mor3intel logo
mor3intelThreat Intelligence
DashboardVictimsGroupsCountriesStatsATT&CKRulesIOC Lookup
InstagramTelegram
5 Active Threats
Back to Dashboard

INC Ransom

active

Also known as: INC Ransomware

INC Ransom is a ransomware operation that emerged in mid-2023, known for exploiting Citrix NetScaler vulnerabilities (Citrix Bleed) and targeting healthcare organizations. They operate a leak site and use double extortion.

First Seen

2023-07

Last Activity

2025-01

Target Regions

2 regions

Industries

4 sectors

HealthcareEducationGovernmentTechnology
Attack Chain (MITRE ATT&CK)
Visual representation of the attack phases and techniques used by INC Ransom

Click on a phase to view details and MITRE ATT&CK technique IDs

Tactics & Techniques
MITRE ATT&CK mapped tactics and techniques used by this threat actor
Technique IDNameTacticDescriptionReference
T1190Exploit Public-Facing ApplicationInitial AccessCitrix Bleed (CVE-2023-4966) exploitationMITRE
T1486Data Encrypted for ImpactImpactEncryption with .INC extensionMITRE
Indicators of Compromise (IOCs)
Known IOCs associated with INC Ransom operations
TypeValueDescriptionLast SeenActions
hashb4c5d6e7f8a9b0c1d2e3f4a5b6c7d8e9f0a1b2c3d4e5f6a7b8c9d0e1f2a3b4c5INC Ransom payload2025-01-13
filenameINC-README.txtRansom note—

IOCs are defanged for safety. Click copy to get the clean value.

Detection Guidance
SIEM and EDR detection recommendations for identifying INC Ransom activity
  • 1
    Monitor Citrix NetScaler for exploitation
  • 2
    Detect MegaSync upload activity
  • 3
    Alert on session hijacking indicators
  • 4
    Monitor for .INC extension files
Mitigation, Containment & Recovery
Step-by-step guidance for responding to and recovering from this ransomware attack
  • 1
    Patch Citrix immediately (Citrix Bleed)
  • 2
    Invalidate all active sessions
  • 3
    Block MegaSync at proxy
mor3intel logomor3intel

This platform is intended for defensive cybersecurity, incident response, and recovery purposes only. Information provided is for educational and defensive use.

@mor3cod3@mor3cod3
© 2026 mor3intel