Threat Advisory

Pay2Key Ransomware Group Disrupted U.S. Healthcare Systems

Threat: Ransomware
Threat Actor Name: Pay2Key
Threat Actor Type: Malware Tool (Ransomware)
Targeted Region: U.S., Israel
Alias: G0117, UNC757, Rubidium/Lemon Sandstorm, Cobalt Foxglove, Parisite, Yellow Dev 15, Fox Kitten, Pioneer Kitten
Threat Actor Region: Iran
Targeted Sector: Technology & IT, Healthcare
Criticality: High

 

EXECUTIVE SUMMARY:

A strain of ransomware, historically linked to Iranian threat actors, has resurfaced and continues to target Western organizations, notably in healthcare and other critical sectors. Analysis of a recent intrusion reveals that the threat actor-maintained access to a compromised administrative account for an extended period before deploying ransomware that encrypted the victim’s environment within hours. This resurgence reflects a broader trend of expanded operational activity by the group and underscores its ongoing interest in high‑impact targets, often aligned with geopolitical tensions.

The ransomware variant observed in the latest incident demonstrates significant enhancements in evasion, anti‑forensics, and execution capabilities compared with earlier iterations, evading traditional detection signatures. In the case examined, there was no indication of data exfiltration a departure from the double‑extortion tactics often associated with similar operations suggesting potential shifts in tactics or destructive intent. Operational patterns include prolonged persistence using compromised credentials, abuse of legitimate remote access tooling, credential harvesting for lateral movement, and deployment of a self‑extracting archive that unpacks and executes the ransomware payload entirely in memory. Notably, advanced techniques were used to disable security tooling and systematically eliminate recovery paths prior to initiating encryption, which leveraged strong cryptographic routines to lock down files and systems.

The continued activity and evolution of this ransomware threat reflect a mature and adaptable threat actor capable of blending traditional ransomware deployment with sophisticated tradecraft and stealth. Organizations in sensitive sectors should treat such threats as high priority, given the potential for rapid and widespread impact even in the absence of immediate ransom demands. Enhanced monitoring for signs of prolonged unauthorized access, along with rigorous patching, network segmentation, and robust incident response planning, remain essential to mitigate the risk posed by this evolving ransomware operation.

 

THREAT PROFILE:

Tactic Technique Id Technique Sub-technique
Initial Access T1566.002 Phishing Spearphishing Attachment
Execution T1059.001 Command and Scripting Interpreter PowerShell
Persistence T1136.001 Create Account Local Account
Privilege Escalation T1068 Exploitation for Privilege Escalation -
Defense Evasion T1562.001 Impair Defenses Disable or Modify Tools
Credential Access T1003.001 OS Credential Dumping LSASS Memory
Discovery T1083 File and Directory Discovery -
Lateral Movement T1021.001 Remote Services Remote Desktop Protocol
Impact T1486 Data Encrypted for Impact -
T1490 Inhibit System Recovery -

 

REFERENCES:

The following reports contain further technical details:

https://www.cybersecuritydive.com/news/iran-linked-ransomware-operation-targeted-us-healthcare-provider/815652/

https://www.halcyon.ai/ransomware-research-reports/pay2key-iranian-linked-ransomware-is-back-back-again

crossmenu