Security researchers at CYFIRMA have identified a new ransomware-as-a-service (RaaS) operation dubbed Rex. The new strain targets corporate Windows environments, executing a classic double-extortion attack. Upon compromising a network, Rex ransomware exfiltrates sensitive data before encrypting files, appending a .rex48 extension to them. The attackers then leave an HTML ransom note, RANSOM_NOTE.html, which threatens to leak the stolen data if the victim does not make contact within 72 hours to negotiate payment. The ransomware also attempts to delete Volume Shadow Copies to hinder recovery efforts.
Malware: Rex Ransomware. Targets: Enterprise and corporate networks running Windows operating systems. Attack Model: Double Extortion. This involves two forms of coercion:
T1486 - Data Encrypted for Impact), making them inaccessible and disrupting business operations.T1048 - Exfiltration Over Alternative Protocol).The Rex ransomware follows a typical modern ransomware attack flow:
Execution and Encryption: Once executed on a system, the malware begins to encrypt files based on a predefined list of extensions, appending .rex48 to each encrypted file. The numeric suffix (48) may be a campaign identifier and could vary in future attacks.
Ransom Note: After encryption, an HTML ransom note named RANSOM_NOTE.html is created on the system. The note contains:
Inhibit Recovery: The malware actively attempts to inhibit system recovery by deleting Volume Shadow Copies (T1490 - Inhibit System Recovery). This is typically done using the vssadmin.exe command-line tool.
While the initial access vector is not specified, ransomware groups typically gain entry through phishing, exploitation of unpatched public-facing services, or stolen credentials purchased from initial access brokers.
A successful Rex ransomware attack can be devastating for an organization, leading to:
RANSOM_NOTE.html*.rex48Security teams can hunt for signs of a ransomware attack in progress with the following observables:
.rex48 extension.vssadmin.exe delete shadows or similar commands used to delete backups.RANSOM_NOTE.html on critical servers or multiple endpoints.Process Analysis (D3-PA).Segment networks to contain the spread of ransomware. Isolate critical assets to prevent them from being encrypted in a widespread attack.
Use EDR/XDR solutions with behavioral detection capabilities to identify and block ransomware activity before it can cause significant damage.
Enforce MFA on all remote access points and privileged accounts to prevent attackers from gaining initial access through stolen credentials.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.