Cyber OpSec Fail: Beast Gang Exposes Ransomware Server
Dark ReadingArchived Mar 20, 2026✓ Full text saved
Files on a central cloud server used by the ransomware group highlight a systematic, aggressive attack on network backups as a key TTP.
Full text archived locally
✦ AI Summary· Claude Sonnet
THREAT INTELLIGENCE
CYBER RISK
CYBERSECURITY OPERATIONS
ENDPOINT SECURITY
NEWS
Cyber OpSec Fail: Beast Gang Exposes Ransomware Server
Files on a central cloud server used by the ransomware group highlight a systematic, aggressive attack on network backups as a key TTP.
Robert Lemos,Contributing Writer
March 20, 2026
4 Min Read
SOURCE: ZSOLT BICZO VIA SHUTTERSTOCK
An open server hosted on a German cloud provider's systems has been discovered, containing the entire toolset of a member of the Beast ransomware group. The find exposes the tactics, techniques, and procedures (TTPs) of the threat actor, but also reveals that Beast shares many of those TTPs with other ransomware gangs.
According to threat-intelligence firm Team Cymru, the ransomware toolset includes those used for reconnaissance, network mapping, credential theft, and exfiltration, as well as techniques for persistence and moving laterally through the local environment.
Many of the tools, such as AnyDesk for remote management and Mega for downloads, have both legitimate and malicious uses — and those tools are commonly used by many ransomware groups, says Will Thomas, senior threat intelligence adviser for Team Cymru.
"The way that a lot of ransomware groups operate is, they're reusing a lot of the tools that other ransomware groups use," he says. "For many companies, it is not as hard as it seems to actually defend against [these attacks], because as long as you have the right protections in place to block these [tools] from being able to run on your systems, they're not going to be able to hit you."
Related:Interlock Ransomware Targets Cisco Enterprise Firewalls
Ransomware continues to be a persistent problem, albeit one with that companies are slowly coming to grips with. In 2025, only half of attacks resulted in encryption, the lowest in six years and down from a high of 70% in 2024, according to Sophos' "The State of Ransomware 2025" report. Yet, 49% of organizations affected by an attack paid the ransom, the second highest number in six years, the report found.
Common Ransomware Tools, Uncommon Attribution
Loading...
The Beast ransomware group is a fairly new one, having sprung from another strain — the so-called Monster ransomware gang. It announced itself in 2024, and began operations as a ransomware-as-a-service (RaaS) scheme in February 2025, launching a data-leak site in July.
The group is known for using tools to find and delete backups, and to stop security- and backup-related processes. Beast terminates processes that have to do with "databases, backup and recovery, antivirus products, Office, file editors, and emails," threat-intelligence researchers from South Korea-based AhnLabs stated in an October analysis of the group.
"Beast ransomware goes beyond simple file encryption and employs a complex attack method that combines structural recovery prevention techniques and data exfiltration," AhnLab researchers stated. "As such, establishing an early detection and rapid response system is crucial."
Related:EU Sanctions Companies in China, Iran for Cyberattacks
Many of the tools used by ransomware gangs are common, such as these tools found on a Beast ransomware operator's server. Source: Team Cymru
For that reason, companies should not only have backups, but resilient backups. Ransomware gangs will seek out and destroy any backup, especially Windows volume shadow copies or network-attached backups. In the latest server analysis, Team Cymru's Thomas found a file, "disable_backup.bat," designed to delete backups made with the Volume Shadow Copy Service (VSS) on Microsoft Windows and to halt the service.
More advanced backup methods — if online — may fare no better, he says.
"Other organizations will use backup and replication software, so that [they] can back up sensitive files — things like Active Directory, copies of Active Directory and other sensitive files, servers and stuff — to a backup system," Thomas says. "However, the backup system is still connected to the network, so when the ransomware gang gets in and encrypts everything on the network, that gets encrypted as well."
Off-site logging is also critical because the Beast ransomware server also uses another file, CleanExit.exe, that is likely a tool to wipe logs after the ransomware was triggered, Team Cymru stated in its analysis.
Enterprises Beware Cyber War on Backups
Companies should use endpoint detection and response (EDR) systems to detect malicious activity, or better yet, MDR — the managed version of those systems. They should also use allow-listing to track approved applications.
Related:DarkSword: iPhone Exploit Kit Serves Spies & Thieves Alike
"If you have EDR tools on agents running on your systems, the commands and processes that are run to trigger these is very easy to spot," Thomas says. "Most EDRs will have the ability to just ... block [a dual-use tool] by default because it's such a high-risk process, or is too high-risk of an action to do without authorization."
Being able to find attackers' servers — especially when those servers have the ransomware payload files — is a key win, Thomas says. Because the groups are using many of the same tools, threat researchers are hard-pressed to attribute specific attacks to specific groups. For example, the Beast ransomware gang uses the Mega desktop app for exfiltration, but so does Akira, Conti, and a score of other groups.
The ransomware binary allows researchers to know which ransomware gang is behind the attack, Thomas says.
"If you just see that list of tools minus the binaries, then we don't really know which ransomware gang it is necessarily," he says. "It's only because the binaries are there, we can then attribute to which ransomware gang it is."
About the Author
Robert Lemos
Contributing Writer
Veteran technology journalist of more than 20 years. Former research engineer. Written for more than two dozen publications, including CNET News.com, Dark Reading, MIT's Technology Review, Popular Science, and Wired News. Five awards for journalism, including Best Deadline Journalism (Online) in 2003 for coverage of the Blaster worm. Crunches numbers on various trends using Python and R. Recent reports include analyses of the shortage in cybersecurity workers and annual vulnerability trends.
More Insights
Industry Reports
Frost Radar™: Non-human Identity Solutions
2026 CISO AI Risk Report
Cybersecurity Forecast 2026
The ROI of AI in Security
ThreatLabz 2025 Ransomware Report
Access More Research
Webinars
Building a Robust SOC in a Post-AI World
Retail Security: Protecting Customer Data and Payment Systems
Rethinking SSE: When Unified SASE Delivers the Flexibility Enterprises Need
Securing Remote and Hybrid Work Forecast: Beyond the VPN
AI-Powered Threat Detection: Beyond Traditional Security Models
More Webinars
You May Also Like
THREAT INTELLIGENCE
React2Shell Exploits Flood the Internet as Attacks Continue
by Rob Wright
DEC 12, 2025
THREAT INTELLIGENCE
Iran Exploits Cyber Domain to Aid Kinetic Strikes
by Robert Lemos, Contributing Writer
NOV 26, 2025
CYBERATTACKS & DATA BREACHES
DeepSeek Breach Opens Floodgates to Dark Web
by Emma Zaballos
APR 22, 2025
THREAT INTELLIGENCE
Nation-State Threats Put SMBs in Their Sights
by Robert Lemos, Contributing Writer
APR 21, 2025
Editor's Choice
CYBERSECURITY OPERATIONS
Why Stryker's Outage Is a Disaster Recovery Wake-Up Call
byJai Vijayan
MAR 12, 2026
5 MIN READ
CYBER RISK
What Orgs Can Learn From Olympics, World Cup IR Plans
byTara Seals
MAR 12, 2026
THREAT INTELLIGENCE
Commercial Spyware Opponents Fear US Policy Shifting
byRob Wright
MAR 12, 2026
9 MIN READ
Want more Dark Reading stories in your Google search results?
2026 Security Trends & Outlooks
THREAT INTELLIGENCE
Cybersecurity Predictions for 2026: Navigating the Future of Digital Threats
JAN 2, 2026
CYBER RISK
Navigating Privacy and Cybersecurity Laws in 2026 Will Prove Difficult
JAN 12, 2026
ENDPOINT SECURITY
CISOs Face a Tighter Insurance Market in 2026
JAN 5, 2026
THREAT INTELLIGENCE
2026: The Year Agentic AI Becomes the Attack-Surface Poster Child
JAN 30, 2026
Download the Collection
Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.
SUBSCRIBE
Webinars
Building a Robust SOC in a Post-AI World
THURS, MARCH 19, 2026 AT 1PM EST
Retail Security: Protecting Customer Data and Payment Systems
THURS, APRIL 2, 2026 AT 1PM EST
Rethinking SSE: When Unified SASE Delivers the Flexibility Enterprises Need
WED, APRIL 1, 2026 AT 1PM EST
Securing Remote and Hybrid Work Forecast: Beyond the VPN
TUES, MARCH 10, 2026 AT 1PM EST
AI-Powered Threat Detection: Beyond Traditional Security Models
WED, MARCH 25, 2026 AT 1PM EST
More Webinars
White Papers
Autonomous Pentesting at Machine Speed, Without False Positives
Fixing Organizations' Identity Security Posture
Best practices for incident response planning
Industry Report: AI, SOC, and Modernizing Cybersecurity
The Threat Prevention Buyer's Guide: Find the best AI-driven threat protection solution to stop file-based attacks.
Explore More White Papers
GISEC GLOBAL 2026
GISEC GLOBAL is the most influential and the largest cybersecurity gathering in the Middle East & Africa, uniting global CISOs, government leaders, technology buyers, and ethical hackers for three power-packed days of innovation, strategy, and live cyber drills.
📌 BOOK YOUR SPACE