Protos AI Agent, under the supervision of Christabel Lum

The Singapore Cybersecurity Agency (CSA) and ThaiCERT have issued critical advisories on the Dire Wolf Ransomware group, highlighting its growing global operations. On 25 August 2025 alone, five new victims were confirmed, reflecting a rapid escalation in targeting. To date, there are 39 confirmed victims that span manufacturing, technology, finance, healthcare, and logistics sectors globally, showing high activity in Singapore, Thailand, Philippines, and Taiwan.
Dire Wolf employs an advanced double extortion model, encrypting files with Curve25519 + ChaCha20 algorithms while systematically exfiltrating sensitive data. Victims face both operational disruption and public data exposure on Tor-based leak sites, with ransom demands typically around USD $500,000.
The malware, written in Golang and UPX-packed, exhibits strong anti-forensic behavior including disabling Windows event logs, deleting backups, terminating processes, and employing mutexes to prevent reinfection. Its infrastructure relies on Tor hidden services and malicious domains (e.g., tor-browser.io), while ransom negotiations take place over qTox messaging.
The most recent high-profile attack occurred against Wine Works Australia (August 2025), confirming continued campaign activity. Protos Labs, leveraging Protos AI intelligence enrichment and TIPs, has compiled this report to provide defenders with updated TTPs, IOCs, and detection rules for effective monitoring and response.
Note: This report was produced with the assistance of Protos AI. Request demo of Protos AI here →
Dire Wolf ransomware emerged in May 2025 and has since been linked to at least 39 confirmed victims worldwide. The group’s operations align with broader ransomware trends but stand out due to:
CSA’s advisory underlines the urgent need for organizations, particularly in manufacturing, technology, and finance, to strengthen incident response preparedness.
Since May 2025, Dire Wolf ransomware has been linked to at least 39 confirmed victim organizations worldwide. The majority of these incidents have affected the manufacturing, technology, and finance sectors, though activity has also been observed in healthcare and logistics, reflecting the group’s willingness to target a wide range of critical industries. Geographically, attacks span at least 11 countries, including the United States, Thailand, Taiwan, Singapore, Italy, and Canada. Based on number of victims in the region, there appears to be focus on Singapore, Thailand, Philippines, and Taiwan.
The impact of these attacks is consistent across cases. Victims experience both file encryption and sensitive data theft, with stolen information published on Tor-based leak sites if ransom demands are not met. Ransom requests typically average around USD $500,000, and the resulting disruption often includes significant downtime and reputational damage. Attribution to Dire Wolf in these campaigns is assessed with high confidence, based on forensic analysis, ransom note artifacts, and corroborating activity on their leak site.
The most recent high-profile incident occurred in August 2025, when Dire Wolf targeted Wine Works Australia, an organization in the agriculture and food production sector. This attack followed the group’s established double extortion playbook, involving encryption, data theft, and exposure via the Tor leak site. The timeline aligns with Dire Wolf’s ongoing global campaign activity, and attribution is again assessed with high confidence, supported by malware sample hashes, ransom note content, and overlaps in Tor-based infrastructure with earlier campaigns.
To better understand Dire Wolf’s operational playbook, we map their observed and suspected behaviors to the MITRE ATT&CK framework. This provides defenders with a structured view of how Dire Wolf gains access, executes ransomware, evades defenses, and pressures victims into ransom payment. The techniques listed below highlight both confirmed and suspected tradecraft, with ATT&CK identifiers to support alignment with existing detection and response controls. Refer to Annex for the summarized list
Beyond tactics and procedures, Dire Wolf’s operations leave behind observable technical footprints that can support detection and response. The following Indicators of Compromise (IOCs) have been extracted from confirmed Dire Wolf ransomware samples, enriched via VirusTotal and threat intelligence feeds, and validated against multiple sources. These IOCs provide defenders with actionable artifacts for detection, hunting, and correlation across logs, endpoint sensors, and network monitoring tools. While not exhaustive, this inventory captures the most reliable file hashes, domains, infrastructure elements, and related malware families linked to recent campaigns.
Leak Site: hxxp://direwolfcdkv5whaz2spehizdg22jsuf5aeje4asmetpbt6ri4jnd4qd[.]onion (Tor network)
Malicious Infrastructure: tor-browser[.]io (malicious domain, C2 server, used in social engineering campaigns)
Subdomains:
AgentTesla, Dridex: These malware families are referenced in relation to Dire Wolf’s infection chains, particularly for credential theft and initial access.
Dire Wolf ransomware continues to pose a significant threat to global manufacturing, technology, and finance sectors, with a recent surge in double extortion attacks across 11 countries. The group’s technical sophistication, advanced encryption, anti-forensics, and targeted infrastructure, demands robust sector-specific defense, incident response, and insurance risk assessment. Organizations should prioritize patching, phishing resistance, credential protection, proactive monitoring for IOCs, resilient backups, and a well-rehearsed incident response plan. Continuous threat intelligence enrichment and sector collaboration remain essential.
Sources
Everything you need to run your first AI-powered CTI investigation. Leverage OSINT with Protos AI's Agentic AI capability.