In a notable development within the cybersecurity landscape, a new strain of ransomware known as Lynx has been identified as a continuation of the older INC ransomware. Researchers from Palo Alto Networks unearthed this successor in July 2024, revealing that it has already begun targeting a broad range of industries, including retail, real estate, architecture, and financial and environmental services across both the United States and the United Kingdom.
"Since its emergence, the group behind this ransomware has actively targeted organizations in various sectors," said Benjamin Chang, one of the researchers involved in the report. With the increasing prevalence of ransomware attacks, Lynx's debut comes as no surprise, especially as it shows a significant link to its predecessor, INC ransomware.
"Since its emergence, the group behind this ransomware has actively targeted organizations in various sectors,"
The initial appearance of INC ransomware dates back to August 2023, and it quickly gained notoriety due to its sophisticated tactics and dual strategies employed against its victims. Lynx ransomware shares a substantial portion of its source code with INC ransomware, showcasing a direct lineage and a concerning trend in the evolution of cyber threats. "While we haven't confirmed any Linux samples yet for Lynx ransomware, we have noted Windows samples," stated Pranay Kumar Chhaparwal, another researcher from the Palo Alto Networks team.
"While we haven't confirmed any Linux samples yet for Lynx ransomware, we have noted Windows samples,"

The mechanics of these ransomware variants are deeply intertwined, capitalizing on ransomware-as-a-service (RaaS) frameworks that simplify the deployment of complex cyber extortion tactics. As detailed in the report, Lynx ransomware operates on this RaaS model, allowing less sophisticated criminals to execute sophisticated attacks with relative ease.
Career Journey
A timeline analysis highlighting the confirmed samples of both INC and Lynx ransomware from October 2023 through September 2024 paints a stark picture of the ongoing threats. Observing the trajectory, Chhaparwal noted, "The source code for INC ransomware was available for sale on the criminal underground market as early as March 2024. We expect many malware authors to acquire and repackage this code to develop new ransomware, similar to what the Lynx group did."
With such easy access to malicious code, the expectation is that the cybercrime landscape will see an uptick in offshoots derived from established strains like INC and Lynx. This presents a formidable challenge for cybersecurity experts tasked with combating an increasingly crowded field of threats.
The proliferation of Lynx ransomware signifies the group’s use of advanced and varied mechanisms for delivery. These methods include exploiting hacking forums for shared resources among criminals, deploying malicious downloads to infiltrate victims' systems, and utilizing phishing emails to illicitly obtain sensitive user credentials. As Chang elaborates, "The double extortion aspect of Lynx ransomware means that it exfiltrates a victim's data before encrypting it. This not only encrypts the victim's data, rendering it inaccessible, but also allows the ransomware group to leak or sell this information if the victim does not make a ransom payment."

This growing trend in double extortion tactics marks a significant shift in how ransomware attacks are perpetrated, with cybercriminals piling on pressure by threatening to expose sensitive information if their demands are not met. Organizations are thus urged to formulate and bolster their cybersecurity defenses to mitigate risks associated with such diverse threats.
In line with this, Lynx ransomware has reportedly breached multiple companies, further instilling fear among potential targets. Data pilfered by the group has been publicly displayed on their leak site, showcasing the potential ramifications of falling victim to such attacks.
In light of the existing threats, experts encourage organizations to remain vigilant, emphasizing the necessity of risk awareness and preparedness against evolving ransomware threats. Palo Alto Networks provides solutions that enhance defenses against Lynx ransomware, arguing that robust cybersecurity measures are vital to thwart these increasingly sophisticated cybercriminals.
Impact and Legacy
As the landscape of ransomware continues to evolve, only time will tell how extensive the impact of Lynx will be and whether new iterations of ransomware will continue to emerge. Organizations must adapt to these shifting dynamics to safeguard their critical data and maintain operational integrity.


