Threat intelligence

NightSpire Ransomware Encrypts Cloud-Stored OneDrive Files

by Security News

This week, the SonicWall Capture Labs threat research team analyzed a ransomware variant known as NightSpire. While its behavior is typical of most ransomware—encrypting user files and providing recovery instructions via a text file—what makes NightSpire especially concerning is its rapid growth. First surfacing in March of this year, the malware now claims to have infected more than 45 organizations globally.

Infection Cycle

The malware arrives as a portable executable written in Go.

Fig1.GoStrings.png
Figure 1: References to Go in the binary strings.

Once executed, it immediately opens a console window using conhost.exe and begins listing all system directories and files as it searches for content to encrypt.

Fig2.Consolewindow.png
Figure 2: Console window showing system files and directories.

Encrypted files are appended with the .nspire file extension.

Fig3.encryptedfiles.png
Figure 3: Example of encrypted files with the .nspire extension.

A file named readme.txt is created in every directory containing encrypted files. This ransom note includes instructions on how to contact the cybercriminals and emphasizes that even files stored on OneDrive have been compromised.

Fig4.ransomreadme.png
Figure 4: Ransom note in readme.txt.

The threat actors host a blog on the Tor network that functions as an announcement page, featuring updates from the ransomware group.

Fig5.nightspireblog.png
Figure 5: NightSpire blog homepage on the onion site.

A section of the blog lists all known victims, with the most recent being a facility services organization in Spain.

Fig6.victimlist.png
Figure 6: Victim listing on the ransomware group’s blog.

Companies that refuse to negotiate or pay the ransom find their stolen data published in this section of the portal. The site includes view tracking and a preview of the leaked data, along with instructions for purchasing it.

Fig7.datapreview.png
Figure 7: Preview of leaked data from the group’s latest victim.

As of now, the group appears to operate privately, according to their “About” page. However, given the pace of their growth, it would not be surprising to later discover the existence of affiliates operating internationally.

Fig8.Aboutnspire.png
Figure 8: About page from the NightSpire blog.

SonicWall Protections

SonicWall Capture Labs provides protection against this threat via the following signature:

  • GAV: NightSpire.RSM (Trojan)

This threat is also detected by SonicWall Capture ATP with RTDMI, as well as the Capture Client endpoint protection solutions.

Share This Article

An Article By

Security News

The SonicWall Capture Labs Threat Research Team gathers, analyzes and vets cross-vector threat information from the SonicWall Capture Threat network, consisting of global devices and resources, including more than 1 million security sensors in nearly 200 countries and territories. The research team identifies, analyzes, and mitigates critical vulnerabilities and malware daily through in-depth research, which drives protection for all SonicWall customers. In addition to safeguarding networks globally, the research team supports the larger threat intelligence community by releasing weekly deep technical analyses of the most critical threats to small businesses, providing critical knowledge that defenders need to protect their networks.

Related Articles

  • Critical SysAid XXE Vulnerabilities Expose Systems to Remote Exploitation (CVE-2025-2775–2777)
    Read More
  • LCRYX Ransomware Utilizes Weak Encryption, Demands $500 Bitcoin Payment
    Read More