SophosLabs Details 'WantToCry' Ransomware Targeting Exposed SMB Ports for Remote File Encryption

New 'WantToCry' Ransomware Uses Exposed SMB Services for Novel Remote Encryption Attacks

HIGH
May 19, 2026
May 20, 2026
4m read
RansomwareMalwareVulnerability

Related Entities(initial)

Organizations

Sophos

Products & Tech

CensysServer Message Block (SMB)Shodan

Other

BlackCatLockBitQilinWantToCry

Full Report(when first published)

Executive Summary

Security researchers at Sophos have identified a new ransomware variant, named WantToCry, that employs a novel technique to encrypt victim files by abusing exposed Server Message Block (SMB) services. Unlike traditional ransomware that encrypts files locally on the compromised machine, WantToCry exfiltrates data to attacker-controlled infrastructure, performs the encryption remotely, and then writes the encrypted files back to the victim's system. This method significantly reduces the malware's footprint on the target host, allowing it to evade detection by security tools focused on local process execution and file I/O monitoring. The attacks begin by scanning the internet for systems with open SMB ports (TCP 139 and 445) and then using brute-force attacks to gain access. The low ransom demands suggest a high-volume, opportunistic campaign targeting misconfigured systems.


Threat Overview

WantToCry represents an evolution in ransomware tactics, shifting the core malicious activity off the victim's machine. The name is likely a nod to the infamous 2017 WannaCry attacks, but there is no technical link, and WantToCry does not have worm-like self-propagation capabilities.

Attack Chain:

  1. Reconnaissance: Attackers use public scanning services like Shodan and Censys to find hosts with exposed SMB ports (TCP 139/445).
  2. Initial Access: Automated brute-force attacks are launched against the identified SMB services using common or weak credentials. (T1110.001 - Password Guessing)
  3. Exfiltration: Upon successful authentication, the attacker uses the SMB session to read and transfer the victim's files over the network to their own servers. (T1048 - Exfiltration Over Alternative Protocol)
  4. Remote Encryption: The files are encrypted on the attacker's infrastructure, outside the victim's environment.
  5. Impact: The attacker uses the same authenticated SMB session to overwrite the original files on the victim's host with the now-encrypted versions. A ransom note is also written to the device. (T1486 - Data Encrypted for Impact)

This entire process occurs over the SMB protocol, making the activity appear as legitimate file-sharing operations to less sophisticated monitoring tools. The lack of local malware execution means EDR/AV solutions may not trigger alerts for malicious processes.


Technical Analysis

The key innovation of WantToCry is its reliance on a legitimate, albeit misconfigured, network protocol (SMB) for all stages of the attack post-authentication. By externalizing the encryption process, the attackers avoid the most easily detectable ransomware behaviors, such as rapid file modification and high CPU usage on the victim's endpoint.

The observed computer names WIN-J9D866ESIJ2 and WIN-LIVFRVQFMKO from the attacker's side provide a potential link for threat hunters. The association of the latter with previous LockBit, Qilin, and BlackCat activity is notable, though it could indicate a shared infrastructure provider rather than the same threat actor.

This attack methodology underscores a critical security principle: any service exposed to the public internet will be scanned, probed, and attacked. Secure configuration and defense-in-depth are paramount.


IOCs — Directly from Articles

Type
ip_address_v4
Value
109.69.58.213
Description
Attacker infrastructure (Germany)
Type
ip_address_v4
Value
185.189.13.56
Description
Attacker infrastructure (Russian Federation)
Type
ip_address_v4
Value
185.200.191.37
Description
Attacker infrastructure (USA)
Type
ip_address_v4
Value
194.36.179.18
Description
Attacker infrastructure (Singapore)
Type
ip_address_v4
Value
194.36.179.30
Description
Attacker infrastructure (Singapore)
Type
other
Value
WIN-J9D866ESIJ2
Description
Attacker Windows computer name
Type
other
Value
WIN-LIVFRVQFMKO
Description
Attacker Windows computer name (previously linked to other ransomware)

Detection & Response

Detecting WantToCry requires focusing on network activity and anomalous SMB behavior rather than local endpoint processes.

Detection Strategies

  • Network Traffic Analysis: Monitor for large volumes of outbound SMB traffic from internal hosts to external IP addresses, especially the IOCs listed above. Legitimate SMB usage should almost always be confined within the internal network. This is a direct application of D3FEND's Outbound Traffic Filtering.
  • Logon Failures: Monitor for a high rate of failed login attempts against SMB services, which is indicative of a brute-force attack. D3FEND's Authentication Event Thresholding is the relevant defensive technique.
  • File Auditing: Enable file access auditing on critical file shares. An alert should be triggered if a single user account reads and then rapidly overwrites a large number of files, especially if the source IP is external.
  • Honeypots: Deploy an SMB honeypot with weak credentials on the network perimeter. Any login attempt is an immediate, high-fidelity indicator of malicious activity.

Response Actions

  1. If an attack is detected, immediately block the source IP address at the firewall.
  2. Force a password reset for the compromised account.
  3. Disable the SMB service on the affected host and begin restoring files from a clean, offline backup.

Mitigation Recommendations

  1. Block SMB at the Perimeter (M1037 - Filter Network Traffic):

    • This is the most critical mitigation. There is almost no legitimate reason to expose SMB (TCP 139, 445) directly to the internet. Block these ports at your network perimeter firewall. For remote access to files, use a secure VPN.
  2. Strong Password Policies and MFA (M1027 - Password Policies):

    • Enforce strong, complex passwords for all accounts. Implement a policy of account lockout after a certain number of failed login attempts to thwart brute-force attacks.
  3. Network Segmentation (M1030 - Network Segmentation):

    • Even internally, segment networks to prevent a compromised host in one zone from accessing file shares in another. Restrict SMB traffic between different network segments unless absolutely necessary.
  4. Regular Backups:

    • Maintain regular, offline, and immutable backups of all critical data. This is the last line of defense and ensures you can recover without paying a ransom.

Timeline of Events

1
May 19, 2026
This article was published

Article Updates

May 20, 2026

Updated analysis details MITRE ATT&CK techniques, emphasizes data breach risk from exfiltration, and adds MFA/privileged account management to mitigation strategies.

The updated report provides a more structured technical analysis, mapping the attack to specific MITRE ATT&CK techniques including T1021.002 (SMB/Windows Admin Shares) and T1048 (Exfiltration Over Alternative Protocol). It explicitly highlights the data breach risk associated with file exfiltration prior to remote encryption. New mitigation recommendations include Multi-factor Authentication (M1032) and Privileged Account Management (M1026). The IOC list has been refined, focusing on the WIN-LIVFRVQFMKO attacker computer name.

Update Sources:

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

Brute ForceRansomwareRemote EncryptionSMBSophosTCP 445WantToCry

📢 Share This Article

Help others stay informed about cybersecurity threats

🎯 MITRE ATT&CK Mapped

Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.

🧠 Enriched & Analyzed

Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.

🛡️ Actionable Guidance

Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.

🔗 STIX Visualizer

Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.

Sigma Generator

Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.