Shanya Packer-as-a-Service (VX Crypt) Fuels Modern Akira, Qilin, Medusa Ransomware Cyberattacks

Published
Written by:
Lore Apostol
Lore Apostol
Cybersecurity Writer

Key Takeaways

A new and sophisticated Packer-as-a-Service has been identified, providing cybercriminals with advanced tools to conceal malicious payloads and evade security solutions. The Shanya service, also referred to as VX Crypt, offers several capabilities that make it a powerful addition to the growing market of cybercrime tools designed to facilitate complex attacks.

Role in Ransomware and EDR Evasion

The Shanya packer is gaining traction in ransomware toolkits, having been adopted by multiple notorious ransomware gangs. New Sophos analysis shows it has been used in attacks involving the Akira, Qilin, Crytox, and Medusa ransomware families. 

First observed being promoted on underground forums near the end of 2024, it offers features like:

A posting in Russian lists the features of “Shanya’s” VX Crypt offering
A posting in Russian lists the features of “Shanya’s” VX Crypt offering | Source: Sophos
The process by which the EDR killer clears the way for a ransomware infection (in this case, Akira)
The process by which the EDR killer clears the way for a ransomware infection (in this case, Akira) | Source: Sophos

A primary use case for Shanya is to deploy EDR killer malware. This type of payload is designed to terminate the processes and services of security products running on a target system. 

A distribution of Shanya-involved cases analyzed between April and November 2025, week by week
A distribution of Shanya-involved cases analyzed between April and November 2025, week by week | Source: Sophos

By disabling defenses first, attackers clear the path for the execution of their primary ransomware payload, significantly increasing the likelihood of success.

Sophisticated Obfuscation and Delivery Methods

The packer employs highly technical evasion methods, including API hashing, manipulating the Process Environment Block (PEB) to store configuration data, and using DLL side-loading to execute malicious code. The malware often overwrites a legitimate system DLL in memory with the decrypted payload and renames it to further avoid detection. 

Shanya used as part of a Booking.com-themed ClickFix campaign, September 2025
Shanya used as part of a Booking.com-themed ClickFix campaign, September 2025 | Source: Sophos

In observed attacks, the packer has been delivered via phishing ClickFix campaigns themed around booking services, using PowerShell scripts to download and execute the payload.

These advanced techniques demonstrate the evolving nature of malware delivery and the continuous challenge for cybersecurity defenses.

This summer, fake Booking.com sites distributed AsyncRAT and a ClickFix attack leveraged email invite lures and spoofed Microsoft Teams login pages. Earlier this year, the EDRKillShifter was used in RansomHub, Play, Medusa, and BianLian Ransomware campaigns.

An October report said Qilin Ransomware's evolving attack methods include leveraging VPN credentials exposed on the Dark Web.


For a better user experience we recommend using a more modern browser. We support the latest version of the following browsers: For a better user experience we recommend using the latest version of the following browsers: