Kaspersky reports the return of ransomware group OldGremlin
(MENAFN- Golin Mena) August 28, 2025
Kaspersky Threat Research has identified new attacks by the ransomware group OldGremlin in early 2025, signaling the return of an operation that targets manufacturing, healthcare, retail and technology firms and once demanded nearly $17 million from a single victim.
The OldGremlin cyber group, identified five years ago, uses advanced techniques, tactics, and procedures to carry out attacks. Attackers can remain in a victim's system for an extended period of time, averaging about 49 days before encrypting files. The Russian-speaking group was active from 2020 to 2022, and was last observed in 2024. In previous cases, they have demanded large ransoms, such as nearly 17 million US dollars in one instance.
In the 2025 campaign, the attackers updated their arsenal of attack tools. To gain access to the victims' computers and encrypt their data, attackers send phishing emails and use various malicious tools. They use a backdoor to gain remote access to and control infected devices. They exploit a vulnerability in a legitimate driver to disable Windows protection and run their own malicious unsigned driver. This allows them to run ransomware. The attackers also used a legitimate Node.js platform (JavaScript runtime) to run malicious scripts. The group also began "branding" its cyberattacks, using OldGremlins – a slightly modified name that had previously been assigned to them by researchers - in ransom messages.
In the new campaign, the malware not only encrypts files but also reports the current status to intruders. Finally, the fourth tool, “closethedoor,” isolates the device from the network during the encryption process, drops the ransom notes, and cleans up traces, making it difficult to investigate the incident further.
“A new wave of cyberattacks by OldGremlin has confirmed that even inactive groups can be a threat to businesses. The attackers have returned with improved tools, highlighting the importance of companies constantly monitoring the techniques and tactics used by attackers to prevent future attacks. In 2025, the group has not only resumed its activities but also taken on the name given by cybersecurity experts, publicly declaring its existence,” said Yanis Zinchenko, Threat Research Expert at Kaspersky.
Kaspersky products detect this ransomware as Trojan-Ransom.Win64.OldGremlin, Backdoor.JS.Agent.og, HEUR:Trojan.JS.Starter.og and HEUR:Trojan-Ransom.Win64.Generic.
Kaspersky encourages organizations to follow these best practices to safeguard from ransomware:
• Use solutions from the Kaspersky Next product line that provide real-time protection, threat visibility, investigation and response capabilities of EDR and XDR for organizations of any size and industry.
• Always keep software updated on all the devices you use to prevent attackers from exploiting vulnerabilities and infiltrating your network.
• Focus your defense strategy on detecting lateral movements and data exfiltration to the internet. Pay special attention to outgoing traffic to detect cybercriminals’ connections to your network.
• Set up offline backups that intruders cannot tamper with. Make sure you can access them quickly when needed or in an emergency.
• Use the latest Threat Intelligence information to stay aware of the actual Tactics, Techniques, and Procedures (TTPs) used by threat actors.
Kaspersky Threat Research has identified new attacks by the ransomware group OldGremlin in early 2025, signaling the return of an operation that targets manufacturing, healthcare, retail and technology firms and once demanded nearly $17 million from a single victim.
The OldGremlin cyber group, identified five years ago, uses advanced techniques, tactics, and procedures to carry out attacks. Attackers can remain in a victim's system for an extended period of time, averaging about 49 days before encrypting files. The Russian-speaking group was active from 2020 to 2022, and was last observed in 2024. In previous cases, they have demanded large ransoms, such as nearly 17 million US dollars in one instance.
In the 2025 campaign, the attackers updated their arsenal of attack tools. To gain access to the victims' computers and encrypt their data, attackers send phishing emails and use various malicious tools. They use a backdoor to gain remote access to and control infected devices. They exploit a vulnerability in a legitimate driver to disable Windows protection and run their own malicious unsigned driver. This allows them to run ransomware. The attackers also used a legitimate Node.js platform (JavaScript runtime) to run malicious scripts. The group also began "branding" its cyberattacks, using OldGremlins – a slightly modified name that had previously been assigned to them by researchers - in ransom messages.
In the new campaign, the malware not only encrypts files but also reports the current status to intruders. Finally, the fourth tool, “closethedoor,” isolates the device from the network during the encryption process, drops the ransom notes, and cleans up traces, making it difficult to investigate the incident further.
“A new wave of cyberattacks by OldGremlin has confirmed that even inactive groups can be a threat to businesses. The attackers have returned with improved tools, highlighting the importance of companies constantly monitoring the techniques and tactics used by attackers to prevent future attacks. In 2025, the group has not only resumed its activities but also taken on the name given by cybersecurity experts, publicly declaring its existence,” said Yanis Zinchenko, Threat Research Expert at Kaspersky.
Kaspersky products detect this ransomware as Trojan-Ransom.Win64.OldGremlin, Backdoor.JS.Agent.og, HEUR:Trojan.JS.Starter.og and HEUR:Trojan-Ransom.Win64.Generic.
Kaspersky encourages organizations to follow these best practices to safeguard from ransomware:
• Use solutions from the Kaspersky Next product line that provide real-time protection, threat visibility, investigation and response capabilities of EDR and XDR for organizations of any size and industry.
• Always keep software updated on all the devices you use to prevent attackers from exploiting vulnerabilities and infiltrating your network.
• Focus your defense strategy on detecting lateral movements and data exfiltration to the internet. Pay special attention to outgoing traffic to detect cybercriminals’ connections to your network.
• Set up offline backups that intruders cannot tamper with. Make sure you can access them quickly when needed or in an emergency.
• Use the latest Threat Intelligence information to stay aware of the actual Tactics, Techniques, and Procedures (TTPs) used by threat actors.
Legal Disclaimer:
MENAFN provides the
information “as is” without warranty of any kind. We do not accept
any responsibility or liability for the accuracy, content, images,
videos, licenses, completeness, legality, or reliability of the information
contained in this article. If you have any complaints or copyright
issues related to this article, kindly contact the provider above.
Most popular stories
Market Research

- United States Lubricants Market Growth Opportunities & Share Dynamics 20252033
- UK Digital Health Market To Reach USD 37.6 Billion By 2033
- Immigration Consultancy Business Plan 2025: What You Need To Get Started
- United States Animal Health Market Size, Industry Trends, Share, Growth And Report 2025-2033
- Latin America Mobile Payment Market To Hit USD 1,688.0 Billion By 2033
- United States Jewelry Market Forecast On Growth & Demand Drivers 20252033
Comments
No comment