Embargo

MITRE
Malware Type:
Other
First seen:
Unknown
Last seen:
Unknown
Details:

[Embargo](https://attack.mitre.org/software/S1247) is a ransomware variant written in Rust that has been active since at least May 2024.(Citation: Cyble Embargo Ransomware May 2024)(Citation: ESET Embargo Ransomware October 2024) [Embargo](https://attack.mitre.org/software/S1247) ransomware operations are associated with “double extortion” ransomware activity, where data is exfiltrated from victim environments prior to encryption, with threats to publish files if a ransom is not paid.(Citation: Cyble Embargo Ransomware May 2024)(Citation: ESET Embargo Ransomware October 2024) [Embargo](https://attack.mitre.org/software/S1247) ransomware has been known to be delivered through a loader known as MDeployer which also leverages a malware component known as MS4Killer that facilitates termination of processes operating on the victim hosts.(Citation: ESET Embargo Ransomware October 2024) [Embargo](https://attack.mitre.org/software/S1247) is also reportedly a Ransomware as a Service (RaaS).(Citation: ESET Embargo Ransomware October 2024)

Associated Techniques (22)
ID ATT&CK Tactics
T1007 System Service Discovery -
T1027.013 Encrypted/Encoded File -
T1053.005 Scheduled Task -
T1057 Process Discovery -
T1059.003 Windows Command Shell -
T1068 Exploitation for Privilege Escalation -
T1070.004 File Deletion -
T1083 File and Directory Discovery -
T1106 Native API -
T1112 Modify Registry -
T1135 Network Share Discovery -
T1140 Deobfuscate/Decode Files or Information -
T1480.002 Mutual Exclusion -
T1486 Data Encrypted for Impact -
T1489 Service Stop -
Used by Actors (1)
Metadata
ID: 369
Created: 13/01/2026 17:48
Updated: 06/03/2026 16:00