Hellcat ransomware levels up, broadens its reach

June 2, 2025
Hellcat Ransomware Spear Phishing Threat Actors

The cybersecurity community is raising concerns about the rapid progress of the Hellcat ransomware group, which has sharpened its tactics to target essential sectors.

This ransomware, which first surfaced in the middle of 2024, uses a complex mix of zero-day exploits, psychological manipulation, and Ransomware-as-a-Service (RaaS) to increase the scope of its attacks.

 

The Hellcat ransomware operators commonly employ spear phishing and zero-day exploits.

 

The Hellcat ransomware operators launch attacks using spear phishing emails with harmful attachments, initiating a multi-step PowerShell infection chain.

These threat actors generate emails to bypass traditional security systems, utilising zero-day vulnerabilities for unauthorised access. Typically, their initial breach targets public-facing applications, a proven, increasingly successful strategy.

They employ a double extortion method, stealing data before it is encrypted and threatening to release this information publicly if ransom demands go unmet. This tactic significantly escalates pressure on victims, rendering Hellcat a severe threat.

Once inside, attackers employ a reflective code loading technique to run malicious code directly in memory, thereby avoiding detection by file-based security measures.

Additionally, they circumvent the Anti-Malware Scan Interface (AMSI) and alter security tools to guarantee the seamless execution of their scripts. This tactic introduces SliverC2, which grants attackers sustained remote access.

The group then adopts “living off the land” techniques, utilising tools such as Netcat and Netscan for lateral movement within networks, imitating legitimate activities.

The threat actors use SFTP and cloud services like MegaSync or Restic to exfiltrate data and ensure that stolen data remains secure for their extortion efforts. As Hellcat continues to evolve and hone its techniques, the cybersecurity field remains constantly changing, demanding vigilant and adaptive responses.

Therefore, organisations must implement adaptive protection and stay informed on the most recent cybersecurity protocols to counteract and prevent these threats. Companies and government bodies must train their staff to spot intrusion tactics that threat actors use to avoid unwanted compromise caused by unauthorised access.

About the author