Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Ivanti EPMM 0-Day Vulnerability Actively Exploited Attacks
May 7, 2026
Critical Cisco Network Vulnerability Allows Remote DoS Attacks
May 7, 2026
CISA Warns of Palo Alto PAN-OS Vulnerability Exploited to Gain
May 7, 2026
Home/Threats/Sicarii RaaS Attacks Exposed RDP & Fortinet Devices
Threats

Sicarii RaaS Attacks Exposed RDP & Fortinet Devices

December 2025 marked the emergence of Sicarii, a previously unknown ransomware-as-a-service (RaaS) operation. Appearing across underground platforms, the group identified itself as Israeli or...

Jennifer sherman
Jennifer sherman
January 15, 2026 3 Min Read
2 0

December 2025 marked the emergence of Sicarii, a previously unknown ransomware-as-a-service (RaaS) operation. Appearing across underground platforms, the group identified itself as Israeli or Jewish-affiliated.

The operation stands apart from typical financially motivated ransomware due to its explicit use of Hebrew language, Israeli symbols, and references to historical Jewish groups in its branding.

Unlike established ransomware operations that maintain operational secrecy, Sicarii openly incorporates the Haganah symbol alongside Hebrew text in its visual identity, creating an unusual presence in the cybercriminal landscape.

The group claims to focus on targeting organizations in Arab and Muslim countries while explicitly avoiding Israeli systems.

The malware employs a geo-fencing mechanism that prevents execution on systems identified as Israeli, checking time zones, keyboard layouts, and network adapter IP addresses to identify local targets.

Sicarii Ransomware logo featuring the phrase “The Sicarii Knife” in Hebrew text with the symbol of the Haganah (Source - Check Point)
Sicarii Ransomware logo featuring the phrase “The Sicarii Knife” in Hebrew text with the symbol of the Haganah (Source – Check Point)

This selective targeting approach, combined with ideological messaging, distinguishes Sicarii from conventional ransomware groups operating from Eastern Europe or Russia.

Check Point analysts identified a sophisticated technical infrastructure underlying the Sicarii operation.

The ransomware begins execution through an anti-virtualization phase that detects sandbox environments and displays a deceptive error message to avoid analysis.

Threat’s Profile picture (Source - Check Point)
Threat’s Profile picture (Source – Check Point)

It then copies itself to the temporary directory as svchost_{random}.exe and tests internet connectivity by contacting google.com/generate_204 multiple times to ensure operational readiness.

Lateral Movement Through Network Reconnaissance

After establishing execution context, the malware performs aggressive network reconnaissance to map the victim’s environment.

The malware enumerates local network configurations through ARP requests and scans for exposed RDP services across discovered systems.

More significantly, it actively attempts to exploit Fortinet devices using CVE-2025-64446, a vulnerability that provides lateral movement pathways within compromised networks.

This reconnaissance phase supports both network penetration and data collection objectives, making it particularly dangerous for organizations with mixed security infrastructure.

The malware collects extensive data including system credentials, browser information, and application data from platforms like Discord, Slack, Telegram, and cryptocurrency wallets.

Sicarii onion website (Source - Check Point)
Sicarii onion website (Source – Check Point)

All harvested data gets packaged into a ZIP archive named collected_data.zip and exfiltrated through file.io. Following data exfiltration, the ransomware establishes persistence through multiple mechanisms including registry modifications, service creation, and new user accounts with hardcoded credentials.

The encryption phase uses AES-GCM with 256-bit keys, appending the .sicarii extension to encrypted files.

The operation concludes with a destructive component that deploys a batch script at startup, corrupting bootloader files and forcing immediate system shutdown.

Organizations should prioritize patching Fortinet devices and implementing network segmentation to contain this emerging threat.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitMalwarePatchransomwareSecurityThreatVulnerability

Share Article

Jennifer sherman

Jennifer sherman

Jennifer is a cybersecurity news reporter covering data breaches, ransomware campaigns, and dark web markets. With a background in incident response, Jennifer provides unique insights into how organizations respond to cyber attacks and the evolving tactics of threat actors. Her reporting has covered major breaches affecting millions of users and has helped organizations understand emerging threats. Jennifer combines technical knowledge with investigative journalism to deliver in-depth coverage of cybersecurity incidents.

Previous Post

Firefox 147 Released With Fixes for 16 Vulnerabilities that Enable

Next Post

Turla’s Kazuar v3 Loader Leverages Event Tracing for Windows and

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Scammers Evade Blocking Using VoIP and Reused Windows
May 7, 2026
Palo Alto Firewall Zero-Day RCE Act Networks Vulnerability
May 7, 2026
Critical Redis Flaws Enable Remote Code Execution Attacks
May 7, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us