Surtr Malware: Full Overview

Published: 12/19/2025

Written by: Lizzie Danielson

Glitch effectGlitch effect

What is Surtr Malware?

Surtr is a ransomware strain designed to encrypt important files and demand a ransom payment from victims. Known for its ability to target both organizations and individuals, this malware employs sophisticated encryption methods, leaving systems at a standstill. Sometimes referred to as "Surtr Ransomware," its high operational impact and fast-spreading versatility make it a serious threat in cyberspace.

When was Surtr first discovered?

Surtr was first identified in 2023, with cybersecurity researchers attributing its emergence to a spike in targeted attacks against corporations and critical infrastructure.

Who created Surtr?

The identities and number of individuals behind Surtr remain unknown. However, initial analysis suggests it may be linked to a cybercriminal group that often targets backup servers and sensitive data repositories.

What does Surtr target?

Surtr focuses on encrypting critical assets such as database servers, endpoint devices, and cloud-hosted infrastructure. It has been observed targeting healthcare, banking, and manufacturing sectors globally, often crippling operational efficiency until the ransom is paid.

Surtr distribution method

Surtr commonly spreads via email phishing campaigns with malicious attachments or links. Additionally, it exploits unpatched vulnerabilities in network systems and leverages RDP brute-forcing to gain unauthorized access to endpoints.

Technical analysis of Surtr malware

Surtr operates by encrypting files with asymmetric cryptography, making decryption without the private key nearly impossible. After infection, it disables system recovery tools and deletes shadow copies, ensuring the victim cannot recover data without paying the ransom.

Tactics, Techniques & Procedures (TTPs)

  • MITRE ATT&CK Techniques include T1486 (Data Encrypted for Impact), T1562.001 (Impair Defenses via Disable or Modify Tools), and T1059 (Command and Scripting Interpreter).

  • Utilizes persistence mechanisms such as modifying registry keys and adding scheduled tasks.

Indicators of Compromise (IoCs)

  • IPs linked to Surtr command-and-control servers.

  • Filenames like Surtr_decrypt_HELP.txt found in infected systems.

  • Hashes of malicious executables associated with Surtr's payload.

How to know if you’re infected with Surtr

Signs of infection include encrypted files with altered extensions, inaccessible data, and ransom notes demanding payment in cryptocurrency. Victims may also notice unusual network traffic and a complete lack of file recovery options.

Surtr removal instructions

For manual removal, disconnect affected systems from the network immediately and investigate through a trusted endpoint detection and response (EDR) solution like Huntress. Full system scans and the isolation of suspicious files are vital. Employ secure backups to restore encrypted data.

Is Surtr still active?

Yes, Surtr remains an active threat, with evolving variations continuing to target organizations worldwide. Staying vigilant with timely updates and strong defense mechanisms is crucial to mitigating the risks.

Mitigation & prevention strategies

Preventing Surtr requires a multi-layered approach, including regular software patching, multi-factor authentication (MFA), robust phishing training, and continuous network monitoring. Huntress provides 24/7 managed detection and response to combat ransomware and prevent incidents like Surtr from spiraling out of control.

Related educational articles & videos

Surtr FAQs

Surtr is a sophisticated ransomware strain that encrypts files and demands ransom from victims, often targeting businesses and critical sectors. It operates by leveraging encryption algorithms, locking files, and making recovery difficult without paying the ransom.

Surtr spreads through phishing campaigns, malicious attachments, software vulnerabilities, and insecure remote desktop protocol (RDP) access. It exploits weak defenses to penetrate systems undetected.

Yes, Surtr is still considered a major threat as cybercriminals continue to evolve its variants for maximum impact. Organizations must maintain proactive defenses to combat this persistent malware.

Organizations can protect themselves by using regular system updates, implementing MFA, improving employee awareness, and deploying EDR solutions like Huntress to detect and respond to malicious activities.

Glitch effectBlurry glitch effect

Protect What Matters

Secure endpoints, email, and employees with the power of our 24/7 SOC. Try Huntress for free and deploy in minutes to start fighting threats.
Try Huntress for Free