Cyber Security News

Crysis Ransomware Attacks RDP Servers to Deploy Ransomware

Recently, the cybersecurity researchers at ASEC (AhnLab Security Emergency Response Center) found that the operators of Crysis ransomware are actively utilizing the Venus ransomware in their operations.

Both Crysis and Venus are well-known for targeting the remote desktop services that are externally exposed, and it been revealed that the attacks are being launched via RDP by the AhnLab Smart Defense (ASD) logs.

Apart from this, Crysis and Venus are not alone, as the threat actor also deployed several other tools like:-

  • Port Scanner
  • Mimikatz

While such malicious tools can also target the infected systems within the internal network of the company. 

Crysis Ransomware Attack

Threat actors exploit RDP as an attack vector, and they seek active and externally accessible systems.

Vulnerable systems face brute force or dictionary attacks, and weak account credentials enable threat actors to gain access to those accounts effortlessly.

To perform a variety of malicious actions and activities, the obtained credentials enable threat actors to control systems via RDP.

Here, the Venus ransomware makes use of RDP as the attack vector, generating multiple malware types through explorer.exe, a legit Windows Explorer process.

Installation log for various malware (Source – AhnLab)

In past attacks, the threat actor tried Crysis ransomware for encryption but failed. Instead, they attempted Venus ransomware for encryption afterward.

Before Venus, tried Crysis (Source – AhnLab)

Moreover, the threat actor continually used Crysis ransomware to attack other systems, and they targeted externally exposed RDP services similarly. 

Once successful, the attacker accessed and infected other systems with Crysis ransomware via RDP. In the infected system, the threat actor deploys diverse malware types, and the scanners and credential theft tools are installed from NirSoft.

Here below, we have mentioned all the tools that are used in the attacks:-

  • Venus Ransomware
  • Crysis Ransomware
  • Mimikatz
  • Web Browser Password Viewer – NirSoft
  • Mail PassView – NirSoft
  • VNCPassView – NirSoft
  • Wireless Key View – NirSoft
  • BulletsPassView – NirSoft
  • RouterPassView – NirSoft
  • MessenPass (IM Password Recovery) – NirSoft
  • Remote Desktop PassView – NirSoft
  • Network Password Recovery – NirSoft
  • Network Share Scanner

Threat actor hijacks system using RDP and scans network with the help of tools that we have mentioned above to check if the infected system belongs to a specific network.

If so, ransomware conducts internal reconnaissance, gathers account credentials, and encrypts other network systems.

Mimikatz aids this process, and the collected account info enables lateral movement to network systems. While in a Crysis attack, the threat actor employs RDP for lateral movement within the network.

Upon successful execution of Crysis ransomware, users would have been confronted with the subsequent ransom note.

Crysis Ransom note (Source – AhnLab)

Threat actor copies files to the Download folder, including bild.exe_ for Venus ransomware, and to encrypt additional files it terminates the following things:-

  • Office
  • Email clients
  • Databases

On successful deployment, the Venus ransomware alters the desktop and then it presents the user with a README file that warns info is stolen, files encrypted and prompts users to establish contact within 48 hours.

Venus Ransom note (Source – AhnLab)

Recommendations

RDP services are actively exploited by the threat actors for initial compromise and lateral movement, that’s why security analysts have strongly recommended:-

  • Make sure to deactivate unused RDP to reduce attempts.
  • Always use strong passwords.
  • Make sure to change passwords periodically.
  • Ensure to update V3 to prevent malware.

“AI-based email security measures Protect your business From Email Threats!” – .

Tushar Subhra Dutta

Tushar is a senior cybersecurity and breach reporter. He specializes in covering cybersecurity news, trends, and emerging threats, data breaches, and malware attacks. With years of experience, he brings clarity and depth to complex security topics.

Recent Posts

New Kali Tool llm-tools-nmap Uses Nmap For Network Scanning Capabilities

Along with the release of Kali Linux 2025.3, a major update introduces an innovative tool that…

2 hours ago

New Chaosbot Leveraging CiscoVPN and Active Directory Passwords to Execute Network Commands

ChaosBot surfaced in late September 2025 as a sophisticated Rust-based backdoor targeting enterprise networks. Initial…

17 hours ago

Threat Actors Exploiting SonicWall SSL VPN Devices in Wild to Deploy Akira Ransomware

Threat actors have reemerged in mid-2025 leveraging previously disclosed vulnerabilities in SonicWall SSL VPN appliances…

17 hours ago

Nanoprecise partners with AccuKnox to strengthen its Zero Trust Cloud Security and Compliance Posture

Menlo Park, USA, October 10th, 2025, CyberNewsWire AccuKnox, a leader in Zero Trust Cloud Native…

18 hours ago

175 Malicious npm Packages With 26,000 Downloads Attacking Technology, and Energy Companies Worldwide

Socket's Threat Research Team has uncovered a sophisticated phishing campaign involving 175 malicious npm packages…

18 hours ago

RondoDox Botnet Exploits 50+ Vulnerabilities to Attack Routers, CCTV Systems and Web Servers

Since its emergence in early 2025, RondoDox has rapidly become one of the most pervasive…

19 hours ago