A new ransomware operation, dubbed Osiris, has been observed deploying a sophisticated blend of tactics, techniques, and procedures (TTPs) borrowed from other prominent ransomware groups. This suggests the threat actors are experienced and may be an offshoot or evolution of existing gangs. Security researchers have identified tactical overlaps with the Medusa and Inc ransomware families. Key indicators include the use of Rclone for data exfiltration to Wasabi cloud storage (a hallmark of Inc) and the deployment of a custom-signed malicious driver known as Abyssworker/Poortry to disable endpoint security products (a known TTP of Medusa). This Bring-Your-Own-Vulnerable-Driver (BYOVD) attack allows the ransomware to execute unimpeded, highlighting the growing sophistication and shared tooling within the ransomware ecosystem.
The Osiris attack chain demonstrates a methodical and multi-faceted approach to compromise, combining data theft, defense evasion, and encryption.
kaz.exe to dump credentials, a file name previously associated with Inc ransomware.Rclone tool to upload it to an attacker-controlled Wasabi cloud storage bucket. This is a double-extortion tactic.The Osiris operation is a prime example of threat actor convergence, where successful TTPs are shared and reused.
Rclone for exfiltration and the specific kaz.exe filename for Mimikatz create a strong link to the Inc ransomware group's playbook from October 2025.T1567.002 - Exfiltration Over Web Service: Exfiltration to Cloud Storage: Using Rclone to exfiltrate data to Wasabi cloud storage.T1003.001 - OS Credential Dumping: LSASS Memory: Using Mimikatz (kaz.exe) to harvest credentials.T1562.001 - Impair Defenses: Disable or Modify Tools: Using the Poortry driver to terminate security software.T1218.011 - System Binary Proxy Execution: Rundll32: The Stonestop loader likely uses rundll32.exe to execute its payload.T1486 - Data Encrypted for Impact: The final payload is the Osiris ransomware, which encrypts victim files.T1219 - Remote Access Software: Deploying a customized version of Rustdesk for persistent access.An attack by the Osiris group can be devastating, resulting in:
| Type | Value | Description |
|---|---|---|
| file_name | kaz.exe |
Filename used for the Mimikatz credential dumping tool. |
| malware | Abyssworker / Poortry |
Name of the malicious kernel driver used to disable security tools. |
| tool | Rclone |
Legitimate tool used for data exfiltration to cloud storage. |
Rclone user agent.M1038 - Execution Prevention): Implement application allow-listing to prevent the execution of unauthorized tools like Rclone, Netscan, and custom versions of Rustdesk.M1042 - Disable or Remove Feature or Program): Proactively block known vulnerable or malicious drivers using Windows Defender ASR or EDR blocklists. Maintain an up-to-date list of drivers used in BYOVD attacks.M1026 - Privileged Account Management): Restrict administrative privileges and segment accounts to limit an attacker's ability to deploy drivers or run credential dumping tools.Implement strict driver signature enforcement and maintain a blocklist of known malicious or vulnerable code-signing certificates.
Mapped D3FEND Techniques:
Use application allow-listing to prevent unauthorized dual-use tools like Rclone and Netscan from running.
Mapped D3FEND Techniques:
Deploy EDR solutions capable of detecting and blocking attempts to terminate security processes, a key behavior of the Poortry driver.
Block egress traffic to unusual cloud storage providers like Wasabi from endpoints and servers that have no business reason to connect to them.
Mapped D3FEND Techniques:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats