Security researchers at Sophos have identified a new ransomware variant, named WantToCry, that employs a novel technique to encrypt victim files by abusing exposed Server Message Block (SMB) services. Unlike traditional ransomware that encrypts files locally on the compromised machine, WantToCry exfiltrates data to attacker-controlled infrastructure, performs the encryption remotely, and then writes the encrypted files back to the victim's system. This method significantly reduces the malware's footprint on the target host, allowing it to evade detection by security tools focused on local process execution and file I/O monitoring. The attacks begin by scanning the internet for systems with open SMB ports (TCP 139 and 445) and then using brute-force attacks to gain access. The low ransom demands suggest a high-volume, opportunistic campaign targeting misconfigured systems.
WantToCry represents an evolution in ransomware tactics, shifting the core malicious activity off the victim's machine. The name is likely a nod to the infamous 2017 WannaCry attacks, but there is no technical link, and WantToCry does not have worm-like self-propagation capabilities.
Attack Chain:
TCP 139/445).T1110.001 - Password Guessing)T1048 - Exfiltration Over Alternative Protocol)T1486 - Data Encrypted for Impact)This entire process occurs over the SMB protocol, making the activity appear as legitimate file-sharing operations to less sophisticated monitoring tools. The lack of local malware execution means EDR/AV solutions may not trigger alerts for malicious processes.
The key innovation of WantToCry is its reliance on a legitimate, albeit misconfigured, network protocol (SMB) for all stages of the attack post-authentication. By externalizing the encryption process, the attackers avoid the most easily detectable ransomware behaviors, such as rapid file modification and high CPU usage on the victim's endpoint.
The observed computer names WIN-J9D866ESIJ2 and WIN-LIVFRVQFMKO from the attacker's side provide a potential link for threat hunters. The association of the latter with previous LockBit, Qilin, and BlackCat activity is notable, though it could indicate a shared infrastructure provider rather than the same threat actor.
This attack methodology underscores a critical security principle: any service exposed to the public internet will be scanned, probed, and attacked. Secure configuration and defense-in-depth are paramount.
109.69.58.213185.189.13.56185.200.191.37194.36.179.18194.36.179.30WIN-J9D866ESIJ2WIN-LIVFRVQFMKODetecting WantToCry requires focusing on network activity and anomalous SMB behavior rather than local endpoint processes.
Outbound Traffic Filtering.Authentication Event Thresholding is the relevant defensive technique.Block SMB at the Perimeter (M1037 - Filter Network Traffic):
TCP 139, 445) directly to the internet. Block these ports at your network perimeter firewall. For remote access to files, use a secure VPN.Strong Password Policies and MFA (M1027 - Password Policies):
Network Segmentation (M1030 - Network Segmentation):
Regular Backups:
Updated analysis details MITRE ATT&CK techniques, emphasizes data breach risk from exfiltration, and adds MFA/privileged account management to mitigation strategies.
The updated report provides a more structured technical analysis, mapping the attack to specific MITRE ATT&CK techniques including T1021.002 (SMB/Windows Admin Shares) and T1048 (Exfiltration Over Alternative Protocol). It explicitly highlights the data breach risk associated with file exfiltration prior to remote encryption. New mitigation recommendations include Multi-factor Authentication (M1032) and Privileged Account Management (M1026). The IOC list has been refined, focusing on the WIN-LIVFRVQFMKO attacker computer name.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats
Every tactic, technique, and sub-technique used in this threat has been identified and mapped to the MITRE ATT&CK framework for consistent, actionable threat language.
Observables and indicators of compromise (IOCs) have been extracted and cataloged. Risk has been assessed and correlated with known threat actors and historical campaigns.
Detection rules, incident response steps, and D3FEND-aligned mitigation strategies are included so your team can act on this intelligence immediately.
Structured threat data is packaged as a STIX 2.1 bundle and can be visualized as an interactive graph — relationships between actors, malware, techniques, and indicators.
Sigma detection rules are derived from the threat techniques in this article and can be converted for deployment across any major SIEM or EDR platform.