PULSE NAME
Leveling Up with NightSpire Ransomware
WHITE NightSpire AlienVault 2026-04-08 Modified: 2026-04-08
2
IOCs
LOW VOLUME
NightSpire ransomware, first discovered in February 2025, presents a categorization challenge regarding whether it operates as Ransomware-as-a-Service (RaaS). Analysis of two incidents from December 2025 and March 2026 reveals significant variations in tactics, techniques, and procedures between attacks. The March 2026 incident involved threat actors installing Chrome Remoting Desktop and AnyDesk for persistence, using Everything and 7Zip for data staging, MEGASync for exfiltration, and deploying VMWare Workstation and WPS Office. The attacker accessed systems via RDP days before detection. Comparison with the December 2025 incident shows evolution in the ransomware encryptor, including modified ransom note filenames and contents. These variations in TTPs and indicators suggest either operational evolution or involvement of multiple affiliates, demonstrating that ransomware indicators aren't consistent across campaigns.
Indicators of Compromise (2)
All FileHash-SHA256
TYPEINDICATORDESCRIPTIONCREATED
FileHash-SHA256 ad67031e2ca68764fe1a7d6632c02b02a299d59efb920710011a9a2ccf4399b7 2026-04-08
FileHash-SHA256 bde50a42efc079edde1a314243ad339db2d42e343fbbcd39117803b0f5960355 2026-04-08