Saturday, August 23, 2025

Gunra Ransomware Group Unleashes Hyper-Threaded Linux Variant in Expanding Attack Campaign

A new player in the ransomware scene is shaking things up—and fast. The Gunra group, which only surfaced a few months ago, is now flexing its muscles with a Linux version of its malware that can run up to 100 parallel encryption threads. That’s double what most competitors can handle.

And it’s not just speed they’re after. Gunra’s fresh approach gives attackers more granular control over file encryption, and it signals a clear ambition: to go beyond Windows and build a truly cross-platform criminal enterprise.

From Windows to Linux—Gunra Goes Big

Gunra first made headlines back in April, following a playbook eerily similar to that of the now-defunct Conti group. Their early campaigns focused solely on Windows systems, but they weren’t subtle. By May, they had allegedly leaked 40 terabytes of data from a hospital—a staggering figure that catapulted them onto radar screens around the world.

Now they’ve moved on to Linux. According to researchers at Trend Micro, Gunra’s new variant shows a level of control and configurability that’s uncommon—even among well-established ransomware outfits.

This latest development confirms what many feared: Gunra isn’t just testing the waters. They’re diving headfirst into broader enterprise environments.

linux ransomware terminal encryption cyberattack

Encryption on Steroids

What sets Gunra apart? It’s the way they encrypt.

Traditional ransomware usually sets the number of threads based on the victim’s CPU cores. Others, like the BERT ransomware, allow a bit of customization—but cap threads at 50. Gunra? They’ve doubled that.

Trend Micro researchers confirmed that Gunra’s Linux variant allows up to 100 encryption threads, all running in parallel. That means faster operations, especially on large volumes of data.

And there’s more:

  • Attackers can control how much of a file is encrypted, allowing partial encryption

  • Encryption threads won’t terminate until every file is processed

  • The malware skips dropping a ransom note on Linux systems—purely focused on speed and control

It’s fast. It’s lean. It’s deliberate.

Global Reach, Diverse Targets

Gunra isn’t picky. They’ve already hit organizations in at least seven countries, including:

  • Brazil

  • Japan

  • Canada

  • Turkey

  • South Korea

  • Taiwan

  • United States

And they’re not sticking to one industry either. Victims so far span:

• Healthcare
• Legal and consulting
• Agriculture
• IT services
• Manufacturing

According to their leak site, the group has been busy—posting stolen data and proving they’re capable of causing serious damage across sectors.

That’s what makes this so alarming. Gunra isn’t building up gradually. They’re launching full-force.

Linux Variant: Configurable and Efficient

Gunra’s Linux malware doesn’t just bring more threads. It also gives attackers fine-tuned control over the attack itself.

Instead of encrypting everything by default, the ransomware needs input on what to target. Users (aka attackers) must specify:

  • How many threads to use (up to 100)

  • Which file paths to scan

  • Which file extensions to encrypt

If attackers input “all,” every accessible file gets encrypted. But they can also opt for surgical strikes—only encrypting specific file types like .docx, .sql, or .db.

Once the ransomware starts, it enters a waiting loop—checking every 10 milliseconds until all threads finish. Then it shuts itself down.

It’s clean, fast, and leaves fewer clues behind.

Why This Variant Stands Out

Most Linux-targeting ransomware still follows clunky methods. Gunra changes that. According to Trend Micro, the key enhancements are:

Feature Gunra Linux Variant Typical Ransomware
Max Encryption Threads 100 CPU-dependent / ~50
Ransom Note on Linux No Yes
File Extension Targeting Customizable (CSV-based) Often Hardcoded
Partial Encryption Option Yes Sometimes
Keystore File Support Yes (RSA-encrypted keys) Rare

Gunra’s toolset reflects an evolution in ransomware design. It’s not just a port of their Windows version—it’s optimized for Linux environments. That includes servers running sensitive databases and core enterprise workloads.

It’s clear the group isn’t just experimenting. They know what they’re doing.

Defenders on High Alert

Security experts are taking this seriously. Trend Micro has issued direct recommendations for defenders, highlighting that Gunra has moved fast and innovated aggressively—traits that make them harder to counter.

Here’s what experts recommend:

• Run regular vulnerability scans
• Audit all assets and configurations
• Monitor ports, services, and protocols
• Harden routers and firewalls
• Use AI-driven threat detection where possible
• Educate employees and run red-team exercises

Trend Micro stresses the need for layered defenses. No single fix will stop a group like Gunra—but every extra wall helps.

Santosh Smith
Santosh Smith
Santosh is a skilled sports content writer and journalist with a passion for athletics. With expertise in various sports such as football, basketball, and soccer, he provides his readers with accurate, compelling, and tailored content. His knowledge and research skills make him an expert in providing in-depth analysis and valuable insights on the latest sports news and events.

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Share post:

Recent

More like this
Related

Underground Rave Scene in China: A Pulse of Rebellion and Freedom

Crouching through a small metal door into a dark...

Amazon Prime for Seniors: How to Get Discounts and Save Big?

Amazon Prime offers fantastic benefits such as free delivery,...

How to Become an Amazon Delivery Driver? Complete Guide

You can become an Amazon delivery driver by meeting...

Luke Humphries Weight Loss Journey with Before & After Image

Luke Humphries, the British professional darts player, has recently...