The newly identified Ransomware-as-a-Service (RaaS) group Sicarii has emerged, presenting a unique anomaly in the cybercrime landscape. It overtly aligns itself with Israeli and Jewish symbolism, but cybersecurity analysts caution that this branding may be a performative tactic rather than a genuine ideological stance.
Check Point Research (CPR) Intelligence indicates that while the group uses Hebrew iconography, their underground communications are conducted primarily in fluent Russian, with Hebrew content appearing to be machine-translated.
The Sicarii ransomware demonstrates significant technical competence typical of modern cybersecurity threats. Upon infection, the malware performs environment checks to detect sandboxes and virtual machines (VMs), and:
It then initiates a comprehensive data theft process, harvesting credentials from platforms such as Discord, Slack, Roblox, Telegram, Office, WhatsApp, Atomic Wallet, as well as system files. The ransomware also registers a destruct.bat script to execute at system startup that corrupts critical bootloader files, leveraging built-in Windows utilities to perform disk-wiping operations.
The report mentions that an operator posing as Sicarii’s communications lead made some self-reported operational claims in private communications, alleging that Sicarii:
A Sicarii operator Telegram account’s profile image features an image associated with the banned Israeli extremist organization called Kach.
The emergence of Sicarii highlights the evolving complexity of attribution in cyber warfare. Furthermore, the inclusion of a destructive component indicates a potential shift from pure extortion to systemic disruption.
Reports this week announced the emergence of a new threat, as the novel Devixor malware combines a banking RAT and ransomware, targeting Iranian banks and crypto platforms.