Cybersecurity researchers at CYFIRMA have identified a new ransomware family named Uragan Ransomware. Discovered during routine monitoring of underground forums, this new threat targets Windows operating systems. The malware encrypts files and appends the .uragan extension, rendering them inaccessible. The attackers use a double extortion model, not only encrypting data but also exfiltrating it, threatening to publish the stolen information if their ransom demands are not met. As of this report, there are no known decryption tools for Uragan Ransomware.
Uragan Ransomware is a file-encrypting malware designed to cause maximum disruption and pressure victims into payment. Its name, 'Uragan,' is Russian for 'hurricane,' suggesting the intended speed and devastation of its attacks.
.uragan extension.README.txt is created on the compromised system. The note informs the victim of the encryption and contains instructions for payment and threats of data leakage.The attack methodology observed is consistent with modern ransomware operations.
.uragan extension is a key indicator of this specific strain (T1486 - Data Encrypted for Impact).T1490 - Inhibit System Recovery).A successful Uragan ransomware attack can lead to severe consequences:
| Type | Value | Description |
|---|---|---|
file_name |
.uragan |
The file extension appended to all files encrypted by the malware. |
file_name |
README.txt |
The name of the ransom note file dropped in affected directories. |
.uragan extension. This is a high-confidence indicator of an active infection. This aligns with D3FEND's File Creation Analysis.README.txt, especially if they appear in multiple directories simultaneously.vssadmin), or other defense evasion techniques.M1017 - User Training).M1051 - Update Software).M1030 - Network Segmentation).Endpoint protection platforms with behavioral analysis can detect and block ransomware activity based on its actions, such as rapid file encryption.
Comprehensive logging of file modifications, process creation, and network connections is essential for detecting and investigating a ransomware attack.
Mapped D3FEND Techniques:
Since phishing is a common entry point, training users to identify and report suspicious emails is a critical first line of defense.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats