Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Matrix Botnet

DoNex (Ransomware) – Threat Actor

January 25, 2025
Reading Time: 3 mins read
in Threat Actors
DoNex (Ransomware) – Threat Actor

DoNex

Date of Initial Activity

2024

Location

Unknown

Suspected Attribution 

Cybercriminals

Motivation

Financial Gain

Software

Windows

Overview

In the realm of modern cyber threats, ransomware continues to evolve with increasing sophistication, and DoNex has emerged as a notable player in this evolving landscape. First reported in early March 2024, DoNex represents a new wave of financially motivated ransomware, characterized by its advanced operational techniques and aggressive encryption strategies. Its emergence has drawn significant attention due to its distinctive approach to compromising and demanding ransom from its victims, signaling a potential shift or enhancement in ransomware tactics. DoNex ransomware, with samples originating as early as mid-February, has quickly established itself as a formidable threat. Its operational design is driven by a configuration file that dictates its actions, allowing for precise control over encryption processes and victim handling. Unlike some ransomware variants that focus solely on local file encryption, DoNex extends its reach to both local and networked drives, amplifying its impact on affected organizations. The ransomware’s methodology includes modifying file icons and appending victim-specific IDs to encrypted files, enhancing the psychological pressure on victims.

Common Targets 

Information

Attack vectors

Phishing

How they work

Infection and Configuration
DoNex ransomware’s operational blueprint begins with its deployment mechanism, although specifics about its infection vector remain unclear. Once executed on a victim’s machine, DoNex leverages a meticulously crafted configuration file that dictates its operational behavior. This configuration file is pivotal, as it outlines which files and directories the ransomware will target and which it will exclude. The ransomware is programmed to encrypt files on both local drives and network shares, which broadens its impact across organizational networks. Notably, it avoids encrypting critical system files and directories, such as those associated with system recovery and application data, to minimize immediate system failures and prolong its presence on the infected system.
File Encryption and Exclusions
The encryption process is a core component of DoNex’s strategy. It adds a victim-specific ID to encrypted files, which not only aids in tracking individual victims but also in customizing ransom demands. The ransomware employs a comprehensive list of file extensions and directories to exclude from encryption. This meticulous selection includes system files and application-specific data, ensuring that critical system operations remain functional while still encrypting user data effectively. Additionally, DoNex terminates specific processes and services that might interfere with its encryption activities. This includes shutting down database management systems, backup software, and common applications such as web browsers and office programs, thereby hindering any potential countermeasures from running.
Ransom Demands and Data Leak Site
Following the encryption of files, DoNex deploys a ransom note named “Readme.[victim ID].txt” on the compromised systems. This note contains instructions for the victim to contact the attackers via various communication channels, including TOR sites, TOX chat, or email. The use of a TOR-based data leak site further enhances the ransomware’s operational security by allowing the attackers to anonymize their activities and communicate with victims under the guise of secrecy. The data leak site also serves as a platform to display stolen data, applying additional pressure on victims to comply with ransom demands.
Operational Impact and Defense
DoNex’s operational tactics reflect a strategic approach to ransomware attacks, with a focus on minimizing immediate disruption while maximizing long-term extortion potential. The ransomware’s ability to evade detection, coupled with its selective encryption and comprehensive victim targeting, underscores the need for robust cybersecurity defenses. Organizations must adopt advanced endpoint protection solutions, maintain up-to-date antivirus signatures, and implement rigorous backup strategies to mitigate the risk posed by such sophisticated ransomware variants. Additionally, training and awareness programs for employees can help in recognizing and avoiding potential phishing attempts that often serve as the initial infection vector for ransomware attacks.
References:
  • Ransomware Roundup – KageNoHitobito and DoNex
Tags: Cyber threatsDoNexPhishingRansomwareThreat Actors
ADVERTISEMENT

Related Posts

Storm-1811 (Cybercriminal) – Threat Actor

Storm-1811 (Cybercriminal) – Threat Actor

March 2, 2025
CopyCop (State-Sponsored) – Threat Actor

CopyCop (State-Sponsored) – Threat Actor

March 2, 2025
Storm-0539 – Threat Actor

Storm-0539 – Threat Actor

March 2, 2025
Void Manticore (Storm-0842) – Threat Actor

Void Manticore (Storm-0842) – Threat Actor

March 2, 2025
Unfading Sea Haze – Threat Actor

Unfading Sea Haze – Threat Actor

March 2, 2025
Ikaruz Red Team – Threat Actor

Ikaruz Red Team – Threat Actor

March 2, 2025

Latest Alerts

New ZeroCrumb Malware Steals Browser Cookies

TikTok Videos Spread Vidar StealC Malware

CISA Commvault ZeroDay Flaw Risks Secrets

GitLab Patch Stops Service Disruption Risks

3AM Ransomware Email Bomb and Vishing Threat

Function Confusion Hits Serverless Clouds

Subscribe to our newsletter

    Latest Incidents

    Cetus Crypto Exchange Hacked For $223M

    MCP Data Breach Hits 235K NC Lab Patients

    UFCW Data Breach Risks Social Security Data

    Cyberattack Paralyzes French Hauts de Seine

    Santa Fe City Loses $324K In Hacker Scam

    Belgium Housing Hit by Ransomware Attack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial