Skip to main content

Command Palette

Search for a command to run...

Osiris: New ransomware is quietly disabling antivirus with malicious drivers

Osiris, a new ransomware discovered in November 2025, is quietly destroying your system even if you have installed enough antivirus software.

Updated
5 min read
Osiris: New ransomware is quietly disabling antivirus with malicious drivers

Overview

In today's ransomware world, where attack groups constantly copy, rename, and reuse old tools, Osiris emerges as a stark reminder that the game is still evolving. Without fanfare or loud announcements on underground forums, Osiris has chosen to infiltrate systems quietly, disable core defenses with malicious drivers, steal data before encryption, and leave behind a paralyzed infrastructure.

Notably, in November 2025, analysts recorded the Osiris campaign targeting a large food chain corporation in Southeast Asia. Although it's a new ransomware, the tools and techniques used indicate that this is an experienced threat actor group, with many signs linking to the Inc ransomware group and Medusa ransomware.

The analysis below will provide you with the most comprehensive and detailed look at Osiris Malware, from the impact of this malware on targets to the execution flow that attackers are silently carrying out on your system.

Targets and Impact

  • Targets large F&B businesses in Southeast Asia.

  • Encrypts data combined with information theft (double extortion).

  • Disables security software using the BYOVD technique.

  • Exfiltrates data to cloud storage before encryption.

Technique BYOVD

Exploit Party: Bring Your Own Vulnerable Driver Attacks

As mentioned, in this campaign, the attacker will use the BYOVD - Bring Your Own Vulnerable Driver technique to compromise and infiltrate target systems. So, what is this technique?

BYOVD (Bring Your Own Vulnerable Driver) is a kernel-level attack technique where the attacker brings their own legitimate driver with security vulnerabilities and then loads this driver into the victim's system to:

  • Escalate privileges to Ring 0 (kernel mode).

  • Disable antivirus/EDR.

  • Bypass operating system protections.

  • Execute actions that user-mode malware cannot perform.

A BYOVD attack sequence involves 5 specific stages, each with its own impact.

  • Step 1: Initial intrusion.

  • Step 2: Introduce a vulnerable driver into the system.

  • Step 3: Load the driver.

  • Step 4: Exploit the vulnerability in the driver.

  • Step 5: Perform malicious actions.

Attack Flow

In the first stage, which is the initial intrusion into the system, attackers will try to gain an initial foothold in the victim's system. Some documented communication techniques include: phishing emails, exposed RDP, exploiting unpatched public-facing services, or downloading malware via loader/dropper. These methods allow attackers to gain access to the target system.

Once they have successfully infiltrated, they begin setting up the environment to load additional tools and prepare for further attacks. In this stage, they will load backdoors or remote administration tools (RAT, remote agent).

Additionally, they will set up persistence mechanisms on the target system using legitimate Windows processes: Scheduled Task, Service, or Registry Run Key. In the recorded campaign, two C2 domains were used by the attackers to maintain and receive data:

Moving to the next stage, deploying BYOVD is considered one of the most crucial links for the campaign's success. The attacker set up a Poortry/Abyssworker driver masquerading as a Malwarebytes anti-exploit driver. Simply put, they load a legitimate driver that has vulnerabilities. With this action, the attacker can easily:

  • Kill security processes.

  • Disable callbacks.

  • Bypass self-protection.

This is considered the "heart" of the campaign; once the defenses are down, everything that follows becomes much easier for the attacker.

Right after this step, the attacker will expand their control over the entire system and domain. Here, the attacker will perform Dump credential (LSASS, token) to obtain Domain admin and Service account. Once they have this information, they continue to move laterally within the internal network: SMB, RDP, or Remote execution.

Next, their target will be to collect important files: financial documents, contracts, or customer data, and upload them to the cloud as well as intermediary servers. As you know, by this step, backups are no longer enough to fix what's happening.

Of course, finally, data is encrypted using a hybrid method: ECC + AES-128-CTR, with each file using its own AES key. The encrypted files are given the extension .Osiris.

To increase pressure on the target, the attacker continues to threaten to publish the data, count down the time, or prove the data is real to increase pressure on the victim and demand a ransom.

Conclusion

Osiris is not just a new ransomware variant; it is clear evidence of the evolution of modern cyberattack campaigns. The combination of BYOVD techniques to disable security solutions, stealing data before encryption, and destroying recovery mechanisms shows that today's ransomware has become an organized, multi-layered, and well-prepared attack chain.

The concern is not Osiris itself, but the trend it represents: hackers are exploiting the most trusted components of the operating system, like drivers and legitimate tools, to bypass traditional defenses. In this context, security models relying solely on antivirus or post-incident response are no longer effective.

The lesson is clear: defense must precede attack. Controlling drivers, monitoring abnormal behavior, managing access rights strictly, and maintaining a secure backup strategy are no longer "recommendations," but mandatory requirements. Osiris is just a new name on the ransomware list, but the techniques it uses are likely to continue appearing in more sophisticated forms in the future.

Recommendations

  1. System Protection

    • Always update Windows and drivers from official sources (Windows Update).

    • Do not install cracked drivers, software, or keygens → these are common ways for ransomware to enter.

    • Use antivirus with BYOVD protection (Defender with Memory Integrity enabled, or a reputable EDR).

  2. Data Backup

    • Backup following the 3-2-1 rule:

      • 3 copies

      • 2 different storage types

      • 1 copy offline / not constantly connected

    • Do not keep the backup drive always connected to the computer.

  3. Be Cautious with Strange Files / Emails

    • Do not open strange attachments (especially .exe, .zip, .iso, .lnk).

    • Be wary of fake IT emails, invoices, and security notifications.

    • Disable macros in Office if not absolutely necessary.

  4. Access Management

    • Enable MFA for RDP, VPN, email, admin accounts

    • Do not expose RDP to the public Internet.

    • Apply least privilege (do not use admin accounts for daily tasks).

IOCs

  1. File Hash

    • fff586c95b510e6c8c0e032524026ef22297869a86d14075cd601ca8e20d4a16

    • c74509fcae41fc9f63667dce960d40907f81fae09957bb558d4c3e6a786dde7d

    • fc39cca5d71b1a9ed3c71cca6f1b86cfe03466624ad78cdb57580dba90847851

    • d78f7d9b0e4e1f9c6b061fb0993c2f84e22c3e6f32d9db75013bcfbba7b64bc3

    • 824e16f0664aaf427286283d0e56fdc0e6fa8698330fa13998df8999f2a6bb61

    • 231e6bee1ee77d70854c1e3600342d8a69c18442f601cd201e033fa13cb8d5a5

    • 44748c22baec61a0a3bd68b5739736fa15c479a3b28c1a0f9324823fc4e3fe34

    • Ce719c223484157c7f6e52c71aadaf496d0dad77e40b5fc739ca3c51e9d26277

    • 8c378f6200eec750ed66bde1e54c29b7bd172e503a5874ca2eead4705dd7b515

    • 79bd876918bac1af641be10cfa3bb96b42c30d18ffba842e0eff8301e7659724

    • C189595c36996bdb7dce6ec28cf6906a00cbb5c5fe182e038bf476d74bed349e

    • 5c2f663c8369af70f727cccf6e19248c50d7c157fe9e4db220fbe2b73f75c713

    • 44e007741f7650d1bd04cca3cd6dfd4f32328c401f95fb2d6d1fafce624cc99e

    • D524ca33a4f20f70cb55985289b047defc46660b6f07f1f286fa579aa70cf57a

    • 5bd82a1b2db1bdc8ff74cacb53823edd8529dd9311a4248a86537a5b792939f8

    • 534bd6b99ed0e40ccbefad1656f03cc56dd9cc3f6d990cd7cb87af4cceebe144

    • 39a0565f0c0adc4dc5b45c67134b3b488ddb9d67b417d32e9588235868316fac

  2. Malicious Domain

Reference

  1. Osiris: New Ransomware, Experienced Attackers? | SECURITY.COM

  2. New Osiris Ransomware Emerges as New Strain Using POORTRY Driver in BYOVD Attack

More from this blog

F

FPT IS Security

726 posts

Dedicated to providing insightful articles on cybersecurity threat intelligence, aimed at empowering individuals and organizations to navigate the digital landscape safely.