Threat Actor Characterization
INC Ransom
ID: 105be5814163512c8c0adb8992b4774127462| GOLD IONIC | INC Ransomware | IN************ | IN******* |
| IN*********** | — | — | — |
Actor Network Graph
Open Network GraphMITRE ATT&CK®
INC Ransom (G1032) — a ransomware/data-extortion group active since July 2023, most frequently impacting industrial, healthcare, and education sectors in the US/EU. Common playbook: phishing or Citrix NetScaler CVE-2023-3519 for entry, RDP with valid accounts, PsExec/WMIC/SC for propagation, stage and exfiltrate data (often to MEGA), impair defenses, then deploy the INC encryptor.
| Technique | Technique name | Tactics | Evidence |
|---|---|---|---|
| T1190 | Exploit Public-Facing Application | TA0001 | |
| T1566 | Phishing | TA0001 |
|
| T1078 | Valid Accounts | TA0001 TA0003 TA0004 TA0005 |
|
| T1021.001 | Remote Desktop Protocol | TA0008 |
|
| T1105 | Ingress Tool Transfer | TA0011 |
|
| T1570 | Lateral Tool Transfer | TA0008 |
|
| T1059.003 | Windows Command Shell | TA0002 |
|
| T1074 | Data Staged | TA0009 | |
| T1537 | Transfer Data to Cloud Account | TA0010 |
|
| T1562.001 | Disable or Modify Tools | TA0005 |
|
| T1036.005 | Match Legitimate Resource Name or Location | TA0005 |
|
| T1486 | Data Encrypted for Impact | TA0040 |
|
CLASSIFICATION: Unclassified / Open Source
Executive Summary
INC Ransom (a.k.a. GOLD IONIC) is a ransomware/data-extortion group active since July 2023, operating globally with a concentration of victims in industrial, healthcare, and education sectors in the US and Europe. The actor blends opportunistic initial access (e.g., spearphishing and Citrix NetScaler CVE-2023-3519), rapid hands-on-keyboard actions, staging and cloud exfiltration (MEGA), and lateral tool transfer to mass-deploy the INC Ransomware encryptor. Tradecraft commonly includes RDP with valid accounts, PsExec/WMIC/Service Control Manager for propagation, defense impairment (tampering with Windows Defender), and operational OPSEC (cleanup/file deletion). Overall capability: medium-high; tempo and playbook indicate experienced affiliates. Confidence: high for TTPs/targeting; medium on affiliate composition.
Criminal, profit-motivated double extortion (theft + encryption). MITRE lists associated name GOLD IONIC; public reporting depicts a classic RaaS/affiliate feel, with varied TTPs around a stable core of tools. INFERENCE (affiliate model, confidence: medium).