Sekhmet: Targeted Ransomware with Data Theft and Extortion Capabilities

Sekhmet is a sophisticated ransomware family that surfaced in early 2020, used in human-operated attacks against businesses and institutions. It encrypts files on compromised networks and demands a ransom payment in cryptocurrency, threatening to publish stolen data if the victim refuses to pay — a tactic known as double extortion. Sekhmet is believed to be operated by the same group behind the Maze and Egregor ransomware, sharing infrastructure, techniques, and codebase similarities.

The ransomware is named after Sekhmet, the ancient Egyptian goddess of war and retribution — reflecting the threat actors’ intention to intimidate and pressure victims into compliance.

Introduction to Sekhmet

Like its related strains, Sekhmet is deployed after initial access is gained through phishing, remote desktop exploitation, or compromised credentials. Operators move laterally through the network, exfiltrate data, and deploy the ransomware payload manually to maximize damage. The group behind Sekhmet maintains a data leak site, where they publish stolen files from non-compliant victims, adding pressure to pay.


1. How Sekhmet Works

Infection Mechanism:
Sekhmet isn’t distributed automatically like a worm — it’s used in targeted attacks. Entry points include:

Payload Execution:
Once inside the target environment, attackers:

The note provides contact info and threats to leak stolen data if payment is not made.


2. History and Notable Campaigns

Origin and Discovery:
Sekhmet was first observed in the wild in March 2020, and researchers quickly noted similarities with Maze and Egregor ransomware families.

Notable Campaigns:


3. Targets and Impact

Targeted Victims and Sectors:
Sekhmet attacks have affected:

Consequences:


4. Technical Details

Payload Capabilities:

Evasion Techniques:


5. Preventing Sekhmet Infections

Best Practices:

Recommended Security Tools:


6. Detecting and Removing Sekhmet

Indicators of Compromise (IoCs):

Removal Steps:

  1. Immediately isolate infected systems from the network
  2. Power down critical systems to halt propagation
  3. Engage incident response teams to investigate scope and impact
  4. Restore clean systems from offline backups
  5. Rotate all credentials, especially for privileged accounts

Professional Help:
Due to the complexity and data exposure risk, Sekhmet attacks require a professional incident response team, and in many cases, legal counsel and data breach compliance experts.


7. Response to a Sekhmet Infection

Immediate Steps:


8. Legal and Ethical Implications

Legal Considerations:

Ethical Considerations:
Sekhmet’s use of double extortion creates an ethical dilemma: pay to protect victims’ privacy, or refuse and risk data exposure. It also raises questions about the responsibility of companies in securing personal and proprietary data.


9. Resources and References


10. FAQs about Sekhmet

Q: What is Sekhmet ransomware?
A targeted ransomware strain used to encrypt files and extort businesses, often with threats to leak stolen data.

Q: How does Sekhmet spread?
Through phishing, exposed RDP, or stolen credentials, often as part of human-operated campaigns.

Q: Does Sekhmet steal data?
Yes — it exfiltrates data before encryption and threatens to leak it if payment isn’t made.

Q: Can it be decrypted?
No known public decryption tools exist. Recovery depends on backups or paying the ransom (not recommended).


11. Conclusion

Sekhmet is a high-risk ransomware threat tied to some of the most organized and aggressive cybercriminal groups. Its blend of encryption, data theft, and public shaming makes it dangerous not just to IT infrastructure, but to an organization’s brand and trust. Combating Sekhmet requires not just detection tools, but strong preparation, segmentation, and a rapid response plan.

 

 

« Back to the Virus Information Library

« Back to the Security Center