National Cyber Warfare Foundation (NCWF)

Nefarious Mantis


0 user ratings
2025-10-17 10:28:44
blscott
The alias Nefarious Mantis refers to a highly active ransomware group also known as Interlock, which emerged in September 2024. Some cybersecurity researchers, such as PRODAFT, have identified a tactical and procedural overlap, suggesting a potential link or shared resources between Nefarious Mantis and the Rhysida ransomware group.

Here are the key details on Nefarious Mantis:

Initial access methods: The group gains entry into networks by exploiting vulnerabilities in public-facing VPNs and by conducting malvertising campaigns.

Targeting: Nefarious Mantis has been observed targeting critical infrastructure sectors in the U.S. and Europe, including healthcare, education, technology, and government entities.

Double extortion: Like Rhysida, Nefarious Mantis uses double extortion tactics. It encrypts a victim\'s data while simultaneously exfiltrating sensitive information to apply more pressure for a ransom payment.

An alias used to refer to the threat actor group behind Interlock ransomware. The alias \"Nefarious Mantis\" refers to a recently active cybercrime threat group, also known as Interlock ransomware. Identified in late 2024, this financially motivated group targets critical infrastructure sectors, including healthcare, education, and government entities. Nefarious Mantis is a cybercriminal group affiliated with the Interlock ransomware operation. Identified in September 2024, the group is known for its aggressive targeting of critical infrastructure across North America and Europe, particularly in the healthcare and technology sectors.

Tactics and techniques Nefarious Mantis employs within the larger Interlock ransomware cluster, which is known for its sophisticated and multi-staged attacks. Its methods include: Initial access. The group exploits public VPN vulnerabilities and uses malvertising campaigns to gain initial access to target networks.

Malware deployment Nefarious Mantis leverages the Interlock Remote Access Trojan (RAT) to perform reconnaissance and establish persistence inside victim networks. Double extortio.n After exfiltrating sensitive data, the group deploys ransomware, encrypting victim systems and demanding payment.

Credential theft: The group conducts extensive credential theft during the compromise to aid in lateral movement and privilege escalation. Connection to other groups Tactical analysis suggests that Nefarious Mantis may have a connection to the Arcane Mantis group, also known as Rhysida. Overlapping tactics and potential resource sharing point to a relationship between the two entities.



Comments
new comment
Nobody has commented yet. Will you be the first?
 




This link is from a restricted area of the forums.
Forum



Copyright 2012 through 2025 - National Cyber Warfare Foundation - All rights reserved worldwide.