Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

484+ Articles
115+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. News
  3. Iran Deploys 'Pseudo-Ransomware,' Revives Pay2Key Operations
Iran Deploys 'Pseudo-Ransomware,' Revives Pay2Key Operations
NEWS

Iran Deploys 'Pseudo-Ransomware,' Revives Pay2Key Operations

Iranian APT groups are increasingly blurring the lines between state-sponsored cyber espionage and financially motivated cybercrime, deploying destructive 'pseudo-ransomware' tools and reviving the Pay2Key operation to target high-impact US and Israeli organizations.

Dylan H.

News Desk

March 31, 2026
6 min read

Iranian advanced persistent threat (APT) groups have adopted a new operational posture that deliberately blurs the distinction between state-sponsored disruption and financially motivated cybercrime. According to a Dark Reading report citing recent threat intelligence, Iranian actors are deploying pseudo-ransomware — malware that mimics ransomware to mask destructive wiping operations — while simultaneously reviving the Pay2Key ransomware-as-a-cover operation that first emerged in 2020.

Pseudo-Ransomware: Destruction Disguised as Extortion

The term "pseudo-ransomware" refers to malware that presents victims with ransom demands but has no functional decryption capability. Unlike genuine ransomware where the attacker holds decryption keys to monetize the attack, pseudo-ransomware is a wiper — its true purpose is to permanently destroy data and disrupt operations.

Iranian actors have historically favored destructive cyber operations over ransomware monetization, exemplified by operations like Shamoon (targeting Saudi Aramco in 2012), NotPetya (deployed by Russia, but Iran-linked actors have used similar tactics), and various subsequent wiper campaigns against Israeli and Gulf state targets.

The shift to pseudo-ransomware provides several operational benefits for Iranian APTs:

  • Deniability — a ransomware attack can be attributed to criminal groups, obscuring state involvement
  • Psychological impact — ransom demands add a financial threat on top of operational disruption
  • Intelligence value — victims who attempt to pay reveal financial infrastructure and communication channels
  • Confusion in attribution — cybercrime and espionage reporting pipelines treat incidents differently, potentially delaying the coordinated government response reserved for nation-state attacks

Pay2Key Revival

Pay2Key first appeared in late 2020 when it was used in campaigns against Israeli companies, with victims receiving ransom demands while attackers collected intelligence and caused operational disruption. The campaign was attributed to an Iran-linked group and distinguished itself by targeting Israeli critical infrastructure and defense contractors.

Recent threat intelligence indicates Pay2Key has been revived with updated tooling and expanded targeting, now including US organizations in addition to Israeli targets. The current Pay2Key activity reportedly shares infrastructure and code characteristics with Fox Kitten (also known as UNC757 or Pioneer Kitten), an Iranian group known for exploiting VPN vulnerabilities to establish long-term access to high-value targets.

The revival coincides with heightened geopolitical tensions involving Iran and aligns with observed patterns of Iran using cyber operations to signal capability and intent without crossing the threshold of kinetic conflict.

Target Sectors

Iranian pseudo-ransomware and Pay2Key activity has been observed targeting:

SectorRationale
Defense contractorsIntelligence on military procurement and technology
Critical infrastructureMaximum disruption potential, geopolitical leverage
Financial servicesEconomic impact, intelligence on sanctions evasion
Healthcare organizationsHigh disruption value, pressure for quick resolution
Technology companiesIntellectual property, supply chain positioning

Indicators of Iranian Pseudo-Ransomware Campaigns

Initial Access TTPs

Iranian APT groups targeting organizations for pseudo-ransomware deployment typically gain initial access via:

  1. VPN and edge device exploitation — Iranian groups have historically been quick to weaponize CVEs in Citrix, Pulse Secure, Fortinet, and similar appliances
  2. Password spraying — targeting Microsoft 365, Exchange, and VPN portals with known breach credential lists
  3. Spear-phishing — highly targeted emails against executives and IT administrators with geopolitical lures
  4. Supply chain compromise — using third-party access or compromised managed service providers

Post-Compromise Behavior

Once inside, Iranian actors typically:

1. Establish multiple persistent backdoors (common tools: Ngrok, Frp, custom implants)
2. Conduct extensive reconnaissance — user lists, network topology, backup configurations
3. Identify and access backup systems (to destroy them before ransomware deployment)
4. Laterally move to domain controllers and ESXi hosts for maximum coverage
5. Stage and deploy pseudo-ransomware payload across all accessible systems simultaneously
6. Present ransom demand with cryptocurrency wallet — often never actually capable of decrypting

Differentiating Pseudo-Ransomware from Genuine Ransomware

Security teams can apply several analytical heuristics to distinguish destructive pseudo-ransomware from financially motivated ransomware:

IndicatorGenuine RansomwarePseudo-Ransomware
Decryption test offerUsually providedAbsent or non-functional
Communication channel responsivenessTypically responsiveOften unresponsive or delayed
Ransom amountCalibrated to victim sizeMay be arbitrary or extremely high
Key management infrastructureObservable (ToR sites, key servers)Often absent
Data destruction patternTargeted (valuable files encrypted)Indiscriminate (all data destroyed)
Backup targetingOften spared for leverageActively destroyed

Detection and Defense Recommendations

Monitor for Pre-Ransomware TTPs

The most effective defense against pseudo-ransomware is detecting the intrusion before the destructive payload is deployed. Key indicators to monitor:

# SIEM detection rules for pre-ransomware staging
- rule: VPN authentication from known Iranian IP ranges
- rule: Multiple failed logins followed by success (password spray)
- rule: Enumeration of backup infrastructure from unexpected hosts
- rule: Large-scale file access or staging (potential data collection)
- rule: Disabling or modification of backup agents
- rule: Volume shadow copy deletion (vssadmin delete shadows /all)
- rule: Bulk network share enumeration (net view, ADFind, BloodHound)

Protect Backup Infrastructure

Iranian pseudo-ransomware campaigns specifically target backup systems to prevent recovery. Harden backups:

  • Immutable backups — use write-once storage that cannot be deleted via compromised admin credentials
  • Offline backups — maintain at least one complete backup physically or logically isolated from the network
  • Separate credential domain — backup system administrator credentials must not be accessible from the main AD environment

Patch Edge Devices Immediately

Given Iranian APTs' consistent exploitation of VPN and edge device vulnerabilities:

# Audit exposed services and confirm patch status
# Priority: Citrix NetScaler, Fortinet FortiOS, Ivanti Connect Secure,
#           Palo Alto GlobalProtect, Check Point, SonicWall
 
# Disable any management interfaces exposed to the internet
# Enforce certificate-based authentication for VPN where possible

US Government Guidance

CISA has previously published advisories specific to Iranian cyber activity, including guidance on Fox Kitten TTPs. Security teams at organizations in the targeted sectors should:

  1. Review CISA Alert AA20-259A (Fox Kitten) and related Iranian APT advisories for IOCs
  2. Enroll in CISA's Enhanced Cybersecurity Services (ECS) if eligible
  3. Report suspected Iranian cyber intrusions to CISA (1-888-282-0870) and the FBI Cyber Division

The State Department's $10 million Rewards for Justice program currently offers rewards for information on Iranian government-directed cyberattacks against US critical infrastructure, reflecting the elevated concern about Iranian cyber operations.

Conclusion

The revival and evolution of Iranian pseudo-ransomware operations represents a calculated strategy by Iranian APT groups to maintain plausible deniability for destructive cyber operations while maximizing strategic impact. For defenders, the critical insight is that a ransomware note does not mean a ransomware actor — the same destructive tools and TTPs can serve state disruption objectives just as easily as criminal monetization. Organizations in high-risk sectors must treat high-impact ransomware incidents with the same urgency as potential nation-state intrusions until attribution is established.


Source: Dark Reading — March 31, 2026

#Ransomware#APT#Iran#Cybercrime#Nation-State#Pay2Key#Wiper

Related Articles

Stolen Logins Are Fueling Everything From Ransomware to Nation-State Cyberattacks

A new report reveals how industrialized credential theft has become the common thread connecting ransomware campaigns, SaaS platform breaches, and geopolitical espionage operations, shifting the security industry's focus from perimeter prevention to detecting misuse of legitimate access.

5 min read

Leak Bazaar: New Criminal Service Plans to Monetize Data Stolen by Ransomware Gangs

A new underground platform called Leak Bazaar positions itself as a data-processing business, offering to monetize stolen records on behalf of ransomware operators rather than simply hosting leak dumps.

4 min read

State Department Reissues $10 Million Reward for Info on Iranian Hackers

Hours after the FBI confirmed that Iranian hackers gained access to Director Kash Patel's personal email account, the U.S. State Department reissued a $10 million reward through its Rewards for Justice program for information on Iranian cyber actors responsible for attacks on U.S. critical infrastructure.

6 min read
Back to all News