GLOBAL GROUP's Golang Ransomware Attacks Windows, Linux, and macOS Environments

However, forensic analysis conducted by Picus Security Labs researchers revealed that GLOBAL GROUP is not an entirely new threat family but rather a sophisticated rebranding of existing ransomware operations. Through detailed examination of malware samples, infrastructure configurations, and operational patterns, analysts identified clear connections to the defunct Mamona RIP and Black Lock ransomware families, suggesting continuity rather than innovation in the threat landscape. In June 2025, a ransomware actor operating under the alias “Dollar Dollar Dollar” introduced GLOBAL GROUP on the Ramp4u cybercrime forum, marketing it as a cutting-edge Ransomware-as-a-Service (RaaS) platform. The malware represents a significant evolution in ransomware development, utilizing Golang programming language to create monolithic binaries capable of executing seamlessly across Windows, Linux, and macOS environments. This algorithm selection demonstrates the operators’ commitment to implementing robust encryption that resists cryptanalysis while maintaining operational efficiency during large-scale file processing operations. A sophisticated new ransomware threat has emerged from the cybercriminal underground, targeting organizations across multiple operating systems with advanced cross-platform capabilities. The reuse of such specific technical markers demonstrates that GLOBAL GROUP represents an evolution of proven attack methodologies rather than ground-up development. This multi-platform approach allows threat actors to target diverse IT infrastructures within a single attack campaign, maximizing their potential victim pool and operational efficiency. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. The group promised affiliates scalable operations with automated negotiations, cross-platform payloads, and generous profit-sharing arrangements that could appeal to cybercriminals seeking reliable monetization opportunities. The choice of Golang reflects current industry trends where attackers leverage the language’s concurrency model and static linking capabilities to accelerate encryption processes at unprecedented scale. The malware uses specific function calls to assemble victim communication messages, including embedded Tor network addresses for accessing leak sites and negotiation portals. This integration demonstrates the operators’ focus on streamlining the extortion process while maintaining operational security through anonymized communication channels. The ransomware binary contains a distinctive mutex string “Global\Fxo16jmdgujs437” that prevents multiple simultaneous executions of the ransomware process. GLOBAL GROUP employs the ChaCha20-Poly1305 encryption algorithm, a contemporary choice that provides both confidentiality and message integrity verification. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news. This identical mutex was previously identified in Mamona RIP ransomware samples, indicating direct codebase inheritance rather than coincidental similarity. Each encrypted file receives a custom extension defined by individual affiliates, such as “.lockbitloch,” while filenames themselves are often encrypted to further complicate recovery efforts without proper decryption keys.

This Cyber News was published on cybersecuritynews.com. Publication date: Tue, 22 Jul 2025 08:35:12 +0000


Cyber News related to GLOBAL GROUP's Golang Ransomware Attacks Windows, Linux, and macOS Environments

10 Best Ransomware Protection Tools - 2025 - It protects devices from ransomware and other cyber threats using advanced threat intelligence, behavioral analysis, and cloud-based technology. It monitors and prevents ransomware assaults on personal files and automatically restores encrypted ...
9 months ago Cybersecuritynews.com
10 Best Ransomware File Decryptor Tools in 2025 - Kaspersky Rakhni Decryptor contains different decryption tools based on various versions of Rakhni ransomware and helps you decrypt encrypted files on your system. PyLocky Ransomware Decryption Tool is a free and open source developed and released by ...
8 months ago Cybersecuritynews.com
Key Group uses leaked builders of ransomware and wipers | Securelist - The first discovered sample of Key Group, the Xorist ransomware, established persistence in the system by changing file extension associations. The .huis_bn extension added to encrypted files in the early versions of Key Group samples, Xorist and ...
1 year ago Securelist.com
25 Best Managed Security Service Providers (MSSP) - 2025 - Pros & Cons: ProsConsStrong threat intelligence & expert SOCs.High pricing for SMBs.24/7 monitoring & rapid incident response.Complex UI and steep learning curve.Flexible, scalable, hybrid deployments.Limited visibility into endpoint ...
5 months ago Cybersecuritynews.com
GLOBAL GROUP's Golang Ransomware Attacks Windows, Linux, and macOS Environments - However, forensic analysis conducted by Picus Security Labs researchers revealed that GLOBAL GROUP is not an entirely new threat family but rather a sophisticated rebranding of existing ransomware operations. Through detailed examination of malware ...
5 months ago Cybersecuritynews.com LockBit
9 Best DDoS Protection Service Providers for 2024 - eSecurity Planet content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. One of the most powerful defenses an organization can employ against distributed ...
2 years ago Esecurityplanet.com
The Top 10 Ransomware Groups of 2023 - This article takes an in-depth look at the rise in ransomware attacks over the past year and the criminal groups driving the surge in cyber extortion. LockBit has established itself as one of the most notorious ransomware operations since emerging on ...
1 year ago Securityboulevard.com TA505 8base LockBit BianLian Medusa Noescape Black Basta
Hive Ransomware: A Detailed Analysis - This past week, on January 26th, to be exact, the FBI successfully shut down the Hive ransomware group and saved victims over a hundred million dollars in ransom payments and remediation costs. As ransomware continues to be a national security threat ...
2 years ago Heimdalsecurity.com LockBit
Chinese Hackers Turn To Golang For Malware - Chinese hackers are increasingly turning to the open-source programming language Golang to maliciously code and launch new cyberattacks. According to the latest analysis by The Hacker News, this has resulted in an increase in the number of cyber ...
2 years ago Thehackernews.com BlackTech Carbanak
CVE-2024-36886 - In the Linux kernel, the following vulnerability has been resolved: ...
1 year ago
NCC Group records the most ransomware victims ever in 2023 - While coordinated law enforcement action and government initiatives helped in the fight against ransomware last year, NCC Group still recorded an 84% increase in attacks during 2023. The report included data from NCC Group's Cyber Incident Response ...
1 year ago Techtarget.com Rocke 8base LockBit BianLian Medusa
Top 10 Notorious Ransomware Gangs of 2023 - By employing a multitude of advanced techniques like double extortion along with other illicit tactics, ransomware groups are continually evolving at a rapid pace. Here below, we have mentioned all the types of ransomware used by the threat actors ...
1 year ago Cybersecuritynews.com LockBit BianLian Everest Ragnar Locker Black Basta
CVE-2022-50280 - In the Linux kernel, the following vulnerability has been resolved: ...
3 months ago
The year of Mega Ransomware attacks with unprecedented impact on global organizations - A Staggering 1 in every 10 organizations worldwide hit by attempted Ransomware attacks in 2023, surging 33% from previous year, when 1 in every 13 organisations received ransomware attacks Throughout 2023, organizations around the world have each ...
1 year ago Blog.checkpoint.com
Ransomware's Impact May Include Heart Attacks, Strokes & PTSD - First-order harms: Direct targets of ransomware attacks. The increasing convergence of IT and OT leave physical infrastructures more vulnerable to ransomware, even though most ransomware operators lack the capability to directly compromise OT or ...
1 year ago Techrepublic.com
Medusa Ransomware Turning Your Files into Stone - Unit 42 Threat Intelligence analysts have noticed an escalation in Medusa ransomware activities and a shift in tactics toward extortion, characterized by the introduction in early 2023 of their dedicated leak site called the Medusa Blog. The Unit 42 ...
1 year ago Unit42.paloaltonetworks.com Medusa
Ransomware in 2023 recap: 5 key takeaways - This provides the best overall picture of ransomware activity, but the true number of attacks is far higher. While some ransomware trends hardly changed over the last year, such as LockBit's continued dominance, ransomware criminals also challenged ...
1 year ago Malwarebytes.com Scattered Spider LockBit
Vulnerability Summary for the Week of March 4, 2024 - Published 2024-03-06 CVSS Score not yet calculated Source & Patch Info CVE-2023-52584416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67 PrimaryVendor - ...
1 year ago Cisa.gov
The Week in Ransomware - An international law enforcement operation claims to have dismantled a ransomware affiliate operation in Ukraine, which was responsible for attacks on organizations in 71 countries. The threat actors are said to be affiliates of numerous ransomware ...
2 years ago Bleepingcomputer.com Qilin Cactus Black Basta
Ransomware trends and recovery strategies companies should know - Ransomware attacks can have severe consequences, causing financial losses, reputational damage, and operational disruptions. The methods used to deliver ransomware vary, including phishing emails, malicious websites, and exploiting vulnerabilities in ...
2 years ago Helpnetsecurity.com
Ukraine Hit by New GoLang Based Ransomware Attack - A new ransomware attack has recently hit Ukraine, employing the GoLang programming language to cause significant disruptions to its powerful business and government entities. The ransomware, which is said to be able to take control of victim’s ...
2 years ago Thehackernews.com
Ransomware Roundup - The Ransomware Roundup report aims to provide readers with brief insights into the evolving ransomware landscape and the Fortinet solutions that protect against those variants. This edition of the Ransomware Roundup covers the 8base ransomware. 8base ...
1 year ago Feeds.fortinet.com 8base
Vulnerability Summary for the Week of March 11, 2024 - Published 2024-03-15 CVSS Score not yet calculated Source & Patch Info CVE-2021-47111416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67416baaa9-dc9f-4396-8d5f-8c081fb06d67 PrimaryVendor - Product linux - linux Description In the ...
1 year ago Cisa.gov
Optimizing Cybersecurity: How Hackers Use Golang Source Code Interpreter to Evade Detection - Hackers have been upping the stakes when it comes to executing cyberattacks, and an increasingly popular tool in their arsenal is the Golang source code interpreter. Reportedly, the interpreter is used to obfuscate code, thus making it harder for ...
2 years ago Bleepingcomputer.com
GoResolver - A New Tool to Analyze Golang Malware - Security researchers consistently encounter malicious binaries written in Golang that deliberately employ obfuscation tools like Garble to hinder analysis. The tool represents a significant advancement in the ongoing arms race between malware ...
8 months ago Cybersecuritynews.com