New Cephalus Ransomware Uses RDP for Initial Access

5g (6)

A newly discovered ransomware family named Cephalus has emerged as a serious cyber threat, infiltrating organizations by exploiting compromised Remote Desktop Protocol (RDP) credentials that lack multi-factor authentication (MFA).

The ransomware’s name comes from Greek mythology, referencing Cephalus, the son of Hermes, who accidentally killed his wife with an infallible javelin. This symbolism underscores the destructive precision of the malware’s design.

Distinctive Characteristics of Cephalus

Unlike many ransomware strains, Cephalus stands out with its unique infection techniques and advanced evasion methods. After gaining access, attackers exfiltrate sensitive data to the MEGA cloud storage platform before deploying the ransomware payload.

screenshot
Process lineage showing use of MEGA (Source: Huntress)

DLL Sideloading via Security Software

Huntress researchers identified Cephalus in two confirmed incidents on August 13 and 16, 2025, where it successfully compromised organizations using SentinelOne security products.

The malware abuses a legitimate SentinelOne executable, SentinelBrowserNativeHost.exe, by placing it in the Downloads folder. From there, it sideloads a malicious DLL named SentinelAgentCore.dll, which then loads an additional file, data.bin, containing the ransomware code.

This multi-stage execution chain provides stealth, enabling the malware to bypass standard detection mechanisms.

System Disruption and Defense Evasion

Once active, Cephalus immediately executes system recovery prevention measures, beginning with the command:

vssadmin delete shadows /all /quiet

This deletes all shadow copies, making recovery through snapshots impossible.

It then executes PowerShell commands to disable Windows Defender, creating exclusions for file types like .cache, .tmp, .dat, and .sss.

Registry modifications are also applied to disable:

  • Real-time protection
  • Behavior monitoring
  • On-access protection

In addition, Cephalus stops services such as SecurityHealthService, Sense, WinDefend, and WdNisSvc, further weakening defenses.

Ransom Note and Extortion Strategy

cephalus ransom note posted publicly on twitter (source huntress)
Cephalus ransom note posted publicly on Twitter (Source: Huntress)

The ransomware encrypts victim files with the “.sss” extension and drops recover.txt ransom notes.

A unique feature of Cephalus ransom demands is their reference to real-world news articles about past ransomware incidents, an intimidation tactic meant to enhance credibility and pressure victims into payment.

Defense Recommendations

To reduce exposure and mitigate risks, organizations should:

  • Implement MFA for all RDP access.
  • Monitor for legitimate security tool executables placed in unusual directories.
  • Maintain robust Endpoint Detection and Response (EDR) capabilities to spot anomalous activity.