Special Features

Cybersecurity Month

INC ransomware rebrands to Lynx – same code, new name, still up to no good

Researchers point to evidence that scumbags visited the strategy boutique


Researchers at Palo Alto's Unit 42 believe the INC ransomware crew is no more and recently rebranded itself as Lynx over a three-month period.

INC was never a ransomware market leader, but since spinning up in October 2023 it made something of a name for itself with headline-grabbing attacks on the UK's Leicester City Council and NHS Scotland, to name a few.

Lynx, on the other hand, was first spotted in July 2024, and Unit 42's researchers note that the number of detected Lynx samples has outpaced that of INC samples since then.

Graph depicting the number of ransomware sample detections of both Lynx and INC gangs over the previous 12 months, courtesy of Unit 42 – click to enlarge

After two months of Lynx being more prevalent than INC, detections of the latter fell to zero in September, although this alone doesn't necessarily mean it's gone for good. The same number of INC detections (zero) were also noted in January, February, and May, for example.

However, code comparisons often provide better support for suspicions of rebranding and the same is true in this case. Running samples from both ransomware groups through BinDiff revealed a 70.8 percent match in shared functions.

"This significant overlap in shared functions strongly suggests that the developers of Lynx ransomware have borrowed and repurposed a considerable portion of the INC codebase to create their own malicious software," Unit 42 states in a blog.

"Reusing code between different ransomware families is common among cybercriminals. By leveraging preexisting code and building upon the foundations laid by other successful ransomware, threat actors can save time and resources in the development of their own attacks. This can ultimately lead to more successful and widespread campaigns."

The researchers also observe that INC's source code was made available on cybercrime forums from March this year, so in theory there could be all manner of INC iterations released by anyone and a code analysis alone would most likely yield similar results.

INC is still posting victims: new entries to its online leak site were made as recently as October 4, and a cursory examination suggests that it wasn't a repost of an old attack.

A comparison of the two brands' leak sites reveals noticeable similarities. For starters, both INC and Lynx are among a very small cohort of cybercrime groups that have clear web presences – both have TOR and regular leak sites.

The next obvious similarity is the format of the websites. Typically, ransomware gangs have vastly different approaches to designing their leak blogs. It's not often that one gang will have a site that closely resembles that of a rival, but Lynx and INC's sites are laid out in an almost identical fashion.

Comparison of INC and Lynx's leak blogs – click to enlarge

The left-hand toolbar, near-identical section names, presence on the clear web, and rhyming group names suggest that the same individuals may be behind both operations, or that they are at least trying to give that impression.

A statement posted to Lynx's blog states that it refuses to target the likes of hospitals, governments, or other kinds of nonprofits "as these sectors play vital roles in society."

This certainly wasn't the case with INC given its attacks on the NHS and Leicester City Council. Perhaps they turned over a new leaf. Perhaps they're just a bunch of criminals who lie about everything. ®

Send us news
10 Comments

What do ransomware and Jesus have in common? A birth month and an unwillingness to die

35 years since AIDS first borked a PC and we're still no closer to a solution

UK ICO not happy with Google's plans to allow device fingerprinting

Also, Ascension notifies 5.6M victims, Krispy Kreme bandits come forward, LockBit 4.0 released, and more

Deloitte says cyberattack on Rhode Island benefits portal carries 'major security threat'

Personal and financial data probably stolen

Suspected LockBit dev, facing US extradition, 'did it for the money'

Dual Russian-Israeli national arrested in August

Ransomware scum blow holes in Cleo software patches, Cl0p (sort of) claims responsibility

But can you really take crims at their word?

Heart surgery device maker's security bypassed, data encrypted and stolen

Sounds like th-aorta get this sorted quickly

Are your Prometheus servers and exporters secure? Probably not

Plus: Netscaler brute force barrage; BeyondTrust API key stolen; and more

Blue Yonder ransomware termites claim credit

Also: Mystery US firm compromised by Chinese hackers for months; Safe links that aren't; Polish spy boss arrested, and more

Lights out for 18 more DDoS booters in pre-Christmas Operation PowerOFF push

Holiday cheer comes in the form of three arrests and 27 shuttered domains

Fully patched Cleo products under renewed 'zero-day-ish' mass attack

Thousands of servers targeted while customers wait for patches

RansomHub claims to net data hat-trick against Bologna FC

Crooks say they have stolen sensitive files on managers and players

Russia arrests one of its own – a cybercrime suspect on FBI's most wanted list

The latest in an unusual change of fortune for group once protected by the Kremlin