Black friday Up to 3 extra licenses FOR FREE + Special offer for TI LOOKUP Get it now
Webinar
February 26
Better SOC with Interactive Sandbox Practical Use Cases
Register now

INC Ransomware

119
Global rank
88 infographic chevron month
Month rank
104 infographic chevron week
Week rank
0
IOCs

INC Ransomware is a ransomware-as-a-service (RaaS) spotted in mid-2023. It targets industries like retail, real estate, finance, healthcare, and education, primarily in the U.S. and UK. It encrypts and exfiltrates data demanding a ransom. It employs advanced evasion techniques, destroys backup, and abuses legitimate system tools at all the stages of the kill chain.

Ransomware
Type
Unknown
Origin
1 May, 2023
First seen
28 January, 2026
Last seen

How to analyze INC Ransomware with ANY.RUN

Type
Unknown
Origin
1 May, 2023
First seen
28 January, 2026
Last seen

IOCs

Last Seen at

Recent blog posts

post image
SOC & Business Success with ANY.RUN: Real...
watchers 1016
comments 0
post image
Attackers Are Taking Over Real Email Threads...
watchers 3743
comments 0
post image
Fix Staff Shortage & Burnout in Your SOC...
watchers 882
comments 0

What is INC Ransomware?

INC Ransomware is a ransomware-as-a-service (RaaS) operated by the INC Ransom group that emerged in 2023. In mid-2024, its source code leaked to dark web and became a foundation of Lynx ransomware, the latter often referred to as “rebranding” or a variant of the former. Both employ double extortion, encrypting victims' data and threatening to leak it unless ransoms are paid.

INC Ransomware uses multiple vectors to infiltrate networks, leveraging both technical exploits and social engineering. These include phishing emails with malicious attachments or links to compromised websites, network access credentials acquired from IABs, malvertising and drive-by downloads, software vulnerabilities. INC Ransomware is used in supply chain attacks targeting third-party vendors or service providers to infiltrate larger networks (SolarWinds attack).

Once in the network, it performs privilege escalation using tools like WinPEAS and starts lateral movement using Cobalt Strike, PsExec, Mimikatz, and the like. It exfiltrates data before encrypting it with a strong algorithm (likely AES + RSA) and leaves a ransom note with payment instructions.

INC Ransom’s evasion techniques include: fileless execution, custom packers and obfuscation, delayed execution. Its living-off-the-land tactic implies the use of legitimate tools like PowerShell, WMI, and PsExec to blend in. The malware exploits SystemSettingsAdminFlows.exe to modify registry keys and disable Windows Defender.

Get started today for free

Analyze malware and phishing in a fully-interactive sandbox

Create free account

INC Ransom’s Prominent Features

INC Ransomware possesses significant risks since it:

  • Targets Critical Infrastructure: healthcare, finance, and retail, where disruptions can endanger lives, financial stability, or supply chains. Attacks on vendors (e.g., Toppan Next Tech affecting DBS and Bank of China) amplify impact across multiple organizations.
  • Demands Large Ransom Sums: they often reach millions with INC, Lynx escalating them further.
  • Abuses Legacy Systems: INC exploits unpatched or unsupported software, common in healthcare and industrial sectors.
  • Uses Double Extortion: combining encryption with data leaks increases pressure on victims to pay. Leaked data can lead to regulatory fines (e.g., GDPR, HIPAA) and reputational damage.
  • Acts fast: critical files are encrypted quickly, disrupting operations.

INC Ransom’s Execution Process and Technical Details

Let us follow the execution chain of INC by detonating it in the safe environment of ANY.RUN’s Interactive Sandbox and view the processes and artifacts it inducts.

View the analysis of an INC Ransomware sample.

INC Ransomware analysis in ANY.RUN Sandbox INC Ransomware sample in action in ANY.RUN's Interactive Sandbox

INC ransomware typically gains its initial foothold through phishing, exploitation of unpatched vulnerabilities, or credentials bought from Initial Access Brokers. Once inside, the operators run reconnaissance with commercial red-team tools and built-in Windows utilities to map the network and collect additional credentials.

They pivot laterally using living-off-the-land binaries — such as Notepad, WordPad, and others — to review files while blending in with normal activity. Next, they disable or terminate security software, backup agents, and database services via Service Control Manager APIs and custom “security-killer” tools.

Before encryption, INC tests write access by creating and truncating dummy data on target files; if files are locked, it kills the owning processes or escalates privileges to force access. Operators may also archive data with 7-Zip and exfiltrate it to cloud storage, setting the stage for double extortion. The malware then encrypts all local, mounted, and hidden volumes with AES, offering multiple modes that trade speed for thoroughness.

Finally, it drops ransom notes in .txt and .xps formats and replaces the desktop wallpaper with payment instructions and threats to leak stolen data if the ransom is ignored.

Use ANY.RUN free for 14 days

Try the full power of interactive analysis

Start your free trial

What are the best-known INC attacks?

  • British Library (October 2023). One of the first major cultural institutions attacks by INC Ransom. Massive data breach (~500 GB of data leaked, including employee passports, financial records), encryption disrupted online services for weeks.
  • Yakult Australia (December 2023). About a million dollars in Bitcoin were demanded from a major beverage company for stolen corporate data (financial records, employee details).
  • A city government in Germany (March 2024). Citizen services paralyzed (tax, permits, public records); sensitive documents leaked (court cases, personal IDs). Ransom payment refusal led to prolonged recovery.
  • A major oil & gas company in Brazil (April 2024). Operational disruption (delayed shipments, refinery issues); stolen blueprints and contracts leaked. Ransom demand exceeded $5 million.

Gathering Threat Intelligence on INC Ransom

Even when two strains are as closely related as are INC Ransomware and Lynx, you can gather actionable intelligence on them separately using ANY.RUN’s services and analyze their differences and similarities to get a better understanding of malware evolution and to ensure the protection of your own system.

Start with searching by malware’s name via ANY.RUN’s Threat Intelligence Lookup to research more public sample analyses and gather IOCs for tuning your security systems.

threatName:"INC"

INC Ransomware public analyses Fresh INC samples analyzed in the sandbox

Integrate ANY.RUN’s threat intelligence solutions in your company

Contact us

Conclusion

INC Ransomware is a dangerous RaaS using phishing, exploits, and LOTL techniques to infiltrate networks, evade detection, and turn to double extortion. It’s particularly threatening to healthcare, finance, and retail due to its disruptive potential and high ransom demands. Detection relies on EDR, behavioral analysis, and TI-driven IOCs, while countermeasures include zero-trust, backups, and patching.

Threat intelligence is critical for tracking its evolving TTPs and predicting variants like Lynx. Organizations should prioritize proactive defenses and TI integration to stay ahead of this adaptable threat.

Start with 50 requests in TI Lookup to collect IOCs on INC Ransom

HAVE A LOOK AT

Bert Ransomware screenshot
Bert Ransomware is a newly emerged ransomware group that has been active since April 2025. It deploys variants targeting both Windows and Linux systems, focusing on critical sectors like healthcare, technology, and event services across the US, Asia, and Europe.
Read More
DEVMAN screenshot
DEVMAN
devman
DEVMAN is a fast-evolving malware family targeting Windows environments with a mix of credential theft, remote control capabilities, and persistence techniques typical of modern crimeware. Initially observed in early 2025, DEVMAN quickly became a favorite tool among cybercriminal groups thanks to its stealth, modular structure, and ability to bypass traditional AV solutions.
Read More
Netwalker screenshot
Netwalker
netwalker ransomware
Netwalker is ransomware — it belongs to a malware family which encrypts files and demands users to pay a ransom to get their data back. Netwalker utilizes several sophisticated techniques, such as process hollowing and code obfuscation to target corporate victims.
Read More
DoubleTrouble screenshot
DoubleTrouble
doubletrouble
DoubleTrouble is a new-generation Android malware designed to quietly infiltrate mobile devices, harvest sensitive data, hijack financial operations, and maintain long-term persistence. Unlike commodity Android trojans, it blends advanced evasion, dual-stage infection, and dynamic payload updates, making it a rising mobile threat for both consumers and organizations.
Read More
DragonForce screenshot
DragonForce
dragonforce
DragonForce is a ransomware strain operating under the Ransomware-as-a-Service (RaaS) model. First reported in December 2023, it encrypts files with ChaCha8, renames them with random strings, and appends “.dragonforce_encrypted.” By disabling backups, wiping recovery, and spreading across SMB shares, DragonForce maximizes damage and pressures victims into multimillion-dollar ransom negotiations. It has targeted manufacturing, construction, IT, healthcare, and retail sectors worldwide, making it a severe threat to modern enterprises.
Read More
Balada Injector screenshot
Balada Injector is a long-running malware campaign that targets WordPress websites by exploiting vulnerabilities in plugins and themes. The attackers inject malicious code into compromised sites, leading to unauthorized redirects, data theft, and the creation of [backdoors](https://any.run/malware-trends/backdoor) for persistent access. The campaign operates in waves, with spikes in activity observed every few weeks, continually adapting to exploit newly discovered vulnerabilities.
Read More