Live Training | What's New in Lumu Defender

Already have an account? Sign in

Sign in

Malware

S0616

DeathRansom

Type

Malvare

Associated threat actors

Various, Ransomware-as-a-Service (RaaS) affiliates

Key Capabilities

Encrypts files with Salsa20. Deletes volume shadow copies. Operates on an affiliate model.

OS Targeted

Windows

IoCs on Maltiverse

Maltiverse provides updated IoCs for easy SIEM/SOAR/Firewall/EDR integration.

What is DeathRansom?

DeathRansom (S0616) is a ransomware strain. It operates as a Ransomware-as-a-Service (RaaS). When it appeared in 2019, it was ‘scareware’ renaming files but not encrypting them.

That changed quickly. It evolved into a functional threat. Now, it uses the Salsa20 algorithm to lock data. It targets recovery options. It deletes Volume Shadow Copies. This ensures victims cannot restore data without paying. It typically spreads through social engineering or by exploiting weak remote access credentials.

How to Defend Against DeathRansom?

Defending against DeathRansom requires a combination of strict access controls, data redundancy, and network monitoring.

  • Maintain offline backups of critical data. Since DeathRansom targets local shadow copies, offline backups are your only reliable recovery method.
  • Secure Remote Desktop Protocol (RDP) ports. Brute-forcing weak RDP credentials is a common entry point. Lock them down.
  • Deploy endpoint detection. Identify the ransomware payload immediately. Stop the process before it deletes shadow copies.
  • Use network detection (NDR). Spot and block the initial payload download. Detect Command and Control (C2) beacons before encryption begins.
  • Integrate threat intelligence. Stay updated on the latest Indicators of Compromise (IoCs) from DeathRansom affiliates.

Join our pre-day 
workshop waitlist

By clicking “Submit Request” you agree to the Lumu Terms of Service and Privacy Policy.