Analysis of Encryption Structure of Yurei Ransomware Go-based Builder

Nov. 14, 2025, 12:46 p.m.

Description

The Yurei ransomware group, first identified in September 2025, employs a typical ransomware operation model targeting corporate networks. Their attacks have affected Sri Lanka and Nigeria, focusing on transportation, IT, marketing, and food industries. The ransomware, developed in Go, uses ChaCha20-Poly1305 for file encryption and secp256k1-ECIES for key protection. It excludes specific directories, extensions, and files from encryption to maintain system functionality. The encryption process generates a unique key and nonce for each file, ensuring only the threat actor can decrypt the data. The ransom note threatens data leaks and regulatory notifications if demands are not met within five days.

Date

  • Created: Nov. 14, 2025, 12:16 p.m.
  • Published: Nov. 14, 2025, 12:16 p.m.
  • Modified: Nov. 14, 2025, 12:46 p.m.

Indicators

  • 1ea37e077e6b2463b8440065d5110377e2b4b4283ce9849ac5efad6d664a8e9e

Attack Patterns

Additional Informations

  • Food
  • Technology
  • Media
  • Transportation
  • Nigeria
  • Sri Lanka