Active double-extortion • Healthcare & tech victims • 2024–2025

KillSec Ransomware – Threat Overview & Incident Response Support

KillSec is a double-extortion ransomware group that steals and encrypts data before threatening to publish it on a Tor-based leak site. Since early 2024, the group has claimed hundreds of victims worldwide, with a strong focus on healthcare and technology providers.

10+ years ransomware recovery EU-based digital forensics & IR team KillSec, Akira, Qilin, LockBit & more
Group type
Double-extortion ransomware group
Activity window
Victims listed from Mar 2024 to Dec 2025 (public data)
Victim count
>250 organisations claimed on the leak site
Main sectors
Healthcare, technology, business services, finance, manufacturing

Based on open-source tracking of KillSec’s leak portal and victim disclosures.

Why organisations contact us during KillSec incidents

Ransomware is our daily work. We combine technical forensics, crisis management and practical recovery planning so you can make informed decisions under pressure.

Deep experience with double-extortion

Our DFIR team has handled complex incidents involving KillSec and other data-stealing groups across healthcare, software, manufacturing and professional services.

We understand typical playbooks, leak-site behaviour and negotiation patterns.

End-to-end incident handling

From first triage and containment to forensics, decryption strategy and rebuild: we support the full lifecycle of your incident – not just “fix one server”.

  • Network & endpoint containment
  • Evidence collection & attack timeline
  • Secure recovery & hardening roadmap

Vendor-independent, business-oriented

We work with your existing tools and teams. No product lock-in – just practical support focused on reducing downtime and risk.

We coordinate with internal IT, insurers, legal counsel and – where appropriate – law enforcement.

What we do in the first 72 hours of a KillSec incident

The first days of a KillSec ransomware incident are critical. Our structured playbook helps you stabilise operations, preserve evidence and prepare for recovery – including potential negotiations and regulatory obligations.

  1. Hour 0–4

    Rapid triage & containment

    We assess the scope and impact, guide you through safe isolation of affected systems, and stop further lateral movement – without destroying critical artefacts.

  2. Hour 4–24

    Forensic acquisition & attacker analysis

    We collect system images, logs and volatile data, then identify KillSec’s tooling, persistence mechanisms and paths used for data theft and encryption.

  3. Day 2–3

    Recovery plan & decision support

    We design a phased recovery plan, including options with and without payment, and provide technical input for executive, legal and communication teams (for example regulators and customers).

Already negotiating with KillSec?

Many victims contact us after they have begun communicating with KillSec operators or their affiliates through the Tor chat portal.

  • Review and interpret attacker claims (for example data samples)
  • Assess technical impact of paying vs. not paying
  • Align negotiation strategy with legal and insurance requirements

Even if you are “late” in the incident, external experts can reduce downtime and long-term risk significantly – for example by avoiding mis-steps that trigger further data leaks.

Beyond emergency response, we help you make your network more resilient against future ransomware – from hardening identity systems and backups to monitoring and response readiness.

KillSec ransomware at a glance

The following profile is based on public reporting and leak-site tracking. Indicators of compromise (IOCs) are examples only – do not rely on static indicators alone for detection.

Group characteristics

  • Double-extortion model: data theft + encryption + public leaks
  • Leak site and negotiation portal hosted as Tor hidden services
  • Victims across North & South America, Europe and Asia
  • Notable focus on healthcare and medical software providers

Public trackers show more than 250 listed victims between March 2024 and December 2025, with many cases in the US, India, the UK, Brazil and Belgium.

External reports describe campaigns against Latin American healthcare and medical IT providers, where attackers abused misconfigured cloud storage, exposed web services and spear-phishing with malicious documents.

Example indicators & behaviours

Indicators vary between campaigns and should be combined with behavioural detection. Typical elements in modern ransomware intrusions include:

  • Use of remote-access tools (RDP, AnyDesk, commercial RATs) for lateral movement
  • Discovery of backup systems and hypervisors before encryption
  • Exfiltration via cloud storage or dedicated VPS nodes before deploying the encryptor
  • Execution of commands to disable security tools and delete volume shadow copies
Example Windows commands often seen in ransomware cases:

vssadmin delete shadows /all /quiet
wmi shadowcopy delete
bcdedit /set {default} recoveryenabled No

These commands alone do not prove a KillSec intrusion, but they are useful starting points for threat hunting and detection.

MITRE ATT&CK mapping – typical ransomware tradecraft

Public information on KillSec’s tooling is still evolving. However, many observed campaigns follow patterns common to modern double-extortion groups:

  • Initial Access: T1078 – Valid Accounts (VPN / RDP without MFA), T1190 – Exploit Public-Facing Application, misconfigured cloud storage
  • Execution: T1059 – Command and Scripting Interpreter (PowerShell, cmd)
  • Persistence: T1547 – Boot or Logon Autostart Execution (services, scheduled tasks)
  • Privilege Escalation: T1068 – Exploitation for Privilege Escalation
  • Defense Evasion: T1562 – Impair Defenses (disabling AV/EDR, deleting logs)
  • Credential Access: T1003 – OS Credential Dumping (LSASS, SAM, ntds.dit)
  • Discovery: T1087 – Account Discovery, T1018 – Remote System Discovery
  • Lateral Movement: T1021 – Remote Services (RDP, SMB, WinRM)
  • Collection & Exfiltration: T1119 – Automated Collection, T1041 – Exfiltration Over C2 Channel / Web Services
  • Impact: T1486 – Data Encrypted for Impact, T1490 – Inhibit System Recovery

How to reduce KillSec ransomware risk

Detection & monitoring

  • Unusual access patterns: monitor VPN, RDP and web-application logs for login attempts from new regions, impossible travel and account misuse.
  • Backup & hypervisor activity: alert on unauthorised changes to backup jobs, storage policies and virtual machine snapshots.
  • Process and file monitoring: detect suspicious tools launched from web servers or application containers, and sudden spikes in file-write activity.
  • Data egress: watch for unexpected outbound transfers to cloud storage, file-sharing sites or unfamiliar VPS infrastructure.

Hardening & preparedness

  • Identity & MFA: enforce multi-factor authentication for all remote access and administrative accounts; minimise standing privileged access.
  • Network exposure: limit public-facing services; protect RDP/VPN behind strong authentication and, where possible, private access methods.
  • Backups: maintain offline / immutable backups and routinely test restore procedures for critical systems.
  • Incident playbooks: define in advance who to call, which systems to isolate and how to preserve evidence in case of a ransomware alert.

FAQ for internal & customer conversations

“Do we have to pay the ransom to recover?”

Not necessarily. Recovery from clean backups or partial rebuild is sometimes possible without paying. In other cases, the business impact, data exposure, legal requirements and insurance conditions must be weighed carefully. We help you understand the technical feasibility of each option.

“Is there a KillSec decryptor?”

There is no generally available decryptor for current KillSec variants. Any “miracle tool” promising guaranteed decryption should be treated with scepticism. Our focus is on containment, forensics, recovery and long-term resilience.

“Can you work with our insurer and legal counsel?”

Yes. We frequently work alongside cyber-insurance carriers and law firms. Our role is to provide a reliable technical picture and support risk-based decisions, including regulator and customer communication.

“How quickly can you start?”

For active incidents we aim to bring a senior responder onto a remote triage call very quickly once you contact our hotline or send an incident email. On-site presence can be arranged depending on location and urgency.

How we can support you with KillSec ransomware

As a specialised incident response and digital forensics team, we help organisations handle KillSec incidents in a structured, risk-based way:

  • Rapid remote assessment: high-level scoping of affected systems, leak-site exposure and potential data theft.
  • Forensic investigation: acquisition and analysis of server, endpoint and cloud artefacts to reconstruct the attack.
  • Recovery & hardening: support with rebuilds, backup strategy, identity & network hardening and monitoring.
  • Detection engineering: SIEM, EDR and WAF rules tuned to your environment and KillSec-style activity.
  • Advisory for management: concise reporting for executives, boards, regulators and customers.

Next steps if you are concerned about KillSec

  1. Identify which systems and applications store or process sensitive data (for example patient records, IP, financial data) and where they are exposed.
  2. Review identity, remote access and backup posture for those systems – especially VPN, RDP, cloud consoles and privileged accounts.
  3. Contact us with a short description of your environment and concerns. Together we can scope a targeted assessment, hardening or incident-response engagement.

On request, we provide lightweight checklists and scripts customers can use to review their own infrastructure for typical ransomware weaknesses (for example remote access, backups, identity and logging).