<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Censys — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/censys/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 19 May 2026 12:05:29 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/censys/feed.xml" rel="self" type="application/rss+xml"/><item><title>WantToCry Ransomware Exploits SMB for Remote Encryption</title><link>https://feed.craftedsignal.io/briefs/2026-05-wanttocry-ransomware/</link><pubDate>Tue, 19 May 2026 12:05:29 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wanttocry-ransomware/</guid><description>The WantToCry ransomware exploits exposed SMB services via brute-force for initial access, then exfiltrates files for remote encryption, rewriting the encrypted files to the original locations, demanding ransom payments from $400 to $1,800.</description><content:encoded><![CDATA[<p>WantToCry ransomware, named after the infamous WannaCry worm, targets organizations with internet-exposed SMB services. Unlike WannaCry, WantToCry is not self-propagating but uses brute-force attacks against exposed SMB services on ports 139 and 445. After gaining access, it exfiltrates files via authenticated SMB sessions to attacker-controlled infrastructure where they are encrypted. The encrypted files are then rewritten back to the victim&rsquo;s system using the same SMB sessions. This operation minimizes the detection surface, as it doesn&rsquo;t involve local malware execution or post-compromise activity beyond file exfiltration and rewriting. The attackers leave ransom notes named <code>!Want_To_Cry.txt</code> and append the <code>.want_to_cry</code> suffix to encrypted files. Observed ransom demands ranged from $400 to $1,800.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attackers scan the internet for systems with open SMB ports (139 and 445) using reconnaissance services like Shodan and Censys.</li>
<li>They attempt to gain access to targeted networks via automated brute-force attacks against the exposed SMB services.</li>
<li>Upon successful authentication using compromised or weak credentials, the attackers initiate file exfiltration via authenticated SMB sessions.</li>
<li>The exfiltrated files are then transferred to attacker-controlled infrastructure.</li>
<li>On the attacker-controlled systems, the files are encrypted.</li>
<li>The encrypted files are written back to the original locations on the victims&rsquo; systems via the same authenticated SMB sessions.</li>
<li>A ransom note named <code>!Want_To_Cry.txt</code> is dropped on the affected systems.</li>
<li>The attackers demand ransom payment via qTox or Telegram, ranging from $400-$1800, for the decryption keys, with the objective of financial gain.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>WantToCry ransomware can lead to significant data loss and operational disruption for affected organizations. While the ransom demands ($400-$1800) are relatively low, the impact of data encryption can still be severe. The attacks are focused on systems with exposed SMB services, potentially limiting the scope of encryption. The primary targets appear to be organizations that have misconfigured or inadequately secured SMB services directly exposed to the internet.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Monitor network traffic for sustained SMB read and write operations originating from external IP addresses, especially those from unusual geographic locations, using a network intrusion detection system (IDS) or firewall logs.</li>
<li>Implement account lockout policies and multi-factor authentication (MFA) for SMB services to prevent brute-force attacks; monitor authentication logs for repeated failed login attempts.</li>
<li>Deploy file integrity monitoring (FIM) solutions to detect unauthorized modification of files, particularly the creation of ransom notes named <code>!Want_To_Cry.txt</code>.</li>
<li>Block the listed IOCs (IP addresses) at your network perimeter to prevent communication with known attacker infrastructure.</li>
<li>Enable Sysmon process creation logging with network connection monitoring to enhance visibility into SMB activity for the rules below.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ransomware</category><category>smb</category><category>wanttocry</category></item></channel></rss>