threatintel
actor tracker
All actors

INC Ransom

inc-ransom · primary source: Other · first observed 2023
RU · RussiaRansomwareLow confidencelast cited Nov 27, 2024 · 1.5y ago

Russian-speaking ransomware-as-a-service operation active since mid-2023, notable for sustained targeting of UK NHS trusts and U.S. healthcare providers. Major UK incidents: **NHS Dumfries and Galloway** (March 2024 — 3TB exfiltrated, 150,000 patient records subsequently leaked when ransom was refused), **NHS Alder Hey Children's Hospital + Liverpool Heart and Chest** (November 2024). The brand's source code was reportedly sold by an operator on RAMP forum in May 2024 for $300,000 — Lynx ransomware (active since mid-2024) is the suspected derivative.

Aliases

Lynx (suspected fork)Other

Motivations

financial gain

Target sectors

healthcareeducationgovernmentmanufacturing

Target countries

GBUSDEFR

Diamond Model

Caltagirone / Pendergast / Betz 2013 — four-vertex attribution framework.

Adversary
  • INC Ransom
  • Russia
  • financial gain
Infrastructure
Victim
  • healthcare
  • education
  • government
  • GB
  • US
  • +1 more

MITRE ATT&CK techniques

Timeline

2 events

Indicators of compromise

2 indicators
csv
TypeValueFirst seenSource
Name
INC-README.txt
family · INC Ransomware
Ransom note filename dropped per directory by INC Ransom (also seen as INC-README.html / *.inc-readme.txt). Documented in Huntress and Secureworks (GOLD IONIC) analyses.
Jul 31, 2023Sophos / Secureworks CTU
SHA-256
accd8bc0d0c2675c15c169688b882ded17e78aed0d914793098337afc57c289c
family · INC Ransomware
INC Encryptor binary (PDB string 'C:\source\INC Encryptor\Release\INC Encryptor.pdb') used in the early INC Ransom intrusions investigated by Huntress and mapped to MITRE ATT&CK software entry S1139.
Jul 31, 2023Huntress

Leak-site activity (unverified)

full feed →

Recent victim disclosures posted by this group on its leak site, via ransomware.live. These are unverified attacker claims — ransomware crews routinely fabricate, double-post, or inflate victims. Surface only.

  • 05-18bergen1.netUS
  • 05-17metaval.com.auAU
  • 05-15defenseisready.comUS
  • 05-15lafj.orgUS
  • 05-15United Quality Cooperative / www.uqcoop.comUS

Related actors

shared ATT&CK techniques

References

cite this page

Threat Intel Tracker. (2026-05-19). INC Ransom — actor profile. Retrieved from https://threatintel.local/actors/inc-ransom

latest cited activity · 2024-11-28 · 2 cataloged indicators