AI-Driven Lcryx Ransomware Emerges in Cryptomining Botnet

Edward Zhou
Edward Zhou

CEO & Founder

 
July 19, 2025 3 min read

AI-Generated Lcryx Ransomware Discovered in Cryptomining Botnet

A cryptomining botnet active since 2019 has incorporated a likely AI-generated ransomware known as Lcryx into its operations. Recent analysis by the FortiCNAPP team at FortiGuard Labs identified the first documented incident linking H2miner and Lcryx ransomware. This investigation focused on a cluster of virtual private servers (VPS) utilized for mining Monero.

AI-Generated Lcryx Ransomware
Image courtesy of Infosecurity Magazine

The FortiCNAPP team identified a new variant of the Lcryx ransomware, dubbed "Lcrypt0rx," which is a VBScript-based strain first observed in late 2024. The ransomware exhibits distinct techniques for system degradation, including UI interference and redundant embedded scripts. It also bundles commercially available hacking tools and infostealers, enhancing its functionality beyond simple encryption.

The team noted that the Lcryx ransomware family shows several unusual characteristics indicating it may have been generated using AI. For instance, scripts contain multiple repeated functions without optimization, flawed encryption logic, and illogical behaviors such as attempting to open encrypted files in Notepad.

To learn more about the operational overlap between H2miner and Lcryx, visit Fortinet and Infosecurity Magazine.

Flaws in AI-Generated Lcryx Ransomware

The FortiCNAPP team observed the growing use of large language models (LLMs) by cybercriminals, which has led to critical flaws in the development of ransomware. The Lcryx family demonstrates indicators of automated code generation, such as multiple functions being repeated and incorrect encryption logic. These flaws may include ineffective methods to disable antivirus products, likely stemming from LLM hallucinations.

The ransom note URL associated with Lcryx also contains errors, as the .onion address does not conform to valid TOR address specifications. This suggests it may have been a placeholder during a transition from version 2 to version 3 of onion services.

For further insights into the use of LLMs for malware development, refer to Cybersecurity Insights.

Lcryx Ransomware
Image courtesy of Infosecurity Magazine

Examining the H2miner-Lcryx Connection

The operational overlap between H2miner and Lcryx suggests collaboration among operators to maximize financial gain. This could involve H2miner operators developing Lcrypt0rx to boost profits or reusing it for mining operations while shifting blame. The campaign reflects a broader trend of commodification in cybercrime, where access to prebuilt tools and LLM-generated code lowers barriers to entry for cybercriminals.

This situation underscores the necessity for robust cybersecurity measures. Gopher Security offers an AI-Powered Zero Trust Platform, which provides comprehensive protection against emerging threats like Lcryx. By employing advanced technologies such as Post Quantum Cryptography and an AI Inspection Engine for Traffic Monitoring, organizations can better safeguard against these evolving attacks.

For effective security strategies, explore Gopher Security.

Adversary Infrastructure & Tool Details

The H2miner infrastructure hosts a variety of malicious tools that target multiple operating systems. Some identified tools include:

ToolLinuxWindowsContainers
KinSing✔️
Xmrig miners✔️✔️✔️
Lcrypt0rx✔️
Lumma stealer✔️
DCRat✔️

The infrastructure takes advantage of various VPS providers for hosting and Command & Control functions, including HostGlobal and Alibaba Hosting.

H2miner Infrastructure
Image courtesy of CyberWire

Protecting Against H2Miner Threats

For organizations managing Linux or containerized workloads, it is crucial to implement proactive security measures. Gopher Security’s solutions, such as Micro-Segmentation for Secure Environments and Granular Access Control, help organizations defend against multifaceted attacks like those from the H2miner botnet.

Recommended Actions:

  • Regular Patching: Ensure all systems are updated with the latest security patches.
  • Script Monitoring: Implement monitoring tools to identify unauthorized scripts in your environment.
  • Strengthen RBAC: Properly configure Role-Based Access Control in container environments.
  • Network Traffic Inspection: Monitor for suspicious traffic that may indicate a breach.

To explore more about securing your infrastructure against evolving cyber threats, visit Gopher Security.

By leveraging advanced security solutions, organizations can enhance their defenses against sophisticated malware threats like the Lcryx ransomware and the H2miner botnet, ensuring a fortified cybersecurity posture.

Edward Zhou
Edward Zhou

CEO & Founder

 

CEO & Founder of Gopher Security, leading the development of Post-Quantum cybersecurity technologies and solutions..

Related Articles

Ransomware Attacks Target Russian Vodka and Healthcare Sectors

The Novabev Group, parent company of the Beluga vodka brand, experienced a ransomware attack on July 14, 2025, causing significant disruptions. The attack affected WineLab, the company's liquor store chain, leading to a three-day closure of over 2,000 locations in Russia. The company reported that the attack crippled its IT infrastructure, particularly point-of-sale systems and online services. Novabev Group stated, "The company maintains a principled position of rejecting any interaction with cybercriminals and refuses to fulfill their demands."

By Alan V Gutnov July 19, 2025 3 min read
Read full article

Retail Sector Faces Surge in Ransomware Attacks: A 2025 Analysis

Publicly disclosed ransomware attacks on the retail sector globally surged by 58% in Q2 2025 compared to Q1, with UK-based firms being particularly targeted, according to a report by BlackFog. This spike in attacks follows high-profile breaches affecting retailers like Marks & Spencer (M&S), The Co-op, and Harrods, attributed to the threat actor known as Scattered Spider.

By Alan V Gutnov July 19, 2025 2 min read
Read full article

Preventing ClickFix Attacks: Safeguarding Against Human Error

ClickFix is an emerging social engineering technique utilized by threat actors to exploit human error. This technique involves misleading users into executing malicious commands under the guise of providing "quick fixes" for common computer issues. Threat actors use familiar platforms and deceptive prompts to encourage victims to paste and run harmful scripts.

By Alan V Gutnov July 19, 2025 3 min read
Read full article

AI-Generated Phishing: A Growing Threat to Small Businesses

Over the past few years, the potential uses of generative AI have raised significant concerns among small business owners. The deepfake economy has emerged as a major threat. According to Business Insider, scammers are using deepfakes to impersonate company employees, leading to severe financial losses and reputational damage.

By Alan V Gutnov July 19, 2025 4 min read
Read full article