The Register: INC ransomware rebrands to Lynx – same code, new name, still up to no good

Source URL: https://www.theregister.com/2024/10/11/inc_ransomware_lynx/
Source: The Register
Title: INC ransomware rebrands to Lynx – same code, new name, still up to no good

Feedly Summary: Researchers point to evidence that scumbags visited the strategy boutique
Researchers at Palo Alto’s Unit 42 believe the INC ransomware crew is no more and recently rebranded itself as Lynx over a three-month period.…

AI Summary and Description: Yes

Summary: The text provides insights into the recent evolution of the INC ransomware group, now rebranded as Lynx, highlighting the continuity of tactics and code reuse in ransomware development. This analysis is crucial for cybersecurity professionals, as it illustrates the shifting landscape of cyber threats and the importance of vigilance against these evolving tactics.

Detailed Description:
The report from Unit 42 details the transformation of the INC ransomware group into the Lynx ransomware crew, underlining critical trends in ransomware operations and cybercriminal behavior. The analysis offers significant points for security professionals to consider:

– **Rebranding and Evolution**:
– The INC group, which had notable attacks on institutions like the NHS in the UK, has seemingly transitioned to the Lynx brand.
– This change is noticeable in the shifting number of detections, with Lynx outpacing INC within a short span.

– **Code Reuse Among Cybercriminals**:
– A substantial code overlap (70.8% match) between INC and Lynx indicates a common development lineage, where malicious actors repurpose existing code to streamline their operations.
– This tactic not only saves resources but also enhances the effectiveness of new ransomware campaigns, making it vital for organizations to be aware of such behavior.

– **Availability of Source Code**:
– The accessibility of INC’s source code on cybercrime forums poses a risk of new ransomware versions emerging from various actors, complicating detection and mitigation efforts.

– **Cybercrime Infrastructure**:
– Both the INC and Lynx gangs maintain clear and TOR web presences, which is notable in the cybercriminal ecosystem.
– Their similar website formats and designs suggest either a direct connection between the two or an attempt to create a deceptive image of lineage.

– **Ethical Claims by Ransomware Gangs**:
– Lynx’s claimed policy of not targeting vital societal sectors stands in stark contrast to its predecessor, INC, which attacked hospitals and government entities.
– This communication strategy, regardless of its authenticity, indicates the need for continuous scrutiny of ransomware groups and their declared motives.

The text effectively underscores the need for a nuanced understanding of ransomware operations, particularly regarding how these groups adapt, rebrand, and continue to pose threats to various sectors. For security professionals, this highlights the importance of ongoing threat intelligence gathering and adapting defense strategies to deal with the dynamic nature of cyber threats.