CyberXtron
215 Victims and Growing: NightSpire’s Rapid Rise in the Ransomware Landscape
NightSpireRansomwareRaaSThreatAdvisoryThreatIntelCybersecurity

215 Victims and Growing: NightSpire’s Rapid Rise in the Ransomware Landscape

Executive Summary

NightSpire is an active ransomware operation first observed in February 2025, with at least 215 victims across North America, Europe, Asia-Pacific, the Middle East, and Africa. Likely a rebrand of the earlier Rbfs ransomware operation, the group employs a double-extortion strategy—combining data theft with file encryption—and operates dedicated data leak sites (DLS) on the dark web to pressure victims through public exposure and countdown timers. NightSpire demonstrates globally distributed, opportunistic targeting, with the highest concentration of victims in the United States and notable activity across APAC and Europe, primarily impacting manufacturing, technology, and healthcare sectors, while a significant proportion of victims remain unattributed.

Threat Profile

Group Overview

NightSpire first appeared on February 17, 2025, and remains active as of the time of creation of this report, with 215 victims listed on its leak site. The group employs a double-extortion model, encrypting victim data while simultaneously threatening to leak stolen information if ransom demands are not met. Targets are overwhelmingly concentrated among small to mid-size enterprises (SMEs) lacking mature security programs.

Attribution evidence strongly suggests NightSpire is a rebrand of the Rbfs ransomware operation. Shared infrastructure, overlapping victims listed on both groups' leak sites, and the simultaneous cessation of Rbfs activity coinciding with NightSpire's launch support this assessment.

Operational Characteristics

NightSpire's attacks follow a structured three-phase lifecycle: initial access via exploitation of public-facing infrastructure, lateral movement and credential harvesting using LOLBins, and a staged exfiltration-then-encryption chain. The Go-based payload uses RC4 and XOR obfuscation and implements a hybrid encryption strategy — block-level encryption for large files and full encryption for all others — with extended sleep intervals between operations to evade real-time detection. Notably, NightSpire also encrypts files stored in OneDrive cloud storage without altering file extensions, making cloud-side compromise significantly harder to detect.

Victimology

Overview

  • Total Victims: 215

  • Countries Affected: 48+

  • Active Since: Feb 2025 (~13 months)

  • Leak Site: Active

Geographical Distribution

NightSpire has a strongly global victimology, spanning North America, Europe, Asia-Pacific, the Middle East, Latin America, and Africa. The United States accounts for the largest share with 51 confirmed victims, reflecting the group's opportunistic exploitation of exposed SME infrastructure in high-value Western economies. Significant APAC targeting is evident, with India (10), Taiwan (9), Hong Kong (8), and Japan (6) among the most affected. European targets are widely distributed across France, Germany, Spain, the United Kingdom, and Italy. A further 34 victims lacked confirmed country attribution.

Sector Targeting

Among identified industries, Manufacturing leads with 20 confirmed victims, followed closely by Technology (18) and Healthcare (16). Construction (11) and Business Services (10) represent a notable focus on operational sectors often characterized by weaker cybersecurity postures. Transportation/Logistics (9), Public Sector (7), Consumer Services (7), and Financial Services (6) round out the top verticals. A significant portion — 90 victims — lacked sector attribution, suggesting either limited victim disclosure or incomplete intelligence visibility. The overall distribution reflects opportunistic rather than sector-specific targeting.

Technical Analysis

Initial Access and Foothold

NightSpire's primary and most documented initial access vector is exploitation of CVE-2024-55591, a critical authentication bypass vulnerability in Fortinet FortiOS and FortiProxy. The flaw allows unauthenticated attackers to obtain super-admin privileges via crafted requests. Active exploitation occurred even before public disclosure.

Secondary access vectors include:

  • RDP brute-force and credential stuffing

  • Phishing campaigns

  • MFA fatigue attacks

  • Exploitation of other vulnerable appliances

  • MSP compromise

Privilege Escalation, Defense Evasion, and Persistence

Following initial access, operators perform reconnaissance using tools like Everything.exe and Advanced IP Scanner, then escalate privileges using Mimikatz.

Key techniques include:

  • LOLBins (PowerShell, PsExec, WMI)

  • Obfuscation (RC4/XOR)

  • Registry persistence (Run keys)

  • Scheduled tasks

  • AnyDesk deployment

  • Account creation on compromised systems

Lateral Movement, Exfiltration, and Encryption

Lateral movement methods:

  • RDP

  • SMB / PsExec

  • WMI

Attack sequence:

  1. Staging — File discovery and staging

  2. Archiving — Compression using 7-Zip

  3. Exfiltration — WinSCP, MEGACmd, Rclone

  4. Encryption — .nspire extension + ransom note

Encryption:

  • Hybrid AES-256 + RSA-2048

  • Block-level encryption for large files

  • OneDrive files encrypted without extension change

Data Leak Site (DLS)

6bdfbe235b03c7ee7df7dad909534606.png

Ransom Note

8685d42cce713a2bf839949fbf003155.png

60090f83c41e3c3559793ce7fb18136e.png

MITRE ATT&CK TTPs

Tactic

Technique ID

Technique Name

Resource Development

T1587

Develop Capabilities

Resource Development

T1587.001

Develop Capabilities: Malware

Initial Access

T1190

Exploit Public-Facing Application (CVE-2024-55591)

Initial Access

T1078

Valid Accounts

Initial Access

T1110

Brute Force (RDP credential stuffing, MFA fatigue)

Initial Access

T1566

Phishing

Execution

T1059

Command and Scripting Interpreter: PowerShell / Windows Command Shell

Execution

T1072

Software Deployment Tools (PsExec, WinSCP, MEGACmd, 7-Zip)

Persistence

T1136

Create Account (FortiGate admin accounts)

Persistence

T1547.001

Boot or Logon Autostart Execution: Registry Run Keys / Startup Folder

Persistence

T1053

Scheduled Task/Job

Privilege Escalation

T1068

Exploitation for Privilege Escalation (FortiOS super-admin via CVE-2024-55591)

Defense Evasion

T1036

Masquerading (renamed processes, legitimate tool abuse)

Defense Evasion

T1218

System Binary Proxy Execution (LOLBins)

Defense Evasion

T1027

Obfuscated Files or Information (RC4/XOR payload obfuscation)

Defense Evasion

T1070

Indicator Removal (log manipulation, temp file cleanup)

Credential Access

T1003

OS Credential Dumping (Mimikatz)

Credential Access

T1003.001

OS Credential Dumping: LSASS Memory

Credential Access

T1552

Unsecured Credentials

Discovery

T1046

Network Service Discovery (Advanced IP Scanner)

Discovery

T1057

Process Discovery

Discovery

T1082

System Information Discovery

Discovery

T1083

File and Directory Discovery (Everything.exe)

Lateral Movement

T1021.001

Remote Services: Remote Desktop Protocol

Lateral Movement

T1021.002

Remote Services: SMB/Windows Admin Shares (PsExec)

Lateral Movement

T1047

Windows Management Instrumentation (WMI)

Collection & Exfiltration

T1119

Automated Collection

Collection & Exfiltration

T1560.001

Archive Collected Data: Archive via Utility (7-Zip)

Collection & Exfiltration

T1567.002

Exfiltration Over Web Service: Exfiltration to Cloud Storage (MEGACmd, Rclone)

Command & Control

T1071

Application Layer Protocol: Web Protocols

Command & Control

T1219

Remote Access Software (AnyDesk)

Impact

T1486

Data Encrypted for Impact (.nspire extension; hybrid AES-256/RSA-2048)

Indicators of Compromise

SHA-256:

  • e275b8a02bf23b565bdaabadb220b39409eddc6b8253eb04e0f092d697e3b53d
  • 4cda6af63873eca99b9a0b69be1c8b9c81b501339f569a30fd30394fa54da3e1

  • d5f9595abb54947a6b0f8a55428ca95e6402d2aeb72cbc109beca457555a99a6

  • 32e10dc9fe935d7c835530be214142041b6aa25ee32c62648dea124401137ea5

E-Mail Address:

  • night[.]spire[.]team[@]gmail[.]com
  • night[.]spire[.]team[@]proton[.]me

  • night[.]spire[.]team[@]onionmail[.]org

  • nightspireteam[.]receiver[@]proton[.]me

  • nightspireteam[.]receiver[@]onionmail[.]org

Mitigations & Recommendations

1. Patch Management & Perimeter Security

  • Apply patches for FortiOS/FortiProxy appliances immediately, prioritizing CVE-2024-55591

  • Restrict management-plane access using VPNs, IP allow-listing, and disable direct internet exposure

  • Regularly assess external attack surface to identify exposed RDP, VPN, and web services

2. Identity & Access Security

  • Enforce multi-factor authentication (MFA) for all remote and administrative access

  • Implement strong password policies and monitor for brute-force or credential-stuffing attacks

  • Audit privileged accounts regularly and enforce least-privilege access (RBAC)

3. Network Segmentation & Lateral Movement Control

  • Segment critical systems and restrict RDP, SMB, and WMI access to controlled hosts

  • Limit east-west traffic using firewall rules and network access controls

  • Monitor for anomalous lateral movement (e.g., unusual RDP sessions, PsExec activity)

4. Endpoint Protection & Behavioral Detection

  • Deploy EDR/XDR to detect LOLBin abuse (PowerShell, PsExec, WMI)

  • Monitor execution of tools like WinSCP, MEGACmd, Rclone, and 7-Zip on servers

  • Create alerts for abnormal processes, registry persistence, and large outbound data transfers

5. Data Protection & Backup Strategy

  • Maintain offline, immutable backups isolated from production environments

  • Regularly test backup restoration to ensure recovery readiness

  • Monitor for large-scale data staging, compression, and exfiltration activity

6. Threat Detection & Intelligence Integration

  • Integrate IOCs and MITRE ATT&CK mappings into SIEM/XDR systems

  • Conduct threat hunting for early indicators like FortiGate compromise and credential abuse

  • Monitor evolving ransomware infrastructure using threat intelligence feeds

7. Security Awareness & Incident Preparedness

  • Train users to recognize phishing and credential theft attempts

  • Develop and rehearse ransomware-specific incident response plans

  • Coordinate with external IR teams and legal authorities for rapid response

Conclusion

NightSpire has rapidly established itself as a persistent and globally active ransomware threat within approximately 13 months of emergence. With over 215 victims across more than 48 countries, the group poses a significant risk to SMEs worldwide.

Despite operational weaknesses, its reliance on legitimate administrative tools makes detection difficult. Organizations must focus on:

  • Patch management

  • Identity security

  • Behavioral monitoring

  • Backup resilience

The most effective defense remains early detection of pre-encryption activity, particularly FortiGate compromise and data exfiltration behaviors.

Elevate your security—get curated threat insights in your inbox.

215 Victims and Growing: NightSpire’s Rapid Rise in the Ransomware Landscape | CyberXTron Blog