Active double-extortion • Healthcare & tech victims • 2024–2025
KillSec Ransomware – Threat Overview & Incident Response Support
KillSec is a double-extortion ransomware group that
steals and encrypts data before threatening to publish it on a Tor-based leak site.
Since early 2024, the group has claimed hundreds of victims worldwide,
with a strong focus on healthcare and technology providers.
10+ years ransomware recoveryEU-based digital forensics & IR teamKillSec, Akira, Qilin, LockBit & more
Group type
Double-extortion ransomware group
Activity window
Victims listed from Mar 2024 to Dec 2025 (public data)
Victim count
>250 organisations claimed on the leak site
Main sectors
Healthcare, technology, business services, finance, manufacturing
Based on open-source tracking of KillSec’s leak portal and victim disclosures.
Why organisations contact us during KillSec incidents
Ransomware is our daily work. We combine technical forensics, crisis management
and practical recovery planning so you can make informed decisions under pressure.
Deep experience with double-extortion
Our DFIR team has handled complex incidents involving KillSec and other
data-stealing groups across healthcare, software, manufacturing and professional services.
We understand typical playbooks, leak-site behaviour and negotiation patterns.
End-to-end incident handling
From first triage and containment to forensics, decryption strategy and rebuild:
we support the full lifecycle of your incident – not just “fix one server”.
Network & endpoint containment
Evidence collection & attack timeline
Secure recovery & hardening roadmap
Vendor-independent, business-oriented
We work with your existing tools and teams. No product lock-in – just practical
support focused on reducing downtime and risk.
We coordinate with internal IT, insurers, legal counsel and – where appropriate –
law enforcement.
What we do in the first 72 hours of a KillSec incident
The first days of a KillSec ransomware incident are critical. Our structured playbook helps
you stabilise operations, preserve evidence and prepare for recovery – including potential
negotiations and regulatory obligations.
Hour 0–4
Rapid triage & containment
We assess the scope and impact, guide you through safe isolation of affected systems,
and stop further lateral movement – without destroying critical artefacts.
Hour 4–24
Forensic acquisition & attacker analysis
We collect system images, logs and volatile data, then identify KillSec’s tooling,
persistence mechanisms and paths used for data theft and encryption.
Day 2–3
Recovery plan & decision support
We design a phased recovery plan, including options with and without payment,
and provide technical input for executive, legal and communication teams
(for example regulators and customers).
Already negotiating with KillSec?
Many victims contact us after they have begun communicating with KillSec
operators or their affiliates through the Tor chat portal.
Review and interpret attacker claims (for example data samples)
Assess technical impact of paying vs. not paying
Align negotiation strategy with legal and insurance requirements
Even if you are “late” in the incident, external experts can reduce downtime
and long-term risk significantly – for example by avoiding mis-steps that trigger
further data leaks.
Beyond emergency response, we help you make your network
more resilient against future ransomware – from hardening
identity systems and backups to monitoring and response readiness.
KillSec ransomware at a glance
The following profile is based on public reporting and leak-site tracking.
Indicators of compromise (IOCs) are examples only – do not rely on static
indicators alone for detection.
Group characteristics
Double-extortion model: data theft + encryption + public leaks
Leak site and negotiation portal hosted as Tor hidden services
Victims across North & South America, Europe and Asia
Notable focus on healthcare and medical software providers
Public trackers show more than 250 listed victims between March 2024 and December 2025,
with many cases in the US, India, the UK, Brazil and Belgium.
External reports describe campaigns against Latin American healthcare and medical
IT providers, where attackers abused misconfigured cloud storage, exposed web
services and spear-phishing with malicious documents.
Example indicators & behaviours
Indicators vary between campaigns and should be combined with behavioural detection.
Typical elements in modern ransomware intrusions include:
Use of remote-access tools (RDP, AnyDesk, commercial RATs) for lateral movement
Discovery of backup systems and hypervisors before encryption
Exfiltration via cloud storage or dedicated VPS nodes before deploying the encryptor
Execution of commands to disable security tools and delete volume shadow copies
Example Windows commands often seen in ransomware cases:
Backups: maintain offline / immutable backups and routinely
test restore procedures for critical systems.
Incident playbooks: define in advance who to call, which
systems to isolate and how to preserve evidence in case of a ransomware alert.
FAQ for internal & customer conversations
“Do we have to pay the ransom to recover?”
Not necessarily. Recovery from clean backups or partial rebuild is sometimes
possible without paying. In other cases, the business impact, data exposure,
legal requirements and insurance conditions must be weighed carefully.
We help you understand the technical feasibility of each option.
“Is there a KillSec decryptor?”
There is no generally available decryptor for current KillSec variants.
Any “miracle tool” promising guaranteed decryption should be treated with scepticism.
Our focus is on containment, forensics, recovery and long-term resilience.
“Can you work with our insurer and legal counsel?”
Yes. We frequently work alongside cyber-insurance carriers and law firms.
Our role is to provide a reliable technical picture and support
risk-based decisions, including regulator and customer communication.
“How quickly can you start?”
For active incidents we aim to bring a senior responder onto a remote triage call
very quickly once you contact our hotline or send an incident email.
On-site presence can be arranged depending on location and urgency.
How we can support you with KillSec ransomware
As a specialised incident response and digital forensics team, we help
organisations handle KillSec incidents in a structured, risk-based way:
Rapid remote assessment:
high-level scoping of affected systems, leak-site exposure and potential data theft.
Forensic investigation:
acquisition and analysis of server, endpoint and cloud artefacts to reconstruct the attack.
Recovery & hardening:
support with rebuilds, backup strategy, identity & network hardening and monitoring.
Detection engineering:
SIEM, EDR and WAF rules tuned to your environment and KillSec-style activity.
Advisory for management:
concise reporting for executives, boards, regulators and customers.
Next steps if you are concerned about KillSec
Identify which systems and applications store or process sensitive data
(for example patient records, IP, financial data) and where they are exposed.
Review identity, remote access and backup posture for those systems –
especially VPN, RDP, cloud consoles and privileged accounts.
Contact us with a short description of your environment and concerns.
Together we can scope a targeted assessment, hardening or incident-response engagement.
On request, we provide lightweight checklists and scripts customers can use to review
their own infrastructure for typical ransomware weaknesses (for example remote access,
backups, identity and logging).