
CrazyHunter Ransomware
CrazyHunter is a ransomware campaign targeting healthcare that weakens endpoint defenses and escalates privileges before encrypting systems at scale.

Sodinokibi (aka Sodin, REvil) is a prolific ransomware which came to widespread attention in April 2019. Sodinokibi is a ransomware that is distributed as a Ransomware-as-a-Service. There is significant speculation that the operators of Sodinokibi are the same as those behind GandCrab.
The actors behind Sodinokibi have previously used the threat of information disclosure to attempt to coerce payment. Information is disclosed on their TOR site, the Happy Blog.
As Sodin ransomware is commercially available as Ransomware-as-a-Service (RaaS) targeting will depend upon the actors using it.
Sodinokibi has been observed being delivered using the following methods:
The Sodin ransomware, before completing its actions on objectives uses GetKetboardLayoutList to determine the current language of the keyboard. The ransomware will not execute if the value is between \x18 and \x44 (inclusive).
Therefore if Sodinokibi detects any of these keyboard layouts, it will cease operation.
The ransomware contains a configuration file that it encrypted within the main binary. Once it decrypts the binary, Sodin ransomware has been observed attempting to exploit CVE-2018-8453.
The ransomware achieves persistence through a key in
SOFTWARE\Microsoft\Windows\CurrentVersion\Run\
Sodinokibi does not require immediate access to a command and control (C2) node in order to proceed. This allows the malware to operate with no Internet connectivity, which is rare for ransomware.
Get the Free Hunt Packages!
Check Out Other Emerging Threats >

CrazyHunter is a ransomware campaign targeting healthcare that weakens endpoint defenses and escalates privileges before encrypting systems at scale.

DevMan Ransomware is a newly emerging ransomware operation observed in 2025 that has been assessed as a derivative of the DragonForce ransomware family.

Gootloader resurfaced with enhanced capabilities, building on the multi-stage loader malware first seen in 2020.
Stay informed with our weekly executive update, sending you the latest news and timely data on the threats, risks, and regulations affecting your organization.