Ghost Ransomware Playbook: How it Works, What it uses and How to prevent it

August 11, 2025

Emerging as a silent predator in the cyber threat landscape, Ghost (aka Cring) ransomware resurfaced in early 2025 with intensified tactics, exploiting vulnerable systems worldwide and leaving a trail of encrypted chaos across over 70 countries.  

Originally identified in 2021, Ghost is a financially motivated threat group believed to have originated in China, though its attacks are indiscriminate and global in reach, including domestic targets. The group is known for exploiting unpatched, public-facing services to gain access and disrupt operations, particularly in sectors with high uptime requirements.  

What makes Ghost particularly elusive is its ability to constantly evolve, frequently rotating ransomware payloads, ransom notes, and even file extensions. This operational fluidity has led researchers to link it with other aliases including Cring, Crypt3r, Phantom, Strike, Hello, Wickrme, HsHarada, and Rapture. Ransomware samples observed in the wild include Cring.exe, Ghost.exe, ElysiumO.exe, and Locker.exe, further complicating identification and reinforcing the group's evasive nature. Leveraging advanced obfuscation and anti-analysis techniques, Ghost remains a persistent and adaptive threat in today's rapidly evolving ransomware ecosystem.  

Targeted Industries: Finance, Transportation, Healthcare, Education, Government, Technology, Manufacturing

Targeted Countries: Azerbaijan, Brazil, Italy, Mexico, Saudi Arabia, United States, Turkey, Canada, United Kingdom, Germany, France, India, China and Japan.  

Technical Analysis

Initial Access

Ghost threat actors often achieve initial access by exploiting critical, unpatched vulnerabilities in internet-facing systems. By targeting widely used technologies, they are able to infiltrate networks quickly and with minimal resistance, frequently compromising environments before defenders can react.  

Ghost actors are known to gain initial foothold into targeted networks by exploiting vulnerabilities in internet-facing applications. Their attack strategy often involves targeting unpatched systems, particularly Fortinet FortiOS appliances, as well as servers running Adobe ColdFusion, Microsoft SharePoint, and Microsoft Exchange. By taking advantage of these exposed and vulnerable platforms, they establish early-stage access for further compromise.

Vulnerabilities abused by Ghost Ransomware

CVE-ID Description
CVE-2021-31207 A Security Feature Bypass Vulnerability in Microsoft Exchange Server
CVE-2021-34523 A Privilege Escalation Vulnerability in Microsoft Exchange Server
CVE-2021-34473 A Remote Code Execution Vulnerability in Microsoft Exchange Server
CVE-2018-13379 A Path Traversal Vulnerability in Fortinet FortiOS SSL VPN web portal
CVE-2010-2861 A Director Traversal Vulnerability in Adobe ColdFusion enables remote attackers to read arbitrary files
CVE-2009-3960 An Information Disclosure Vulnerability in Adobe BlazeDS, that is utilized in LifeCycle and ColdFusion.

Execution and Persistence
After gaining initial access, Ghost threat actors quickly escalate their operations by deploying web shells and utilizing tools like PowerShell or Command Prompt to execute Cobalt Strike Beacon for remote control. Although they may occasionally create or modify local and domain accounts to maintain short-term access, persistence is not their primary objective. Their attacks are characterized by speed and aggression, often progressing from compromise to ransomware deployment within hours, making rapid detection and response critical.  

Privilege Escalation
For privilege escalation, Ghost threat actors frequently abuse built-in Cobalt Strike capabilities to steal process tokens associated with the SYSTEM user context. This allows them to impersonate the SYSTEM account and, in many cases, re-execute the Beacon payload with elevated privileges. In addition to these built-in functions, Ghost operators have also been observed leveraging various open-source tools to escalate privileges by exploiting known vulnerabilities. Notable tools in their arsenal include SharpZeroLogon, SharpGPPPass, BadPotato, and GodPotato, each designed to exploit Windows privilege escalation flaws.  

Defense Evasion
As part of their defense evasion tactics, Ghost threat actors leverage their Cobalt Strike access to enumerate running processes and identify active antivirus or endpoint protection tools. Once detected, they take steps to disable these defenses to avoid detection and ensure the success of their payloads. A common tactic includes executing PowerShell commands to disable Windows Defender on network-connected devices. Specifically, they use the Set-MpPreference command with multiple flags to turn off real-time monitoring, intrusion prevention, behavior monitoring, script scanning, and other key protective features.

Additionally, they disable controlled folder access and reporting functionalities to further reduce visibility and prevent threat intelligence sharing. This systematic deactivation of security controls enables Ghost actors to operate stealthily within compromised environments.

Credential Access
Ghost threat actors achieve credential access by using Cobalt Strike's "hashdump" function or tools like Mimikatz to extract plaintext passwords and password hashes from memory. These harvested credentials allow them to impersonate legitimate users, escalate privileges, and move laterally across the network, significantly expanding their reach within the compromised environment.

Discovery
As part of their discovery tactics, Ghost actors leveraged built-in Cobalt Strike commands and offensive security tools to map out target environments. For domain account enumeration, they utilize native Cobalt Strike functionalities, while tools like SharpShares are deployed to identify accessible network shares. Additionally, Ladon 911 and SharpNBTScan are used for scanning and enumerating remote systems. These tools, typically associated with adversarial use, are not commonly employed by legitimate network administrators for routine discovery tasks, highlighting their role in malicious reconnaissance activities.

Lateral Movement
During the lateral movement phase, Ghost actors leverage previously escalated privileges and use Windows Management Instrumentation Command-Line (WMIC) to execute Base64-encoded PowerShell commands across victim networks. These commands deploy additional Cobalt Strike Beacon payloads on remote systems, with the encoded strings typically beginning with:  

powershell -nop -w hidden -encodedcommand
JABzAD0ATgBlAHcALQBPAGIAagBlAGMAdAAgAEkATwAuAE0AZQBtAG8AcgB5AFMAdAByAGUAYQBtACgALABbAEMAbwBuAHYAZQByAHQAXQA6ADoARgByAG8AbQBCAGEAcwBlADYANABTAHQAcgBpAG4AZwAoACIA… 

When lateral movement fails, the actors often abandon the intrusion, indicating a strategic retreat upon encountering defensive friction.

Command and Control
Ghost actors heavily depend on Cobalt Strike Beacon and Team Servers to maintain command and control (C2) across compromised environments, utilizing HTTP and HTTPS protocols for communication. Rather than using registered domains for C2 infrastructure, they often opt for direct IP-based connections to access Beacon payloads via specific URIs, making detection and attribution more challenging.  

For victim correspondence, Ghost actors rely on encrypted, privacy-focused email services such as Tutanota, Skiff, ProtonMail, Onionmail, and Mailfence, leveraging their secure communication channels to evade monitoring and maintain operational secrecy.

Exfiltration
Ghost actors utilize cloud storage platforms like mega.nz to exfiltrate sensitive victim data as part of their double extortion strategy, stealing data before encryption to increase leverage during ransom negotiations. By transferring confidential files to these external repositories, adversaries ensure they retain a copy of the victim's data, threatening to leak or sell it if ransom demands are not met.  

Impact
On the impact side, Ghost actors deploy ransomware variants such as Cring.exe, Ghost.exe, ElysiumO.exe, and Locker.exe, all of which exhibit similar capabilities. These payloads can encrypt targeted directories or entire system drives, depending on the command-line arguments used at execution. To maintain system usability and ensure successful ransom communication, critical system folders and file types are often excluded from encryption.  

Once deployed, the ransomware disables Volume Shadow Copy Service, deleted shadow copies, and clears Windows Event Logs to obstruct forensic recovery and inhibit restoration efforts. Encrypted data is rendered inaccessible without the attacker-provided decryption key, with ransom demands typically ranging from tens to hundreds of thousands of dollars in cryptocurrency.  

MITRE ATT&CK Tactics and Techniques

Tactic Technique ID
Initial Access Exploit Facing Public Application T1190
Execution Windows Management Instrumentation T1047
Command and Scripting Interpreter: PowerShell T1059.001
Command and Scripting Interpreter: Windows Command Shell T1059.003
Persistence Account Manipulation T1098
Create Account: Local Account T1136.001
Create Account: Domain Account T1136.002
Server Software Component: Web Shell T1505.003
Privilege Escalation Exploitation for Privilege Escalation T1068
Access Token Manipulation: Token Impersonation/Theft T1134.001
Defense Evasion Impair Defenses: Disable or Modify Tools T1562.001
Hidden Window T1564.003
Credential Access OS Credential Dumping T1003
Discovery Remote System Discovery T1018
Process Discovery T1057
Account Discovery: Domain Account T1087.002
Network Share Discovery T1135
Software Discovery T1518
Software Discovery: Security Software T1518.001
Exfiltration Exfiltration over C2 Channel T1041
Exfiltration Over Web Service: Exfiltration to Cloud Storage T1567.002
Command and Control Application Layer Protocol: Web Protocols T1071.001
Image Tool Transfer T1105
Data Encoding: Standard Encoding T1132.001
Encrypted Channel T1573
Impact Data Encrypted for Impact T1486
Inhibit System Recovery T1490

Tools used by Ghost Ransomware  

Indicators of Compromise:

The indicators below are associated with Ghost ransomware operations. Organizations should integrate these IoCs into their detection engines and threat hunting workflows for proactive defense.

MD5 File Hashes Ransom Email Address
c5d712f82d5d37bb284acd4468ab3533 asauribe@tutanota[.]com
34b3009590ec2d361f07cac320671410 cringghost@skiff[.]com
d9c019182d88290e5489cdf3b607f982 ghosts1337@tuta[.]io
a2fd181f57548c215ac6891d000ec6b9 sdghost@onionmail[.]org
625bd7275e1892eac50a22f8b4a6355d ghost1998@tutamail[.]com

Mitigation Strategies:

Sources Cited:  

  1. https://www.cisa.gov/news-events/cybersecurity-advisories/aa25-050a  
  2. https://www.picussecurity.com/resource/blog/ghost-ransomware-analysis-cisa-alert-aa25-050a  
  3. https://www.ic3.gov/CSA/2025/250219.pdf  
  4. https://www.cohesity.com/blogs/ghost-ransomware-gang/  
  5. https://www.blackfog.com/ghost-ransomware-the-new-cyber-menace/  
  6. https://www.veeam.com/blog/ghost-ransomware-attacks-understanding-the-threat-and-strengthening-defenses.html  
  7. https://www.darkreading.com/cyberattacks-data-breaches/ghost-ransomware-targets-orgs-70-countries  
  8. https://63sats.com/blog/ghost-ransomware-the-cyber-menace-exploiting-outdated-security-systems  
  9. https://socprime.com/blog/ghost-cring-ransomware-detection/  
  10. https://socradar.io/dark-web-profile-ghost-cring-ransomware/  
  11. https://www.alstonprivacy.com/ghost-cring-ransomware-understanding-the-threat-how-enterprises-can-defend-themselves/  

About Loginsoft

For over 20 years, leading companies in Telecom, Cybersecurity, Healthcare, Banking, New Media, and more have come to rely on Loginsoft as a trusted resource for technology talent. From startups, to product and enterprises rely on our services. Whether Onsite, Offsite, or Offshore, we deliver. With a track record of successful partnerships with leading technology companies globally, and specifically in the past 6 years with Cybersecurity product companies, Loginsoft offers a comprehensive range of security offerings, including Software Supply Chain, Vulnerability Management, Threat Intelligence, Cloud Security, Cybersecurity Platform Integrations, creating content packs for Cloud SIEM, Logs onboarding and more. Our commitment to innovation and expertise has positioned us as a trusted player in the cybersecurity space. Loginsoft continues to provide traditional IT services which include Software development & Support, QA automation, Data Science & AI, etc.

Expertise in Integrations with Threat Intelligence and Security Products: Built more than 250+ integrations with leading TIP, SIEM, SOAR, and Ticketing Platforms such as Cortex XSOAR, Anomali, ThreatQ, Splunk, IBM QRadar & Resilient, Microsoft Azure Sentinel, ServiceNow, Swimlane, Siemplify, MISP, Maltego, Cryptocurrency Digital Exchange Platforms, CISCO, Datadog, Symantec, Carbonblack, F5, Fortinet, and so on. Loginsoft is a partner with industry leading technology vendors Palo Alto, Splunk, Elastic, IBM Security, etc.

In addition, Loginsoft offers Research as a service: We're more than just experts in cybersecurity; we're your accredited in-house research team focused on unraveling the complexities of cybersecurity and future technologies. From Application Security to Threat Research, our seasoned professionals have cultivated expertise in every facet of the field. We've earned the trust of over 20 security platform companies, who count on our research and analysis to strengthen their cybersecurity solutions.

Interested to learn more? Let’s start a conversation.

Get notified

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

BLOGS AND RESOURCES

Latest Articles