Forcepoint X-Labs Uncovers Low-Noise Phorpiex Campaign Delivering Offline ‘Global Group’ Ransomware

Today, the researchers at Forcepoint X-Labs released findings on a high-volume phishing campaign leveraging the Phorpiex botnet to deliver Global Group ransomware, demonstrating how familiar file types and low-friction attack chains continue to enable high-impact compromises.

Authored by Lydia McElligott, Senior Security Researcher, Forcepoint X-Labs researchers observed the following:

  • Weaponized Windows shortcut (.lnk) attachments: Attackers disguise the file as a normal document using double extensions, allowing a single click to trigger code execution. 
  • Stealthy multi-stage execution: The shortcut launches command-line tools that download and execute the payload with no visible installer. 
  • Offline “mute” ransomware: Global Group operates locally without contacting command-and-control infrastructure and generates encryption keys on the host, enabling execution even in air-gapped environments. 
  • No data exfiltration required: The ransomware conducts all activity locally, increasing the likelihood of evading detection strategies that rely on suspicious network traffic. 
  • Aggressive anti-forensics: Artifact removal and self-deletion techniques make detection and recovery particularly challenging. 

Bigger Picture

This campaign highlights how long-standing malware families remain effective when paired with reliable phishing techniques, reinforcing the need for organizations to prioritize endpoint behavior monitoring rather than relying solely on network signals. 

Here’s a link to the full findings: https://www.forcepoint.com/blog/x-labs/phorpiex-global-group-ransomware-lnk-phishing

Leave a Reply

Discover more from The IT Nerd

Subscribe now to keep reading and get access to the full archive.

Continue reading