How Lynx Ransomware Extorts Millions from U.S. Companies

First discovered on July 17, 2024, Lynx ransomware quickly made a name for itself by targeting high-profile U.S. companies and extorting millions in ransom payments. 

Built on the remnants of Quantum and MountLocker, Lynx is now a more organized and aggressive threat, one that zeroes in on environments where disruption and data exposure could be catastrophic.

Who’s Being Targeted

Organizations in healthcare, finance, education, real estate, manufacturing, and more have found themselves in Lynx’s sights. The group uses double extortion tactics, encrypting critical systems and threatening to leak stolen data on their Dedicated Leak Site (DLS) if victims refuse to pay.

For companies handling sensitive client data, this isn’t only a technical issue but also a potential crisis. A public leak could lead to reputational damage, regulatory fines, and lost customer trust. Lynx uses this fear to ramp up pressure and successfully maximizes payouts.

What Makes Lynx Different?

Lynx stands out for how organized it is. It operates as a Ransomware-as-a-Service, but with a strict vetting process for affiliates. Only skilled intruders get in, and the most “profitable” ones are rewarded with better tools and even call center support to pressure victims.

They also take operational security seriously using encrypted channels, custom builds per affiliate, and constantly updating their leak site.

Real-World Example of Lynx Ransomware Attack

A real-world example of a Lynx ransomware attack can be examined inside isolated environments like sandboxes, which allow analysts to safely observe how the malware behaves.

Visual Indicators: The Ransom Note

Inside ANY.RUN’s interactive sandbox, we can see Lynx in action. Once executed, the background of the virtual machine changes to black, displaying a ransom note. It informs the victim that their data has been encrypted and instructs them to download the Tor browser to contact the attackers.

Lynx Ransomware changing the background inside ANY.RUN sandbox

File Encryption Behavior

The sandbox also reveals how the malware begins encrypting files on the system, systematically locking data and changing file extensions to .LYNX, making them inaccessible without the decryption key.

The Files modification tab shows all the file system activity logged during the analysis

Network and Storage Reach

The ransomware is capable of encrypting mounted drives, shared folders, and specific network resources, ensuring widespread damage.

Equip your team with a secure environment to safely analyze suspicious files and respond to threats faster and with greater confidence.
Sign up for ANY.RUN now

Recovery Prevention Techniques

To make recovery nearly impossible, it also deletes shadow copies and backup partitions, cutting off common methods of restoring data without paying the ransom.

Lynx malicious process analysis in the ANY.RUN sandbox

This kind of analysis helps security teams observe the attack step-by-step, identify indicators of compromise, and understand how threats like Lynx operate, which is crucial for timely response, stronger defenses, and minimizing business disruption.

Stay Prepared

Lynx is just one example of how ransomware continues to evolve – faster, smarter, and more disruptive. Having visibility into how these threats work is key to defending your systems and protecting sensitive data.

Try it for yourself: register with ANY.RUN and start exploring threats in real time.