On July 22, 2025, cybersecurity researchers uncovered the emergence of GLOBAL GROUP, a sophisticated Ransomware-as-a-Service (RaaS) operation deploying Golang-based ransomware capable of targeting Windows, Linux, and macOS environments. Promoted on underground forums like Ramp4u by an actor using the alias "$$ $", this threat represents a rebrand and evolution of prior strains such as Mamona and Black Lock, incorporating advanced features like AI-driven negotiation chatbots and mobile control panels. With cross-platform compatibility and strong encryption, GLOBAL GROUP poses a significant risk to global sectors, emphasizing the need for enhanced defenses in diverse operating systems. Below, we explore the ransomware's details, deployment methods, tactics, implications, and mitigation strategies.
GLOBAL GROUP's core payload is developed in Golang, enabling a single binary to operate across multiple platforms without recompilation. It employs ChaCha20-Poly1305 for file encryption, appending the ".lockbitloch" extension to affected files and dropping ransom notes with Tor-based contact instructions. The ransomware supports automated attacks, credential theft, and exfiltration, making it suitable for affiliates in a RaaS model.Key features include:
First publicized in June 2025 on Ramp4u, GLOBAL GROUP has rapidly gained attention for its scalability and enterprise-level capabilities.
GLOBAL GROUP operates as a RaaS, providing affiliates with tools for deployment via common vectors like phishing, RDP exploits, and unpatched vulnerabilities. The actor " $$$" markets it as automated and efficient, promising high returns for participants.Typical infection chain:
No specific IOCs have been widely shared yet, but monitoring for unusual Golang processes is advised.
GLOBAL GROUP evolves from earlier operations, blending proven encryption with modern extortion tools. Tactics include double extortionβencrypting and leaking dataβand AI chatbots for automated, persistent negotiations. The group targets global sectors, with early attacks noted in professional services and manufacturing.X posts from users like @MarioNawfal and @R4yt3d highlight its multiplatform menace, linking it to broader 2025 ransomware trends. As a rebrand, it incorporates lessons from predecessors, focusing on speed and adaptability.
GLOBAL GROUP contributes to the booming ransomware scene in 2025, with projections of increased attacks due to its cross-platform reach. Organizations face operational disruptions, data leaks, and financial losses, particularly in hybrid environments. The AI chatbot innovation heightens extortion pressure, potentially leading to higher ransom payments.This aligns with trends like Qilin and Dire Wolf, signaling a shift toward more versatile threats.
To mitigate GLOBAL GROUP:
As ransomware evolves, proactive measures are essential. For IOCs and updates, consult sources like Picus Security and EclecticIQ. Stay vigilant in this dynamic threat landscape.