Don’t let overlooked obligations become incidents. Learn how.
Utility navigation bar redirect icon
Portal LoginSupportBlogContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed ITDR: Identity Threat Detection and Response

    Protect your Microsoft 365 and Google Workspace identities and email environments.

    Managed ITDR: Identity Threat Detection and Response

    Protect your Microsoft 365 and Google Workspace identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training Software

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training Software

    Empower your teams with science-backed security awareness training.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    Infostealers
    Infostealers
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    What Gets Overlooked Gets Exploited

    Most days, nothing happens. But one day, something will.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    Ebooks
    Ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    How Unified EDR and ITDR Stop Attacks Before They Spread
    Huntress Cybersecurity
    How Unified EDR and ITDR Stop Attacks Before They Spread
    Huntress Cybersecurity
    Codex Red: Untangling a Linux Incident With an OpenAI Twist (Part 2)
    Huntress Cybersecurity
    Codex Red: Untangling a Linux Incident With an OpenAI Twist (Part 2)
    Huntress Cybersecurity
    Attackers Didn’t Wait for AI. They Built Workflows Around It.
    Huntress Cybersecurity
    Attackers Didn’t Wait for AI. They Built Workflows Around It.
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Blog
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportBlogContact
Search
Close search
Get a Demo
Start for Free
HomeBlog
Leveling Up with NightSpire Ransomware
Published:
April 7, 2026

Leveling Up with NightSpire Ransomware

By:
Harlan Carvey
Lindsey O'Donnell-Welch
Share icon
Glitch effectGlitch effectGlitch effect

Our industry has a ransomware actor categorization problem. 

News articles will frequently feature splashy headlines like “Akira ransomware group targets critical infrastructure.” However, the reality is that Akira, and many other ransomware variants, are distributed via an affiliate model. This is commonly referred to as a “Ransomware-as-a-Service,” or RaaS, model. This means that a core set of developers create and maintain the file encryptor and infrastructure, and may provide other services (i.e., manage ransom negotiations and collection, review and categorize stolen data, etc.), but sell the file encryptor to third-party groups, or affiliates, that then execute the actual attacks where the ransomware is deployed. In some cases, affiliates have not exclusively stuck to one ransomware variant, moving between multiple, different ransomware providers. 

So, what? What does that mean for investigations, detections, and impacted organizations? 

Perhaps most importantly, this means that very often, indicators and tactics, techniques, and procedures (TTPs) will vary from one attack to another, even when the files are encrypted by the same ransomware. Particularly for MSSPs and MDRs, while there may be a cluster of attacks across their customer base that include the same or very similar indicators and TTPs, over time there will likely be several distinct clusters that clearly illustrate different affiliates or groups at work. As a result, attacks attributed to “the ransomware group” will often be markedly different depending upon when, and who, is doing the reporting. A successful ransomware attack reported six months ago, in a completely different vertical or geographic region, may follow an entirely different playbook than a more recent attack, from initial access, through defense evasion, data staging and exfiltration, through ransomware deployment.

Further, multiple RaaS samples have been observed to contain embedded commands to terminate processes, and/or inhibit recovery, lowering the bar to a successful attack and ransom payment so that an affiliate doesn’t have to remember to take these actions themselves. For example, the Akira file encryptor is widely known to launch a PowerShell command, as a child process, to delete available Volume Shadow Copies (VSCs). In 2020, Sodinokibi samples were found to include 156 unique embedded commands to terminate processes and services associated with anti-virus products. This is an observation, not to say that this is exclusive to RaaS variants and samples.


Is NightSpire RaaS? 

NightSpire ransomware was reportedly first discovered in February 2025, and was active throughout the year. There appears to be some confusion as to whether or not NightSpire follows a ransomware-as-a-service (RaaS) model or not. Researchers with Halcyon have argued that the actors are keeping their operations in-house, stating in a July 2025 post, “They’re not running a public RaaS operation, and there’s no affiliate program; it’s a closed shop.” However, two months later, further reporting from HivePro indicates that the attackers are “operating under a Ransomware-as-a-Service (RaaS) model”.

It’s possible that this is less about confusion, and more about an evolution of the structure and model of the group itself. But why does it ultimately make a difference from the perspective of defenders? 


NightSpire incident

At the end of March 2026, the Huntress agent was installed on several endpoints for a newly joined customer. Shortly after the agent was installed on the first endpoints, malicious footholds, or persistence mechanisms, were detected, indicating that the agent was likely being installed after the incident had already begun. As monitoring continued, additional signals were generated, including of NightSpire ransomware being launched on an endpoint. From there, a deeper investigation ensued.

This investigation revealed that the threat actor had accessed one endpoint via RDP several days prior to the Huntress agent being installed, and had installed Chrome Remoting Desktop, followed by Everything, a file search tool freely available from voidtools. Two days later, the threat actor could be seen running MEGASync, likely for data exfiltration, and then installing VMWare Workstation on the endpoint, and then running Everything, from which the threat actor could then be seen, based on process lineage, accessing files via the Everything interface. The threat actor could then be seen running 7Zip to archive files from a specific folder. The following day, the threat actor was observed installing WPS Office, a multi-platform office suite freely available from the Chinese company Kindsoft Office Software. Figure 1 illustrates an excerpt from the WPS web site.


Figure 1: Excerpt from WPS website

On a second endpoint within the infrastructure, as illustrated in Figure 2, foothold signals for Chrome Remoting Desktop and AnyDesk were generated shortly after the Huntress agent was installed.


Figure 2: Foothold signals

These foothold or persistence signals mirrored those on the first endpoint. 

Figure 3 illustrates an excerpt from the ransom note recovered from the infected endpoint. 


Figure 3: Ransom note excerpt, March 2026

The ransom note is remarkably specific, and without another more recent incident to compare it to, it’s sheer speculation as to its accuracy. We know that the threat actor ran Everything, 7Zip, and MEGASync, and we know that the threat actor viewed some files via Everything, but we do not have the evidence to validate the statement that “2.5TB” of data was taken, nor the actual content of the files taken.


Previous NightSpire incident

It turns out that this wasn’t the first time Huntress had seen a customer environment where the NightSpire ransomware had been deployed. During this incident, there was not a great deal of data related to the threat actor TTPs captured, but it was noted that encrypted files had the .nspire extension added to them, and a copy of the _nightspire_readme.txt ransom note was retrieved from one of the endpoints.

Figure 4 illustrates the full contents of the ransom note recovered from the December 2, 2025 incident.

Figure 4: Ransom note, December 2025


Observations

Publicly available reporting of NightSpire ransomware indicates that attacks have included the use of native utilities, or “LOLBins,” like WMI or PsExec. However, in the most recent incident investigated by Huntress, this does not appear to be the case. In fact, the threat actor, be they “the NightSpire ransomware group” or an affiliate, appears to have had to “truck in” all of their tooling, including Chrome Remoting Desktop and AnyDesk for persistence, 7Zip and Everything for data staging and collection, MEGASync for data exfiltration, and VMWare Workstation and WPS Office for other purposes. None of these applications are native to the compromised environment, and they had to be downloaded to the endpoints. 

This shows one differentiation from previous publicly reported incidents linked to NightSpire. While looking at the previous incident that Huntress observed in December 2025, there are other differences in TTPs. While a good deal of information is no longer available regarding this incident, one thing is clear; the ransomware file encryptor itself appears to have been modified at some point in the almost four months leading up to the end of March 2026. For example, ransom note file names and contents were modified. 

These differences may indicate an evolution of the ransomware itself, or they could represent variation due to affiliates distributing NightSpire. While it remains to be seen as to whether or not NightSpire follows a RaaS model, the varying TTPs in these incidents show that Indicators of Compromise (IoCs) tied to ransomware “groups” aren’t always set in stone, particularly if affiliates are potentially involved. Huntress analysts have seen this with other RaaS variants, where IoC and TTP clusters are markedly different between attacks, starting with workstation names, and progressing through the rest of their playbook, through data staging and exfiltration to ransomware deployment. While some things may appear consistent across attacks, such as initial access and the fact that various tools are used, other aspects of the attacks tend to vary in significant ways, lending credence to the fact that different groups or affiliates are responsible for the attacks.


Indicators of Compromise


Indicator

Description

bde50a42efc079edde1a314243ad339db2d42e343fbbcd39117803b0f5960355

SHA256 hash for file encryptor, enc.exe, from 2 Dec 2025

ad67031e2ca68764fe1a7d6632c02b02a299d59efb920710011a9a2ccf4399b7

SHA256 hash for file encryptor, enc.exe, from 25 Mar 2026

.nspire

Encrypted file extension

_nightspire_readme.txt, [nspire_msg].txt

Ransom note file names, 2 Dec 2025 and 25 Mar 2026, respectively

prince1990905@gmail[.]com

Email address associated with Chrome Remoting Desktop, 24 & 25 Mar 2026

C:\Users\[REDACTED]\Downloads\

Threat actor ops folder, 25 Mar 2026





Categories
Threat Analysis
ChatGPT logoChatGPTOpens in new tabClaude logoClaudeOpens in new tabPerplexity logoPerplexityOpens in new tabGoogle Gemini logoGoogle AIOpens in new tab
AI sparkle iconSummarize This Page
ChatGPT logoChatGPTOpens in new tabClaude logoClaudeOpens in new tabPerplexity logoPerplexityOpens in new tabGoogle Gemini logoGoogle AIOpens in new tab

What's your social profile giving away?

On May 20 (12pm EST), join Truman Kain and Caitlin Sarian ("Cybersecurity Girl") for the latest edition of _declassified and learn how attackers turn social media into intel.
Register now
Share
Facebook iconTwitter X iconLinkedin iconDownload icon
Glitch effect

You Might Also Like

  • Velociraptor Misuse, Pt. I: WSUS-Up?

    Huntress has seen an uptick in threat actors abusing the Velociraptor open-source DFIR tool in a range of attacks, including a recent incident involving WSUS exploitation.
  • Huntress Service: Ransomware Canaries

    Read about the value of Huntress' Ransomware Canaries service, a mechanism to deliver faster detection of a ransomware incident.
  • Cephalus Ransomware: Don’t Lose Your Head

    In mid-August, Huntress saw two incidents that linked back to a ransomware variant called Cephalus, which included DLL sideloading via a legitimate SentinelOne executable.
  • Spidering Through Identity for Profit and Disruption

    Dive into the recent Las Vegas casino cyberattacks linked to Scattered Spider, and learn how organizations can defend against such identify-based attacks.
  • The Hunt to Find Origins of Kaseya's VSA Mass Ransomware Incident

    Our Security Researchers discuss how hackers executed the Kaseya VSA supply chain attack—and why the blast radius of the incident was relatively limited.
  • LOLBin to INC Ransomware

    Huntress has observed INC ransomware deployed in the past but recent activity indicates a possible continued shift in/or improvement of tactics employed by these threat actors.
  • Dollars and Sense: The True Value of the Huntress SOC Team

    Automation is great—but when it comes to threat detection and analysis, it doesn’t replace the need for human expertise.
  • MSP Moment: Squashing an MSSQL Attack

    When it comes to breaches, it’s hard to find a silver lining when the end result is customer down time, data theft, or damaged reputations. For Managed Service Providers with tens to hundreds (or even thousands) of clients, the stakes are even higher. In this MSP Moment, we’re highlighting how NTConnections, a Washington DC based MSP, responded to a database outage which quickly escalated into an incident response effort.

Sign Up for Huntress Updates

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.
Privacy • Terms
By submitting this form, you accept our Terms of Service & Privacy Policy
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingManaged ISPMManaged ESPMBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 242k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy