M1051 - Update Software).M1030 - Network Segmentation).Maintain immutable and offline backups to ensure recovery without paying the ransom.
Use EDR with behavioral analysis to detect and block ransomware activities like rapid file encryption.
Mapped D3FEND Techniques:
Train users to defend against phishing, a common initial vector for ransomware.
The ultimate defense against any ransomware strain, including the emerging Milkyway, is the ability to restore data from clean backups. This neutralizes the attacker's primary leverage (data encryption) and removes the need to consider paying a ransom. Organizations must implement a robust backup strategy that includes immutability—a feature that prevents backups from being altered or deleted, even by an administrator account that an attacker might compromise. Backups should be taken frequently, stored in a logically and physically separate location, and tested regularly to ensure they are viable. For Milkyway's double extortion threat of leaking data, backups do not help, but they are absolutely essential for business continuity and recovery from the encryption itself.
To detect a new ransomware strain like Milkyway for which signatures may not exist, behavioral-based Process Analysis is critical. An Endpoint Detection and Response (EDR) solution should be configured to monitor for ransomware-like behaviors. This includes a single process rapidly reading and writing to a large number of files, performing file rename operations to add the .milkyway extension, and attempting to delete Volume Shadow Copies using vssadmin.exe. By setting thresholds for these activities, the EDR can automatically kill the malicious process and isolate the host from the network before the encryption can spread, significantly limiting the damage from the attack.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats