8 min read

Threat Profile: Lynx Ransomware

Threat Profile: Lynx Ransomware

 

Our incident response and threat intelligence professionals provide an extensive profile on Lynx Ransomware and its tactics, techniques, and procedures.


Overview

Lynx Ransomware first appeared in July 2024 and operates under a Ransomware-as-a-Service (RaaS) model. Under this model, ransomware developers sell their ransomware encryptor and possibly other tools to affiliates, who then split the ransom payment between the developers and the affiliates. Lynx splits their ransomware payments 80/20, which is extremely attractive to many aspiring criminal hackers. This group uses "double extortion", wherein they both encrypt an organization's data and also exfiltrate it for ransom.

 

packetwatch-figure-01-collectionFigure 01: Overview of data collection activity performed by the threat actor prior to exfiltration

 

It has also been noted that Lynx ransomware is most likely either a successor to INC ransomware or purchased INC ransomware's encryptor, as there are strong similarities in the code between Lynx and INC. Since their emergence in 2024, they have ransomed over 300 victims. While they claim not to target any "socially important" organizations, PacketWatch Team Sixty43 has seen this not be the case, with attacks on healthcare organizations, for example.

One notable characteristic of Lynx that we have observed is a longer dwell time in victim networks, often upwards of seven (7) days before the ransomware payload is deployed and detonated. This stands out significantly from most other groups we have investigated, where dwell time was often less than three (3) days. It is curious why this dwell time would be so long, as this increases the chances of the intrusion being detected. However, given the time available to the threat actor, several factors should be considered:

  1. It should be assumed that all user and service accounts could be compromised and respond accordingly (such as performing a Kerberos TGT reset). In hybrid AD environments, check logs and monitor cloud resources for lateral movement and persistence.
  2. For multi-domain networks, or those distributed across multiple locations, look at logs (edge, server, etc.) in those remote locations. Lack of ransomware detonation in remote locations is not a reliable indicator that the threat actor did not move laterally to those locations and access data.

PacketWatch's Threat Hunting team recently noticed that there are very few public resources detailing Lynx ransomware Tactics, Techniques, or Procedures (TTPs). We hope this report will help defenders better understand and mitigate this particular threat actor.

 

Initial Access

PacketWatch Team Sixty43 has traced most Lynx ransomware initial access to either phishing or brute-force attacks against the organization's Virtual Private Network (VPN). In one case, a user was successfully phished in the Spring of 2025, but the account was not fully exploited until mid-July that year. This was most likely the result of an Initial Access Broker (IAB) [see PacketWatch's IAB article] who subsequently sold this access to a Lynx affiliate at a later date.

 

packetwatch-figure-02-InitialAccess-4625

Figure 02: Multiple failed logon attempts (Event ID 4625) consistent with brute force activity

 

packetwatch-figure-03-InitialAccess-4776Figure 03: NTLM authentication attempts (Event ID 4776) showing credential validation from threat actor host

 

Due to the organization not using multi-factor authentication (MFA) and having weak password policies, both the IAB and the affiliate were able to log in to the user's account with ease.

 

packetwatch-figure-04-InitialAccess-FW1Figure 04: Firewall logs showing threat actor host and external IP

 

packetwatch-figure-05-InitialAccess-FW2Figure 05: Firewall logs showing additional threat actor external IP

 

packetwatch-figure-06-InitialAccess-osint1Figure 06: OSINT via AbusePDB on the threat actor external IP

 

packetwatch-figure-07-InitialAccess-osint2Figure 07: OSINT via AbusePDB on the threat actor external IP

 

Execution/Persistence/Command and Control/Lateral Movement

In most cases, once the Lynx affiliate gains access to the network via the VPN, they immediately use Windows-native protocols and mechanisms (RDP and SMB) to enumerate and access internal systems and applications. Additionally, our forensic investigation shows that they often begin to brute force domain admin accounts. In one case, the threat actor gained access to one of the organization's domain admin accounts within six hours via brute force.

 

packetwatch-figure-08-discovery-netscanFigure 08: Network scanning activity by the threat actor to identify internal assets

 

PacketWatch Team Sixty43 has also noted that while the threat actor is exploring the network, they will often install a Remote Monitoring and Management (RMM) tool on either an endpoint or a server to ensure they have a beachhead.

 

packetwatch-figure-09-EPCL-ateraFigure 09: Deployment of Atera RMM to establish persistent remote access 

 

packetwatch-figure-10-EPCL-splashtopFigure 10: Use of Splashtop to maintain interactive remote control over compromised systems

 

This is often done within hours of the initial intrusion.

A few reports have noted that Lynx affiliates appear to favor using RMMs like ScreenConnect and AnyDesk. However, PacketWatch analysts have noted the use of Atera and Splashtop, as well. It should be noted that Splashtop is unique in that it is often installed with other RMMs, such as Atera and NinjaRMM. They also use these RMMs to download their toolset (listed below), with a download location preference of “c:\temp”:

  1. Lynx Tools

  2. PSExec

  3. SoftPerfect Scanner

  4. RClone

 

packetwatch-figure-11-collection-exfil-rmm-download4Figure 11: RMM-driven file transfer used to stage attacker tooling on compromised hosts

 

packetwatch-figure-12-EPCL-tools-moreFigure 12: Additional tools and files written by the threat actor

 

packetwatch-figure-13-EPCL-tools-trifectaFigure 13: Combined use of multiple administrative and RMM tools

 

This “beachhead” folder often contains output from those tools, such as "hosts.txt".

The use of RMMs is a smart TTP, as it allows the threat actor to execute malicious code, establish persistence, and Command-and-Control (C2) channels while hiding their activities. The reason for this is that RMMs are typically benign tools used by IT staff to manage their environment. Most EDRs and firewalls will not detect anomalous RMM activity. This is why it is essential for organizations to know which RMMs they use and block those they do not.

The threat actor often centers their network pivots and lateral movement from their established beachhead hosts, which are often servers like Domain Controllers. They use a combination of RDP, network file shares (SMB), and PsExec to move around the network.

 

Privilege Escalation

Based on the evidence we have observed, the Lynx threat actors use tools such as SessionGopher and Mimikatz to extract credentials. Using the credentials these tools can extract, the threat actor is very likely to gain access to domain administrator accounts.

 

Defense Evasion

In most of our investigations into Lynx ransomware attacks, we identified that the threat actor uses very basic tricks to evade detection. They often disable Defender on every host they access. They also often add exclusions into Defender to allow their tools and ransomware to run.

 

packetwatch-figure-14-defense-evasion-5001Figure 14: Disabling or modifying Defender settings to prevent detection of threat actor activity

 

packetwatch-figure-15-defense-evasion-5007Figure 15: Use of exclusions or policy changes to allow malicious tools or ransomware to execute

 

Credential Access

In most of our investigations, we observed the threat actor using a tool to extract credentials. Based on evidence, Lynx affiliates appear to use Mimikatz and SessionGopher. SessionGopher is a PowerShell tool that can extract session information for WinSCP, PuTTY, SuperPuTTY, FileZilla, and RDP.

 

packetwatch-figure-16-credential-access-gopherFigure 16: Remote command execution of SessionGopher.ps1 PowerShell script

 

Discovery

In all our investigations, we noticed that the threat actors consistently use SoftPerfect network scanner. This scanner allows them to remotely scan hosts for their services and host information. As noted above, the threat actors seem to favor dumping many of their scan outputs into the "c:\temp" folder. 

 

packetwatch-figure-17-discovery-softperfectFigure 17: SoftPerfect Network Scanner tool written to host

 

Collection/Exfiltration

Lynx ransomware often uses RMMs, such as AnyDesk and Splashtop, to exfiltrate data out of the network.

 

packetwatch-figure-18-collection-exfil-splashtop7Figure 18: File transfer over Splashtop used to move data out of the environment to threat actor host

 

 

Due to these RMMs' "drag-and-drop" functions, very little forensic evidence is left behind. However, analysis of those RMMs' log files, such as:

"%programdata%\AnyDesk\connection_trace.txt",
"%programdata%\AnyDesk\file_transfer_trace.txt", and
"%PROGRAMDATA%\Splashtop\Temp\log\FTCLog.txt"

reveals what files were transferred between the beachhead hosts and the threat actor's host. In most cases, those logs clearly showed that the threat actor used their RMMs to not only download their toolset, but also to steal data.

Additionally, Lynx affiliates have been observed using rclone to exfiltrate data.

 

packetwatch-figure-19-collection-exfil-rclone2Figure 19: Rclone written to host alongside SoftPerfect Network Scanner

 

packetwatch-figure-20-collection-exfil-rclone-command-6Figure 20: Command-line execution of Rclone scripts to automate data exfiltration

 

 

In one case, the threat actor not only used rclone to exfiltrate data out of the network, but also "scrape" all documents of interest from the organization's file server to the threat actor's staging host. They used a batch file named "rcl.bat" and a VBS script named "nocmd.vbs" to automate this collection process.

 

packetwatch-figure-21-collection-exfil-upload-3Figure 21: Direct upload of collected files to an external threat actor IP

 

In this particular case, it appears it took the threat actor eight days to fully collect and exfiltrate all data before they moved on to impact.

 

Impact

As always, once the threat actor has finished exfiltrating data of interest, they begin to denotate their encryptor on the way out.

Their method of ransomware distribution seems to vary, but they have been seen abusing the organization's Group Policy via "gpscript.exe" to create a malicious GPO with a scheduled task that would denotate the ransomware in the NETLOGON share. Additionally, by pushing out the ransomware payload as a NETLOGON GPO, it effectively spreads the ransomware across the domain and breaks domain replication, further hampering the recovery of business operations.

 

packetwatch-figure-22-EPCL-gpscriptFigure 22: Use of Group Policy to create malicious scheduled task for ransomware detonation and propagation

 

packetwatch-figure-23-EPCL-taskFigure 23: Scheduled task creation for ransomware detonation within NETLOGON share

 

In one case, they named this encryptor "pushprinterconnections.exe" to help hide the ransomware payload.

 

packetwatch-figure-24-impact1Figure 24: OSINT on the ransomware executable

 

packetwatch-figure-25-impact2Figure 25: Ransomware executable written to \sysvol folder to propagate throughout the environment

 

As reported by others, Lynx ransomware's encryptor can encrypt Windows, Linux, and ESXi hosts. In some Lynx ransomware incidents we have investigated, the threat actor purposely encrypted .vmdk files in an effort to make recovery extremely difficult, and to hide their tracks. In many cases we have investigated, the risk of the ESXi hosts becoming encrypted is increased due to many organizations running older, unpatched hypervisors and not properly securing SSH access to those hypervisors. Ultimately, with the ESXi hosts encrypted, this often brings many organizations down and results in those organizations having to completely rebuild their domains.

 

packetwatch-figure-26-Overview-DefenderAlertFigure 26: Defender alert triggered during ransomware activity

 

packetwatch-figure-27-Overview-RansomNoteFigure 27: Ransom note presented to the victim following encryption

 

Mitigations

  • Ensure MFA is enabled on VPN and all other public-facing systems/apps.
  • Ensure VPN and Firewall appliances are up to date.
  • Utilize application control to prevent unauthorized tool installation.

  • Maintain consistent network monitoring with full packet capture.
  • Implement network segmentation.

  • Deploy EDR across all endpoints (servers + user workstations).
  • Catalog all authorized RMMs and other IT tools, and block all others your organization does not use.
  • Ensure your hypervisors (like ESXi) are fully patched, and SSH is disabled if not in use.
  • Ensure proper Windows event logging is enabled, such as the event codes listed below.

 

Detection:

 

Windows Logs

  • Windows System Logging Event Code(s):

    • 7045 - RMM tool & PsExec service install (Atera and Splashtop)

  • Windows Security Logging Event Code(s):

    • 4625 - Account brute forcing

    • 4776 - NTLM authentication for Lynx TA host/user

    • 4688 - Tool execution (netscan.exe, gscript.exe, etc.)

  • Windows PowerShell Script Block Logging Event Code(s):

    • 4104 - SessionGopher.ps1 remote command execution & script content

  • Windows Defender Logging Event Code(s):

    • 5001 - Defender Antivirus disabled

    • 5007 - Defender configuration changed

 

PacketWatch Queries

  • RMM Tool Domain Traffic:

    • http.host:(*.anydesk.com OR *.atera.com OR *.splashtop.com)

  • PSEXESVC (if file transferred over SMB):

    • smb.filename:*PSEXESVC*

  • Rclone Outbound Web-Based Data Exfiltration:

    • http.useragent:(*rclone*) AND source.ip:(10.0.0.0\/8 OR 172.16.0.0\/12 OR 192.168.0.0\/16) AND NOT destination.ip:(10.0.0.0\/8 OR 172.16.0.0\/12 OR 192.168.0.0\/16)

  • Rclone SFTP Data Exfiltration:

    • protocol:(ssh OR ftp) OR destination.port:(20 OR 21 OR 22 OR 2222 OR 69) AND NOT destination.ip:(10.0.0.0\/8 OR 172.16.0.0\/12 OR 192.168.0.0\/16) AND ssh.version:(*rclone*)

 

Forensic Artifacts

  • "%programdata%\AnyDesk\connection_trace.txt"

  • "%programdata%\AnyDesk\file_transfer_trace.txt"

  • "%PROGRAMDATA%\Splashtop\Temp\log\FTCLog.txt"

 

IOCs

 

Tool Files

  • Pushprinterconnections.exe (named after a valid Microsoft executable)

    • C3b57cd2c04ffd6dd173edfd975d2b05b7f6f502062a56b8585bda8776824a18

  • PSEXESVC.exe

    • %SystemRoot%\PSEXESVC.exe

  • PsExec.exe

    • C:\temp\PsExec.exe

  • AteraAgent.exe

    • C:\Program Files\ATERA Networks\AteraAgent\AteraAgent.exe

    • C:\Program Files(x86)\ATERA Networks\AteraAgent\AteraAgent.exe

  • SRService.exe

    • C:\Program Files(x86)\Splashtop\Splashtop Remote\Server\SRService.exe

    • C:\Program Files\Splashtop\Splashtop Remote\Server\SRService.exe

  • netscan.exe

    • C:\Users\administrator.[REDACTED]\Desktop\netscan.exe

    • C:\Users\administrator.[REDACTED]\appdata\roaming\Soft Perfect Network Scanner

  • SessionGopher.ps1

    • C:\temp\SessionGopher.ps1

  • PSTools.zip

    • C:\temp\PSTools.zip

  • Rclone.exe

  • Rcl.bat

  • Nocmd.vbs

 

Other Files

  • C:\temp\domain_ips.txt

  • C:\temp\hosts.txt

  • C:\temp\README.txt

 

IP Addresses

  • 79.141.172[.]131

  • 185.33.87[.]207

 

Domains

  • *.anydesk[.]com

  • *.atera[.]com

  • *.splashtop[.]com

 

Lynx File Extension

.LYNX

 

Resources: 

[1] Blackpoint, Lynx ransomware threat profile, https://blackpointcyber.com/wp-content/uploads/2024/11/Lynx.pdf (accessed Dec. 19, 2025). 

[2] Darktrace, New threat on the prowl: Investigating Lynx ransomware, https://www.darktrace.com/blog/new-threat-on-the-prowl-investigating-lynx-ransomware (accessed Dec. 18, 2025). 

[3] Picus Security, Lynx ransomware: Exposing how INC ransomware rebrands itself, https://www.picussecurity.com/resource/blog/lynx-ransomware (accessed Dec. 18, 2025). 

[4] T. S. Dutta, “Lynx ransomware infrastructure to attack Windows, Linux, ESXi & Affiliate Panel uncovered,” Cyber Security News, https://cybersecuritynews.com/lynx-ransomware-infrastructure-uncovered/ (accessed Dec. 18, 2025). 

[5] “LOLRMM,” Lolrmm.io, https://lolrmm.io/ (accessed Dec. 18, 2025). 

[6] Arvanaghi, “Arvanaghi/Sessiongopher: Sessiongopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as winscp, putty, superputty, Filezilla, and Microsoft Remote Desktop. it can be run remotely or locally.,” GitHub, https://github.com/Arvanaghi/SessionGopher (accessed Dec. 18, 2025).

 

 


 

This profile is provided FREE to the cybersecurity community.

Visit our Threat Profile Blog for additional intelligence profiles.

 Visit our Cyber Threat Intelligence Blog for additional intelligence reports. 

 


Subscribe to be notified of future intelligence profiles and reports:


DISCLAIMER
Kindly be advised that the information contained in this article is presented with no final evaluation and should be considered raw data. The sole purpose of this information is to provide situational awareness based on the currently available knowledge. We recommend exercising caution and conducting further research as necessary before making any decisions based on this information.

Table of Contents
Threat Profile: Lynx Ransomware

19 min read

Threat Profile: Lynx Ransomware

Our incident response and threat intelligence professionals provide an extensive profile on Lynx Ransomware and its tactics, techniques, and...

Read More
Headline Goes Here
I'm baby forage big mood letterpress vaporware ramps kitsch. Meditation lomo fit locavore. Vaporware kogi wayfarers squid intelligentsia offal blog. Pok pok banjo cardigan subway tile yuccie mumblecore messenger bag chicharrones edison bulb iceland everyday carry keffiyeh pug activated charcoal.