Executive Summary
In December 2025, the RansomHouse ransomware-as-a-service (RaaS) group, operated by the Jolly Scorpius threat actor, was observed deploying a significantly upgraded encryption process against high-value victims. Attackers exploited compromised credentials and ESXi server vulnerabilities to infiltrate enterprise environments, moving laterally and using tools like MrAgent to disable firewalls and maintain persistent access. Once established, they deployed the enhanced Mario encryptor, which used multi-layered, two-stage file encryption and selective chunk processing to maximize data disruption. This double extortion campaign resulted in data theft, operational outages, and public leaks for at least 123 organizations across healthcare, finance, government, and transportation sectors.
This incident highlights both the increasing technical sophistication of ransomware operations and the rapid evolution of RaaS offerings. The shift to more complex encryption makes detection, containment, and recovery far more challenging, calling for organizations to adopt dynamic, layered security controls and anticipate future trends in ransomware capabilities.
Why This Matters Now
Ransomware attacks are growing more advanced by leveraging modular architectures and sophisticated encryption, as seen in the RansomHouse upgrade. This raises the urgency for enterprises to strengthen east-west security, implement zero trust segmentation, and improve visibility to combat more evasive, rapidly evolving threats.
Attack Path Analysis
The attackers initiated their campaign through phishing or exploiting vulnerable ESXi instances to obtain initial access. After establishing a foothold, they elevated privileges to gain broader administrative access to hypervisor resources. Next, they moved laterally within the virtualized infrastructure to identify and gain control over more hosts and workloads. Establishing persistence, MrAgent maintained ongoing command and control communications with remote attacker servers. The attackers then exfiltrated sensitive data using automated tools before deploying the upgraded Mario ransomware to encrypt critical files. This culminated in operational disruption, data encryption, and extortion through public leak threats.
Kill Chain Progression
Initial Compromise
Description
Attackers gained initial access by spear phishing or exploiting exposed and vulnerable VMware ESXi systems.
Related CVEs
CVE-2024-1708
CVSS 8.4A path traversal vulnerability in ConnectWise ScreenConnect 23.9.7 and prior allows remote attackers to access arbitrary files on the server.
Affected Products:
ConnectWise ScreenConnect – <= 23.9.7
Exploit Status:
exploited in the wildCVE-2024-1709
CVSS 10An authentication bypass vulnerability in ConnectWise ScreenConnect 23.9.7 and prior allows remote attackers to gain unauthorized access to the system.
Affected Products:
ConnectWise ScreenConnect – <= 23.9.7
Exploit Status:
exploited in the wildCVE-2023-20198
CVSS 10A vulnerability in Cisco IOS XE Software allows an unauthenticated, remote attacker to create an account on an affected system with privilege level 15 access.
Affected Products:
Cisco IOS XE – *
Exploit Status:
exploited in the wildCVE-2023-3519
CVSS 9.8A code injection vulnerability in Citrix NetScaler ADC and Gateway allows unauthenticated remote code execution.
Affected Products:
Citrix NetScaler ADC and Gateway – *
Exploit Status:
exploited in the wildCVE-2021-40444
CVSS 8.8A remote code execution vulnerability in Microsoft MSHTML component allows attackers to craft malicious ActiveX controls to be used in Microsoft Office documents.
Affected Products:
Microsoft Windows – *
Exploit Status:
exploited in the wild
MITRE ATT&CK® Techniques
Spearphishing Attachment
Exploit Public-Facing Application
Valid Accounts
Remote Services: SMB/Windows Admin Shares
Exfiltration Over C2 Channel
Data Encrypted for Impact
Inhibit System Recovery
System Services: Service Execution
Potential Compliance Exposure
Mapping incident impact across multiple compliance frameworks.
PCI DSS 4.0 – Secure Authentication and Access Control
Control ID: 8.2.2
NYDFS 23 NYCRR 500 – Encryption of Nonpublic Information
Control ID: 500.15
DORA – ICT Risk Management Framework
Control ID: Art. 10(1)
CISA Zero Trust Maturity Model 2.0 – Segmentation and Least Privilege Access
Control ID: Identity – Device and Network Segmentation
NIS2 Directive – Security of Network and Information Systems
Control ID: Art. 21
ISO/IEC 27001:2022 – Information Security Incident Management
Control ID: A.5.34
Sector Implications
Industry-specific impact of the vulnerabilities, including operational, regulatory, and cloud security risks.
Health Care / Life Sciences
RansomHouse RaaS targeting VMware ESXi infrastructure poses critical threats to healthcare virtualized environments, potentially disrupting patient care systems and violating HIPAA compliance requirements.
Financial Services
Upgraded dual-encryption RansomHouse attacks on ESXi hypervisors threaten financial institutions' core trading systems, payment processing, and regulatory compliance across PCI and banking standards.
Government Administration
RansomHouse's enhanced encryption targeting government ESXi infrastructure could paralyze critical public services, compromise sensitive data, and undermine public trust in governmental operations.
Higher Education/Acadamia
Educational institutions face severe disruption from RansomHouse attacks on virtualized campus systems, threatening research data, student records, and administrative operations across multiple compliance frameworks.
Sources
- From Linear to Complex: An Upgrade in RansomHouse Encryptionhttps://unit42.paloaltonetworks.com/ransomhouse-encryption-upgrade/Verified
- RansomHouse Ransomwarehttps://www.fortiguard.com/threat-actor/6250/ransomhouse-ransomwareVerified
- Cyber Defense Magazine RSA Edition for 2024https://www.cyberdefensemagazine.com/newsletters/may-2024/files/downloads/Cyber-Defense-Magazine-RSA-Edition-for-2024.pdfVerified
- RansomHouse's New Encryption Upgrades Stunhttps://www.pcrisk.com/internet-threat-news/34638-ransomhouses-new-encryption-upgrades-stunVerified
Frequently Asked Questions
Cloud Native Security Fabric Mitigations and ControlsCNSF
The attack demonstrates the critical importance of Zero Trust Segmentation, East-West traffic controls, strong egress policy enforcement, and centralized threat detection across hybrid and multicloud ESXi environments. Applying these CNSF controls could have prevented initial access, limited lateral movement, detected anomalous behaviors, and stopped data exfiltration—even with advanced ransomware techniques.
Control: Cloud Firewall (ACF)
Mitigation: Reduces attack surface by blocking unauthorized inbound access.
Control: Multicloud Visibility & Control
Mitigation: Detects and alerts on suspicious privilege changes or policy modifications.
Control: Zero Trust Segmentation
Mitigation: Blocks unauthorized east-west traffic and lateral movements.
Control: Inline IPS (Suricata)
Mitigation: Detects and blocks malicious C2 communication attempts.
Control: Egress Security & Policy Enforcement
Mitigation: Prevents unauthorized data transfer to unapproved destinations.
Early detection of ransomware behaviors and encryption anomalies.
Impact at a Glance
Affected Business Functions
- Data Management
- IT Operations
- Customer Service
Estimated downtime: 7 days
Estimated loss: $5,000,000
Sensitive customer data, including personal identification information and financial records, were exfiltrated and publicly disclosed, leading to regulatory penalties and loss of customer trust.
Recommended Actions
Key Takeaways & Next Steps
- • Implement Zero Trust Segmentation to restrict east-west movement and isolate critical ESXi workloads from each other.
- • Enforce strict egress security policies and real-time inline IPS to block command & control and data exfiltration attempts.
- • Use centralized multicloud visibility to detect privilege escalation, policy changes, and anomalous admin behavior promptly.
- • Harden cloud perimeter access with cloud-native firewalls, restricting management interfaces to only authorized entities.
- • Deploy automated threat detection and anomaly response to surface encryption and ransomware activity for immediate mitigation.



