Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
VoidStealer Malware Bypasses Chrome Encryption Chrome’s App-Bound
May 19, 2026
Nx Console VS Code Extension Compromised: Steal Secrets
May 19, 2026
Critical Marimo Flaw Allows Remote Code Execution Attacks
May 19, 2026
Home/Threats/Cephalus Ransomware: New Go Double- Emerges Go-Based
Threats

Cephalus Ransomware: New Go Double- Emerges Go-Based

Cephalus, a newly identified ransomware strain, is built using the Go programming language. Evidence indicates victim activity began as early as June 2025, with broader public reporting emerging in...

Emy Elsamnoudy
Emy Elsamnoudy
February 11, 2026 2 Min Read
5 0

Cephalus, a newly identified ransomware strain, is built using the Go programming language. Evidence indicates victim activity began as early as June 2025, with broader public reporting emerging in August.

It focuses on Windows networks and follows a double-extortion playbook, stealing sensitive data before it locks files.

Victims can face operational downtime and pressure when attackers leak small “proof” sets to push payment.

Reports tie many intrusions to exposed Remote Desktop Protocol (RDP) services that lack multi-factor authentication, often paired with stolen credentials.

Once inside, the malware moves quickly from access to impact, aiming to disable defenses and break recovery options. It uses a hybrid scheme, encrypting files with AES-256 in CTR mode and protecting per-victim keys with RSA-1024.

After these early case reports, AttackIQ researchers noted the pattern of behaviors and mapped them into an emulation sequence that mirrors how Cephalus is deployed on a compromised host.

The emulation draws on behavior described by Huntress in August 2025 and Ahnlab in December 2025, along with internal analysis.

Cephalus Ransomware TTPs (Source – AttackIQ)

Tis shows the initial run, including process injection through VirtualAlloc and VirtualProtect and persistence through scheduled tasks created with schtasks.

Before encryption, Cephalus performs quick checks that help it understand the victim environment, collecting system and user details and listing running processes.

It uses Windows APIs such as GetSystemInfo, RtlGetVersion, GetComputerNameExW, GetUserNameW, GetEnvironmentStrings, and CreateToolhelp32Snapshot with Process32FirstW and Process32NextW.

It can also gather adapter and drive details and then walk the file system with FindFirstFileW and FindNextFileW to pick targets.

Windows Defender tampering

A key evasion step is to weaken Microsoft Defender, where the attacker disables or reduces real-time protections and adds exclusions for paths, processes, or extensions.

The observed actions include PowerShell changes like Add-MpPreference and Set-MpPreference, plus registry edits under Windows Defender policy keys that can turn off monitoring or scanning.

Captures this phase, where exclusions and settings changes reduce the chance of the payload being blocked.

Defenders should treat open RDP as a high-risk doorway: require MFA, restrict exposure with VPN or allowlists, watch for brute force and unusual logons, and reset passwords when theft is suspected.

On endpoints, alert on new scheduled tasks, vssadmin shadow copy deletion, sudden Defender preference or registry policy changes, and suspicious service stops for backups or databases, while keeping offline backups and practicing recovery drills.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackMalwareransomware

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

Microsoft Investigates Teams Assignment Errors After Failed Update

Next Post

Microsoft Word 0-Day Vulnerability Actively Exploited

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Hackers Compromise @antv npm Packages via Mini Shai-Hulud
May 19, 2026
CISA Exposes AWS GovCloud Credentials on Public Admin GitHub
May 19, 2026
Hackers Abuse Entra ID to Exfiltrate Microsoft Accounts Azure
May 19, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Jennifer sherman
Jennifer sherman
Sarah simpson
Sarah simpson
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us