Subscribe

Social Media Links

Insights

 | 3 minute read

Ankura CTIX FLASH Update – December 23, 2025

Malware Activity


Threat Actor Activity

RansomHouse RaaS Group Enhances Their Ransomware Encryption, dubbed “Mario”

RansomHouse, a ransomware-as-a-service (RaaS) operation, has enhanced its encryptor from a single-phase linear technique to a more complex, multi-layered method, as detailed by Palo Alto Networks Unit 42. This upgrade provides stronger encryption, faster speeds, and improved reliability in modern environments, boosting threat actors’ leverage during negotiations. Initially launched in December 2021 as a data extortion group, RansomHouse later integrated encryptors into its attacks and developed the MrAgent tool to lock multiple VMware ESXi hypervisors simultaneously. The latest encryptor variant, dubbed ‘Mario,’ employs a two-stage transformation with a 32-byte primary key and an 8-byte secondary key, increasing encryption entropy and complicating partial data recovery. It also introduces dynamic chunk sizing at an 8GB threshold with intermittent encryption, complicating static analysis due to non-linearity and complex math determining processing order. Additionally, ‘Mario’ enhances memory layout and buffer organization, using multiple dedicated buffers for each encryption stage. The upgraded version provides detailed file processing information and continues targeting VM files, renaming encrypted files with the ‘.emario’ extension and leaving ransom notes. Although RansomHouse remains mid-tier in attack volume, its advanced tooling development indicates a strategic focus on efficiency and evasion, posing a growing challenge for decryption and static analysis.


Vulnerabilities

Critical UEFI DMA Bypass Flaw Exposes Systems to Pre-Boot Memory Attacks

Researchers have disclosed a critical UEFI firmware vulnerability affecting various motherboards from ASUS, Gigabyte, MSI, and ASRock that allows direct memory access (DMA) attacks to bypass early-boot memory protections, potentially enabling malicious code to compromise systems before the operating system loads. Tracked under multiple CVEs (CVE-2025-11901, CVE-2025-14302, CVE-2025-14303, and CVE-2025-14304) due to vendor implementation differences, the flaw stems from UEFI firmware incorrectly reporting that DMA protections are enabled even when the IOMMU (a hardware memory firewall designed to restrict device access to RAM) fails to initialize during early boot. Discovered by Riot Games researchers Nick Peterson and Mohamed Al-Sharifi and coordinated with CERT Taiwan, the issue allows a malicious PCIe device with physical access to read or modify system memory before OS-level safeguards activate, leaving no alerts, prompts, or logs for detection. While Riot Games highlighted the risk in the context of kernel-level game cheats (causing its Vanguard anti-cheat to block Valorant from launching on vulnerable systems) the underlying exposure extends to broader security threats capable of fully compromising the operating system. Carnegie Mellon’s CERT/CC confirmed broad impact across multiple vendors and warned that exploitation occurs in the system’s most privileged state, underscoring the importance of applying the vendor firmware updates promptly after backing up data.

📧 Never Miss a Briefing

Stay informed and secure. Subscribe to Ankura’s Cyber Flash Update, a bi-weekly briefing curated by our top cybersecurity experts. Receive timely insights on emerging threats, vulnerabilities and malicious actors to keep your systems secure. 

Join the Cyber Flash Update community today.

© Copyright 2025. The views expressed herein are those of the author(s) and not necessarily the views of Ankura Consulting Group, LLC., its management, its subsidiaries, its affiliates, or its other professionals. Ankura is not a law firm and cannot provide legal advice.

Let’s Connect

We solve problems by operating as one firm to deliver for our clients. Where others advise, we solve. Where others consult, we partner.

I’m interested in
I need help with