CyberIntel ⬡ News
★ Saved ◆ Cyber Reads
← Back ◍ Incident Response & DFIR Oct 10, 2025

China Hackers Use Velociraptor IR Tool for Ransomware - Dark Reading

Dark Reading Archived Mar 16, 2026 ✓ Full text saved

China Hackers Use Velociraptor IR Tool for Ransomware Dark Reading

Full text archived locally
✦ AI Summary · Claude Sonnet


    CYBERSECURITY OPERATIONS CYBERATTACKS & DATA BREACHES ENDPOINT SECURITY THREAT INTELLIGENCE NEWS Chinese Hackers Use Velociraptor IR Tool in Ransomware Attacks In a new wrinkle for adversary tactics, the Storm-2603 threat group is abusing the digital forensics and incident response (DFIR) tool to gain persistent access to victim networks. Rob Wright,Senior News Director,Dark Reading October 10, 2025 5 Min Read SOURCE: RAYMONDASIAPHOTOGRAPHY VIA ALAMY STOCK PHOTO A China-based threat group known as Storm-2603 has added a new weapon to its hacking arsenal. Cisco Talos researchers observed Storm-2603 abusing Velociraptor, an open source digital forensics and incident response (DFIR) tool, in a recent ransomware attack. The open source project, which was acquired by Rapid7 in 2021, was designed by security researcher Michael Cohen to assist incident response teams with endpoint monitoring and investigations. However, it seems attackers have turned the tables on defenders and are now leveraging Velociraptor to conceal their malicious activity. Storm-2603 initially burst on to the threat landscape in July as one of several threat groups exploiting a set of SharePoint vulnerabilities in an attack chain known as "ToolShell." There, the threat actors gained access to SharePoint servers, moved laterally in the victims' networks, and deployed Warlock ransomware. In a blog post published Thursday, Cisco Talos researchers said they responded to a different incident in August, in which threat actors dropped three different types of ransomware on the victim's VMware ESXi servers — Warlock, LockBit, and Babuk — and caused severe disruption to the organization. Related:Why Stryker's Outage Is a Disaster Recovery Wake-Up Call In addition to the ransomware trio, Cisco Talos found Storm-2603 actors had also deployed Velociraptor to aid their attack. It was a shift in strategy; the researchers noted that the tool had not been definitively tied to ransomware attacks prior to August. "Velociraptor played a significant role in this campaign, ensuring the actors maintained stealthy persistent access while deploying LockBit and Babuk ransomware," the researchers wrote. "After gaining initial access, the actors installed an outdated version of Velociraptor (version 0.73.4.0) that was exposed to a privilege escalation vulnerability (CVE-2025-6264) that could lead to arbitrary command execution and endpoint takeover." Dark Reading contacted Cisco Talos for additional information on the attack, but the company declined to comment. Velociraptor Bites Back in Storm-2603 Attacks Cisco Talos' blog post cited previous research from Sophos in August that first documented abuse of Velociraptor by suspected ransomware actors. Sophos Counter Threat Unit (CTU) researchers responded to an incident that month that they said would have likely resulted in ransomware deployment, if not for an alert from Secureworks' Taegis platform. "In this incident, the threat actor used the tool to download and execute Visual Studio Code with the likely intention of creating a tunnel to an attacker-controlled command and control (C2) server," the CTU research team wrote. "Enabling the tunnel option in Visual Studio Code triggered a Taegis alert, as this option can allow both remote access and remote code execution, and has been abused by multiple threat groups in the past." Related:White House Cyber Strategy Prioritizes Offense Rafe Pilling, director of threat intelligence at Sophos CTU, tells Dark Reading that the Storm-2603 activity outlined by Cisco Talos "involves the same threat group and tactics" as Sophos CTU researchers observed in August. Pilling says the earliest detection of Velociraptor abuse Sophos found dates to Aug. 5. "After we published our Aug. 26 blog on the use of Velociraptor by Warlock (Gold Salem as we track them, also known as Storm-2603), the group switched to using a new C2 domain on Cloudflare's workers.dev service," he says. "We continued to see indications of the use of Velociraptor in their attacks in the first two weeks of September, but not since then." In a follow-up post on Sept. 17, Sophos said some of these intrusions ended with the deployment of Warlock ransomware. "When investigating this activity, we encountered a number of customers who had deployed Velociraptor widely across their networks, although these installations look different in our data than the malicious use by Gold Salem/Warlock," Pilling says. Related:Software Development Practices Help Enterprises Tackle Real-Life Risks Specifically, the threat actors were targeting Microsoft SharePoint servers and using Msiexec, a command line tool, to install Velociraptor. Pilling says the malicious activity was caught through behavioral detections in the Sophos Endpoint platform. Detecting & Mitigating Velociraptor DFIR Misuse In their August report, Sophos CTU researchers said the Velociraptor abuse illustrates how threat actors are shifting to incident response tools to establish a persistent foothold in victim networks. Cisco Talos agreed, noting that the addition of Velociraptor to ransomware gangs' playbooks meshes with the company's findings in the Talos 2024 "Year in Review" report, which warned that threat actors are increasingly abusing legitimate commercial and open source products for their attacks. Cisco Talos cited guidance from Rapid7 for identifying and mitigating potential Velociraptor abuse, which notes that the tool deliberately creates "easy to detect" indicators of compromise (IoCs) if misused. Rapid7 acknowledged that since Velociraptor is open source, attackers can modify the tool to remove the generation of the IoCs, but the company said such binaries will either be unsigned or signed by another entity besides Rapid7, and therefore should be flagged. Rapid7 responded to the reported attacks in a blog post on Thursday. "Rapid7 has implemented detections for this and other Velociraptor-related misuse, and is not impacted by this incident," Christiaan Beek, Rapid7's senior director of threat analytics, wrote. Beek noted that in the activity observed by Sophos CTU researchers, the threat actors downloaded a Velociraptor binary and specified a C2 server in the configuration file. Once it was deployed on a compromised system, the attackers used Velociraptor to establish communications with the C2 server as well as download additional files and execute commands on the system. "This behavior reflects a misuse pattern rather than a software flaw: adversaries simply repurpose legitimate collection and orchestration capabilities," Beek wrote. Organizations should check to see if the Velociraptor instances in their environments are legitimate, and analyze endpoint logs for any newly created services or scheduled tasks tied to "velociraptor.exe," Beek said. Additionally, security teams should restrict the execution of any unknown Velociraptor binaries. About the Author Rob Wright Senior News Director, Dark Reading Rob Wright is a longtime reporter with more than 25 years of experience as a technology journalist. Prior to joining Dark Reading as senior news director, he spent more than a decade at TechTarget's SearchSecurity in various roles, including senior news director, executive editor and editorial director. Before that, he worked for several years at CRN, Tom's Hardware Guide, and VARBusiness Magazine covering a variety of technology beats and trends. Prior to becoming a technology journalist in 2000, he worked as a weekly and daily newspaper reporter in Virginia, where he won three Virginia Press Association awards in 1998 and 1999. He graduated from the University of Richmond in 1997 with a degree in journalism and English. A native of Massachusetts, he lives in the Boston area.  More Insights Industry Reports Frost Radar™: Non-human Identity Solutions 2026 CISO AI Risk Report The ROI of AI in Security Cybersecurity Forecast 2026 ThreatLabz 2025 Ransomware Report Access More Research Webinars Building a Robust SOC in a Post-AI World Retail Security: Protecting Customer Data and Payment Systems Rethinking SSE: When Unified SASE Delivers the Flexibility Enterprises Need Securing Remote and Hybrid Work Forecast: Beyond the VPN AI-Powered Threat Detection: Beyond Traditional Security Models More Webinars You May Also Like CYBERSECURITY OPERATIONS Women Who 'Hacked the Status Quo' Aim to Inspire Security Careers by Elizabeth Montalbano, Contributing Writer JUL 16, 2025 CYBERATTACKS & DATA BREACHES DeepSeek Breach Opens Floodgates to Dark Web by Emma Zaballos APR 22, 2025 CYBERSECURITY OPERATIONS Secure Communications Evolve Beyond End-to-End Encryption by Robert Lemos, Contributing Writer APR 04, 2025 CYBERSECURITY OPERATIONS Bridging the Gap Between the CISO & the Board of Directors by Michael Fanning MAR 31, 2025 Editor's Choice CYBERSECURITY OPERATIONS Why Stryker's Outage Is a Disaster Recovery Wake-Up Call byJai Vijayan MAR 12, 2026 5 MIN READ APPLICATION SECURITY Microsoft Patches 83 CVEs in March Update byJai Vijayan MAR 11, 2026 4 MIN READ THREAT INTELLIGENCE Commercial Spyware Opponents Fear US Policy Shifting byRob Wright MAR 12, 2026 9 MIN READ Want more Dark Reading stories in your Google search results? 2026 Security Trends & Outlooks THREAT INTELLIGENCE Cybersecurity Predictions for 2026: Navigating the Future of Digital Threats JAN 2, 2026 CYBER RISK Navigating Privacy and Cybersecurity Laws in 2026 Will Prove Difficult JAN 12, 2026 ENDPOINT SECURITY CISOs Face a Tighter Insurance Market in 2026 JAN 5, 2026 THREAT INTELLIGENCE 2026: The Year Agentic AI Becomes the Attack-Surface Poster Child JAN 30, 2026 Download the Collection Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox. SUBSCRIBE Webinars Building a Robust SOC in a Post-AI World THURS, MARCH 19, 2026 AT 1PM EST Retail Security: Protecting Customer Data and Payment Systems THURS, APRIL 2, 2026 AT 1PM EST Rethinking SSE: When Unified SASE Delivers the Flexibility Enterprises Need WED, APRIL 1, 2026 AT 1PM EST Securing Remote and Hybrid Work Forecast: Beyond the VPN TUES, MARCH 10, 2026 AT 1PM EST AI-Powered Threat Detection: Beyond Traditional Security Models WED, MARCH 25, 2026 AT 1PM EST More Webinars White Papers Autonomous Pentesting at Machine Speed, Without False Positives Fixing Organizations' Identity Security Posture Best practices for incident response planning Industry Report: AI, SOC, and Modernizing Cybersecurity The Threat Prevention Buyer's Guide: Find the best AI-driven threat protection solution to stop file-based attacks. Explore More White Papers GISEC GLOBAL 2026 GISEC GLOBAL is the most influential and the largest cybersecurity gathering in the Middle East & Africa, uniting global CISOs, government leaders, technology buyers, and ethical hackers for three power-packed days of innovation, strategy, and live cyber drills. 📌 BOOK YOUR SPACE
    💬 Team Notes
    Article Info
    Source
    Dark Reading
    Category
    ◍ Incident Response & DFIR
    Published
    Oct 10, 2025
    Archived
    Mar 16, 2026
    Full Text
    ✓ Saved locally
    Open Original ↗