A new ransomware operation, dubbed Osiris, has been observed deploying a sophisticated blend of tactics, techniques, and procedures (TTPs) borrowed from other prominent ransomware groups. This suggests the threat actors are experienced and may be an offshoot or evolution of existing gangs. Security researchers have identified tactical overlaps with the Medusa and Inc ransomware families. Key indicators include the use of Rclone for data exfiltration to Wasabi cloud storage (a hallmark of Inc) and the deployment of a custom-signed malicious driver known as Abyssworker/Poortry to disable endpoint security products (a known TTP of Medusa). This Bring-Your-Own-Vulnerable-Driver (BYOVD) attack allows the ransomware to execute unimpeded, highlighting the growing sophistication and shared tooling within the ransomware ecosystem.
The Osiris attack chain demonstrates a methodical and multi-faceted approach to compromise, combining data theft, defense evasion, and encryption.
kaz.exe to dump credentials, a file name previously associated with Inc ransomware.Rclone tool to upload it to an attacker-controlled Wasabi cloud storage bucket. This is a double-extortion tactic.The Osiris operation is a prime example of threat actor convergence, where successful TTPs are shared and reused.
Rclone for exfiltration and the specific kaz.exe filename for Mimikatz create a strong link to the Inc ransomware group's playbook from October 2025.T1567.002 - Exfiltration Over Web Service: Exfiltration to Cloud Storage: Using Rclone to exfiltrate data to Wasabi cloud storage.T1003.001 - OS Credential Dumping: LSASS Memory: Using Mimikatz (kaz.exe) to harvest credentials.T1562.001 - Impair Defenses: Disable or Modify Tools: Using the Poortry driver to terminate security software.T1218.011 - System Binary Proxy Execution: Rundll32: The Stonestop loader likely uses rundll32.exe to execute its payload.T1486 - Data Encrypted for Impact: The final payload is the Osiris ransomware, which encrypts victim files.T1219 - Remote Access Software: Deploying a customized version of Rustdesk for persistent access.An attack by the Osiris group can be devastating, resulting in:
| Type | Value | Description |
|---|---|---|
| file_name | kaz.exe |
Filename used for the Mimikatz credential dumping tool. |
| malware | Abyssworker / Poortry |
Name of the malicious kernel driver used to disable security tools. |
| tool | Rclone |
Legitimate tool used for data exfiltration to cloud storage. |
Rclone user agent.M1038 - Execution Prevention): Implement application allow-listing to prevent the execution of unauthorized tools like Rclone, Netscan, and custom versions of Rustdesk.M1042 - Disable or Remove Feature or Program): Proactively block known vulnerable or malicious drivers using Windows Defender ASR or EDR blocklists. Maintain an up-to-date list of drivers used in BYOVD attacks.M1026 - Privileged Account Management): Restrict administrative privileges and segment accounts to limit an attacker's ability to deploy drivers or run credential dumping tools.New details emerge on Osiris ransomware's 'Poortry' driver, which masquerades as a Malwarebytes component to disable security software.
Further analysis of the Osiris ransomware confirms its continued use of the 'Poortry' malicious kernel driver for defense evasion. New information indicates this driver is deceptively signed and designed to masquerade as a legitimate Malwarebytes component, allowing it to terminate security software processes more effectively. This specific deceptive tactic aims to bypass detection and complicate forensic analysis, reinforcing the ransomware's sophisticated evasion capabilities. The use of Rclone for data exfiltration to Wasabi cloud storage remains a core tactic.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats