Threat intelligence

Nova RaaS: The Ransomware That ‘Spares’ Schools and Nonprofits—For Now

by Security News

A new ransomware group calling themselves Nova RaaS, or ransomware-as-a-service, has been active for the past month distributing RaLord ransomware. On their blog, they claim to have no affiliations with other cybercriminal groups—and, in a surprising twist, say they’ve pledged not to target schools or nonprofit organizations.

Infection Cycle

This ransomware arrives as an executable file written in Rust.

Fig1.writteninrust.png
Figure 1: File strings showing references to Rust crates or libraries

It opens a console window using conhost.exe and begins scanning the system for files to encrypt. This ransomware program is so novice that it even tries to encrypt itself.

Fig2.openswindow.png
Figure 2: Console window showing ransomware execution

It creates a readme text file affixed with random characters.

Fig3.writetxtfile.png
Figure 3: Malware creating a txt file on the system

This readme contains the ransom note with instructions on how to recover the files. However, the ransom note does not mention a fixed ransom amount like most ransomware notes. Instead, it lists a qTox ID where the victim can contact the cybercriminals to negotiate.

Fig4.ralordransomnote.png
Figure 4: Ransom note

It appends “.ralord” to all encrypted files.

Fig5.ralordsuffix.png
Figure 5: Encrypted files with “.ralord” suffix

RaLord’s onion website reveals their latest victim, including details on how much data was exfiltrated and how many days remain until the victim’s data will be published—presumably if no payment is received.

Fig6.blog_latestvictim.png
Figure 6: RaLord’s blog showing latest victim

In the “News” section of their blog, they announced they will no longer target schools and nonprofit organizations beginning in April. In fact, one of their earlier victims was a school, which is now marked as “unlisted.”

Fig7.victimremoved.png
Figure 7: News section showing removal of a previous victim from the list

The ransomware blog also documents recent updates and improvements to the program, demonstrating how the group continues to refine their techniques and add new features.

Fig8.latestupdate.png
Figure 8: Latest updates and features of the ransomware program

A detailed explanation of how their ransomware-as-a-service offering works—and how to partner with them—is also provided on their onion site.

Fig9.howtoitworks.png
Figure 9: Explaining how their RaaS works

SonicWall Capture Labs provides protection against this threat via the following signature:
• GAV:RALord.RSM (Trojan)

This threat is also detected by SonicWall Capture ATP with RTDMI™ and the Capture Client endpoint solutions.

Share This Article

An Article By

Security News

The SonicWall Capture Labs Threat Research Team gathers, analyzes and vets cross-vector threat information from the SonicWall Capture Threat network, consisting of global devices and resources, including more than 1 million security sensors in nearly 200 countries and territories. The research team identifies, analyzes, and mitigates critical vulnerabilities and malware daily through in-depth research, which drives protection for all SonicWall customers. In addition to safeguarding networks globally, the research team supports the larger threat intelligence community by releasing weekly deep technical analyses of the most critical threats to small businesses, providing critical knowledge that defenders need to protect their networks.

Related Articles

  • Critical CrushFTP Authentication Bypass (CVE-2025-31161) Exposes Servers to Remote Attacks
    Read More
  • Microsoft Security Bulletin Coverage for April 2025
    Read More