Don’t let overlooked obligations become incidents. Learn how.
Utility navigation bar redirect icon
Portal LoginSupportContact
Search
Close search
Huntress Logo in Teal
  • Platform Overview
    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed EDR

    Get full endpoint visibility, detection, and response.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed ITDR

    Protect your Microsoft 365 identities and email environments.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed SIEM

    Managed threat response and robust compliance support at a predictable price.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed Security Awareness Training

    Empower your teams with science-backed security awareness training.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ISPM

    Continuous Microsoft 365 and identity hardening, managed and enforced by Huntress experts.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Managed ESPM

    Proactively secure endpoints against attacks.

    Integrations
    Integrations
    Support Documentation
    Support Documentation
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
    See Huntress in Action

    Quickly deploy and manage real-time protection for endpoints, email, and employees - all from a single dashboard.

    Huntress Cybersecurity
  • Threats We Stop
    Phishing
    Phishing
    Business Email Compromise
    Business Email Compromise
    Ransomware
    Ransomware
    Infostealers
    Infostealers
    View Allright arrowView Allright arrow
    Industries We Serve
    Education
    Education
    Financial Services
    Financial Services
    State and Local Government
    State and Local Government
    Healthcare
    Healthcare
    Law Firms
    Law Firms
    Manufacturing
    Manufacturing
    Utilities
    Utilities
    View Allright arrowView Allright arrow
    Tailored Solutions
    MSPs
    MSPs
    Resellers
    Resellers
    SMBs
    SMBs
    Compliance
    Compliance
    What Gets Overlooked Gets Exploited

    Most days, nothing happens. But one day, something will.

    Huntress Cybersecurity
    Cybercriminals Have Evolved

    Get the intel on today’s cybercriminal groups and learn how to protect yourself.

    Huntress Cybersecurity
  • Pricing
  • Community Series
    The Product Lab

    Shape the next big thing in cybersecurity together.

    The Product Lab

    Shape the next big thing in cybersecurity together.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Fireside Chat

    Real people. Real perspectives. Better conversations.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    Tradecraft Tuesday

    No products, no pitches – just tradecraft.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    _declassified

    Exposing hidden truths in the world of cybersecurity.

    Resources
    Upcoming Events
    Upcoming Events
    Ebooks
    Ebooks
    On-Demand Webinars
    On-Demand Webinars
    Videos
    Videos
    Whitepapers
    Whitepapers
    Datasheets
    Datasheets
    Cybersecurity Education
    Cybersecurity 101
    Cybersecurity 101
    Cybersecurity Guides
    Cybersecurity Guides
    Threat Library
    Threat Library
    Real Tradecraft, Real Results
    Real Tradecraft, Real Results
    2026 Cyber Threat Report
    2026 Cyber Threat Report
    The Huntress Blog
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    Huntress Lands on the Microsoft Marketplace
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    How Huntress & DEFCERT Are Streamlining CMMC Assessment Prep
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
    Live Hacking Into Microsoft 365 with Kyle Hanslovan
    Huntress Cybersecurity
  • Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    Why Huntress

    Go beyond AI in the fight against today’s hackers with Huntress Managed EDR purpose-built for your needs

    Huntress Cybersecurity
    The Huntress SOC

    24/7 Security Operations Center

    The Huntress SOC

    24/7 Security Operations Center

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Reviews

    Why businesses of all sizes trust Huntress to defend their assets

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Case Studies

    Learn directly from our partners how Huntress has helped them

    Community

    Get in touch with the Huntress Community team

    Community

    Get in touch with the Huntress Community team

    Compare Huntress
    Bitdefender
    Bitdefender
    Blackpoint
    Blackpoint
    Breach Secure Now!
    Breach Secure Now!
    Crowdstrike
    Crowdstrike
    Datto
    Datto
    SentinelOne
    SentinelOne
    Sophos
    Sophos
    Compare Allright arrowCompare Allright arrow
  • HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    HUNTRESS HUB

    Login to access top-notch marketing resources, tools, and training.

    Huntress Cybersecurity
    Partners
    MSPs

    Join our partner community to deliver expert-led managed security.

    MSPs

    Join our partner community to deliver expert-led managed security.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Resellers

    Partner program designed to grow your cybersecurity business.

    Tech Alliances

    Driving innovation through global technology Partnerships

    Tech Alliances

    Driving innovation through global technology Partnerships

    Microsoft Partnership

    A Level-Up for Your Business Security

    Microsoft Partnership

    A Level-Up for Your Business Security

  • Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Press Release
    Huntress Announces Collaboration with Microsoft to Strengthen Cybersecurity for Businesses of All Sizes
    Huntress Cybersecurity
    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Our Story

    We're on a mission to shatter the barriers to enterprise-level security.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Newsroom

    Explore press releases, news articles, media interviews and more.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Meet the Team

    Founded by former NSA Cyber Operators. Backed by security researchers.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Careers

    Ready to shake up the cybersecurity world? Join the hunt.

    Awards
    Awards
    Contact Us
    Contact Us
  • Portal Login
  • Support
  • Contact
  • Search
  • Get a Demo
  • Start for Free
Portal LoginSupportContact
Search
Close search
Get a Demo
Start for Free
HomeBlog
Dispelling Ransomware Deployment Myths
Published:
October 16, 2025

Dispelling Ransomware Deployment Myths

By:
Harlan Carvey
Lindsey O'Donnell-Welch
Share icon
Glitch effectGlitch effectGlitch effect

When a ransomware attack occurs, the focus is most often on the encryption of files. Initial access is often glossed over or simply assumed. In addition, actions taken by a threat actor, by a human making decisions (and sometimes, mistakes) are attributed to the malware itself, often seen in phrases such as, “...the ransomware embedded itself in the C:\Temp folder…”. What may not be as obvious–at least not in public reporting or media reports–are the steps in between initial access and the point of the attack where files are encrypted and ransom notes are written. For example, techniques used for data staging, data exfiltration, and the actual deployment of ransomware are often assumed or simply skipped.

Due to the breadth of our customer base, Huntress has visibility into a wide range of activity, and that allows us to focus on multiple steps in the attack chain. The breakdown of different attacker methods across all these different stages is invaluable for businesses, as it sheds more light on opportunities for prevention and detection, and helps to provide insight into appropriate responses.

While we’ve covered the former two stages in previous posts, today we’ll look more closely at how Huntress analysts have seen threat actors deploying ransomware in attacks. 


What does "ransomware deployment" actually mean? 

Before we go into the specific techniques we’ve seen, let’s first separate reality from misunderstanding when it comes to ransomware deployment.

A Google Search for “how is ransomware deployed” shows the “AI Overview” results illustrated in Figure 1.

Figure 1: AI Overview result for “how is ransomware deployed?”


While the above shows how ransomware actors operate in the very early stages of the attack, it doesn't fully capture what happens after that initial point of access, and what methods and tools they use in that phase. With over four million monitored endpoints and numerous incidents, Huntress analysts are more fully able to provide an in-depth view into this phase.

Generally speaking, there’s also a misconception generated by and shared via online media around the actions behind ransomware deployment. We see statements such as the one above, saying “the ransomware can then spread…” or other phrases that state: “the ransomware uses stolen credentials to access systems via the Remote Desktop Protocol (RDP)...” However, this simply isn’t the case at all.

In the vast majority of incidents reported by the Huntress SOC, ransomware executables may take some steps to disable recovery options or evade defenses, but the primary job of the executable is to encrypt files and deposit a ransom note; it’s usually the threat actor who is responsible for accessing systems, copying files to specific folders, and for deploying the ransomware executable itself.

Also, we want to make clear that variants that follow the “ransomware-as-a-service” (RaaS) model, such as Akira, are deployed by different affiliates, and as such, different affiliate actors may use similar or vastly different techniques. As such, for RaaS variants, it can be misleading to state something like: “Akira ransomware is deployed in this manner…” because the deployment mechanism, and the actions leading up to that point, can be vastly different depending upon the affiliate. 

The purpose of this article is to state clearly and concisely what Huntress analysts have observed across multiple ransomware incidents, including those where the Huntress agent was installed post-incident, after files were encrypted. 


On-host deployment

One ransomware deployment method involves copying the ransomware executable to the endpoint and then manually launching it. This is something Huntress SOC analysts have observed across a number of ransomware families, including ReadText34, INC, Crux, Cephalus, and Akira. In these incidents, the threat actor accesses each endpoint, usually via the Remote Desktop Protocol (RDP), and then manually copies the ransomware executable over to the endpoint before launching it via a command prompt or via PowerShell.

For example, across Akira ransomware incidents where the executable is deployed in this manner, the executable is observed being launched from the root of the C:\ProgramData folder, with various names, and almost immediately after, the following child process is observed:

powershell.exe -Command "Get-WmiObject Win32_Shadowcopy | Remove-WmiObject"

In the case of the Crux ransomware, Huntress analysts have observed the ransomware being launched from various folders, including C:\Windows and C:\Temp, and with various file names. However, commonalities across the incidents include the fact that the ransomware process first spawns an instance of the legitimate Windows service host utility, svchost.exe, with the same command line options as the parent process, and that child process then spawns the following command line:

Cmd.exe /c bcdedit /set {default} recoveryenabled No & bcdedit /set {default} bootstatuspolicy ignoreallfailures

Huntress analysts recently caught several incidents early on in the ransomware deployment phase of the attack. In these incidents, an Akira ransomware affiliate was using compromised credentials for MSP remote monitoring and management (RMM) instances in an attempt to deploy the ransomware. The Huntress SOC became aware of this threat actor methodology when pre-ransomware activity/TTPs were identified on several customer infrastructures under the same partner.

In these incidents, however, the threat actor or group started deploying the Akira ransomware executable on a limited number of endpoints by logging in, copying the malware to the endpoint, and launching it manually. This allowed the Huntress SOC to detect and quickly respond to the execution, or to install antivirus software detecting the execution of the ransomware, isolating all involved endpoints. 


Deploying over the network

Another means for deploying ransomware involves copying the ransomware executable to a single “nexus” endpoint, and then launching the ransomware process “over the network,” often via UNC paths.

An example of ransomware that has been observed being deployed in this manner is SafePay. Prior to deploying the ransomware, a threat actor will often exfiltrate data and enumerate the network, obtaining a list of accessible endpoints. Then, when they’re ready to deploy the ransomware, you’ll see a number of processes similar to the following, launched in rapid succession:

regsvr32.exe  /n /i:"-pass=[REDACTED] -enc=3 -uac -path=\\[REDACTED\C$\ " C:\locker.dll

The target UNC path (redacted in the above example) will change, and the target share (C$ in the above example) will often change, as well. 

Akira ransomware has been observed being deployed via UNC paths. Different affiliates may use different methods for deploying the ransomware, which will include a command line option for deploying it against remotely accessible shares.


Use of PSExec/GoGo.exe

A hybrid approach that can be used to deploy ransomware executables over UNC paths is the use of the freely available Microsoft utility, PSExec. This tool, and its variants, allow an actor with the appropriate privileges to copy executables over to remotely accessible systems and launch them with given parameters. 

Huntress analysts recently observed an incident where the threat actor used a custom tool named ps_bulk.exe, renamed to GoGo.exe, to push a PLAY ransomware executable out to other endpoints within the network, using command lines similar to the following:

C:\Users\Public\Music\GoGo.exe  -i ip.dll -f xxx.exe -m p -u [REDACTED] -p [REDACTED] -t 224

When launched, the command line would spawn multiple PsExec64.exe processes; Figure 2 illustrates the GoGo.exe process tree.

Figure 2: GoGo.exe Process Tree


Deploying via the Active Directory server

Huntress recently published a blog post describing how the Obscura ransomware was placed on a domain controller, in the NETLOGON share, and launched on individual endpoints through the use of Scheduled Tasks. 

This technique, and similar ones, are not new. This Secureworks blog post from 2016 references an incident from the end of 2015 where a ransomware executable was placed on a domain controller, and intended as a distraction. Thanks to the likely intentional misspelling of the domain name, the ransomware was not actually launched on any endpoints, but instead drew defenders’ attention away from the threat actor’s true intentions. 


Phases of the attack lifecycle

When we break down and compartmentalize the attack lifecycle, it helps reduce complexity and makes breaches easier to understand and address. Ransomware threat actors, in particular, include a number of consistent steps in their attacks, going from initial access to recon and endpoint enumeration, maybe privilege escalation (if needed), to data staging and exfiltration, and then finally, ransomware deployment. Delving deeply into each of these steps helps to pull back the veil of mystery and wrap our arms–and our heads–around these activities. From this, we can develop cyber resiliency.

In order to counter ransomware threats, organizations first need to develop an accurate asset inventory of physical and virtual endpoints, as well as applications. Then, they should engage in attack surface reduction. This includes considering what needs to be publicly accessible, how protections should be in place, and what should be removed from public access.

Next, businesses should fully deploy monitoring and detection capabilities, such as EDR and SIEM. Not doing so means that a threat actor can gain access to an unmanaged endpoint, perform all of their preparatory activities without tripping any alarms, and then finally deploy ransomware across the infrastructure, without ever being detected.




Categories
Cybersecurity Education
Summarize this postClose Speech Bubble
ChatGPTClaudePerplexityGoogle AI

Stop Ransomware Before It Stops Your Business.

Cybercriminals never rest, but you can. Request a free demo to see how Huntress delivers the 24/7 monitoring and protection your institution needs to stay resilient against evolving threats.
Book a Demo
Share
Facebook iconTwitter X iconLinkedin iconDownload icon
Glitch effect

You Might Also Like

  • ReadText34 Ransomware Incident

    Huntress analysts see a number of attacks on a daily and weekly basis, some of which include ransomware attacks. Now and again, Huntress analysts will observe a ransomware attack that stands out in some novel manner.
  • BlackCat Ransomware Affiliate TTPs

    This blog post provides a detailed look at the TTPs of a ransomware affiliate operator. In this case, the endpoint had been moved to another infrastructure (as illustrated by various command lines, and confirmed by the partner), so while Huntress SOC analysts reported the activity to the partner, no Huntress customer was impacted by the ransomware deployment.
  • It’s Not Safe to Pay SafePay

    Huntress has observed Akira ransomware affiliates in action, as well as ReadText34 and INC ransomware being deployed.
  • Exposing Data Exfil: LOLBins, TTPs, and Binaries…Oh, My!

    Threat actors often steal data during the course of their attacks. This is particularly true for ransomware threat actors, who do it before deploying file encryption in order to engage in “double extortion” activities. This activity can be difficult to detect, particularly if it’s not dissimilar to legitimate actions taken by system administrators.
  • Kawabunga, Dude, You’ve Been Ransomed!

    Thanks in large part to our customer base, Huntress sees a great deal of interesting activity, particularly from threat actors (but also from admins). Part of that activity includes not just ransomware variants that Huntress hasn’t seen before, but also variants that may not have been documented via any public means. Further, when these incidents occur, Huntress very often gets a detailed look at the threat actor’s activity, including commands and their timing.
  • Data Exfiltration and Threat Actor Infrastructure Exposed

    Threat actors are people, too, and like everyone else, make mistakes. These mistakes can reveal insights into the threat actor, or even expose access to their infrastructure.
  • Obscura, an Obscure New Ransomware Variant

    Huntress found a previously unseen ransomware variant called Obscura on a victim company’s domain controller.
  • Ransomware Deployment Attempts Via TeamViewer

    Huntress analysts continue to observe access to endpoints via legacy TeamViewer installations, and/or compromised TeamViewer credentials.

Sign Up for Huntress Updates

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.
Privacy • Terms
By submitting this form, you accept our Terms of Service & Privacy Policy
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Huntress Managed Security PlatformManaged EDRManaged EDR for macOSManaged EDR for LinuxManaged ITDRManaged SIEMManaged Security Awareness TrainingManaged ISPMManaged ESPMBook a Demo
PhishingComplianceBusiness Email CompromiseEducationFinanceHealthcareManufacturingState & Local Government
Managed Service ProvidersResellersIT & Security Teams24/7 SOCCase Studies
BlogResource CenterCybersecurity 101Upcoming EventsSupport Documentation
Our CompanyLeadershipNews & PressCareersContact Us
Huntress white logo

Protecting 215k+ customers like you with enterprise-grade protection.

Privacy PolicyCookie PolicyTerms of UseCookie Consent
Linkedin iconTwitter X iconYouTube iconInstagram icon
© 2025 Huntress All Rights Reserved.

Join the Hunt

Get insider access to Huntress tradecraft, killer events, and the freshest blog updates.

By submitting this form, you accept our Terms of Service & Privacy Policy