Are HellCat and Morpheus Ransomware Gangs Sharing Code and Tactics?

Recent discoveries in the cybersecurity world have suggested a concerning trend – the emergence of ransomware gangs HellCat and Morpheus, which appear to be sharing code and infrastructure, thus pointing to a deeper level of coordination. Both groups surfaced around mid to late 2024, with researchers uncovering nearly identical ransomware payload structures, implying a shared resource or affiliation.

Shared Code and Operational Techniques

A key observation noted by researchers at SentinelOne is that ransomware payloads from both HellCat and Morpheus retain the original file extensions after encryption. This particular behavior is atypical for other ransomware families and has raised suspicions of a shared codebase or builder application between these two groups. Additionally, the ransom notes used by both gangs follow an identical format, saved as README.txt and opened via notepad, which further underscores a common operational protocol.

Targets and Attacks

HellCat, believed to be operated by notable members of the BreachForums community, has targeted prominent entities, exemplified by a significant attack on Telefónica in January 2025. Morpheus, on the other hand, maintains a lower profile as a semi-private Ransomware-as-a-Service (RaaS) operation. Despite launching a data leak site in December 2024, their activities trace back to September 2024. This resemblance in tactics suggests that affiliates might be leveraging common infrastructures for their attacks.

Similarities in Ransomware Payloads

The theory of a single affiliate behind both campaigns is further supported by the analysis of similar ransomware payloads uploaded to VirusTotal in December 2024. Though differing in victim-specific data and attacker details, the payloads exhibit identical behaviors. They focus on encrypting files and dropping a ransom note without changing file extensions or modifying system settings, strategies tailored to avoid detection.

Connection to Other Ransomware Groups

Interestingly, similarities have also been found between the notes from HellCat/Morpheus and those used by the Underground Team ransomware group, active since early to mid-2023. Despite the similarities in ransom note templates, the Underground Team’s ransomware payloads structurally and functionally differ from those of HellCat and Morpheus. This indicates no direct code sharing or partnership among the three groups but suggests a broader pattern of imitation or inspiration.

Implications of Increased Collaboration

The discoveries point to an increasingly interconnected yet fragmented ransomware ecosystem. The collaboration among various groups is partly driven by law enforcement disruptions of major RaaS operators, which has led to a densely packed and fiercely competitive marketplace. Affiliates are observed frequently shifting between RaaS platforms, reflecting the fluid and dynamic nature of the underground cybercrime environment.

Nation-State Actor Collaboration

Another alarming trend is the growing collaboration between nation-state actors and ransomware groups. These collaborations often involve sharing tactics, techniques, and procedures, further complicating efforts to combat cyber threats. The integration of advanced methods and strategies from nation-state actors into the arsenal of ransomware gangs poses a significant challenge for cybersecurity professionals.

Conclusion

Recent developments in cybersecurity have highlighted a worrisome trend: the appearance of two new ransomware groups, HellCat and Morpheus. These gangs seem to be collaborating closely, sharing both code and infrastructure, which suggests a higher level of coordination between them. Both HellCat and Morpheus emerged around mid to late 2024, and cybersecurity researchers have uncovered ransomware payloads from both groups that are nearly identical. This similarity indicates that they may be using the same resources or might even be affiliated with each other. This revelation is particularly concerning for security experts because it implies that these gangs could harness their combined expertise to create even more sophisticated and damaging ransomware attacks in the future. As these groups collaborate and evolve, the cybersecurity landscape becomes increasingly perilous, requiring even more robust defenses and proactive measures to protect sensitive data and systems. Therefore, organizations need to stay vigilant and continuously update their cybersecurity strategies to counteract these emerging threats effectively.

Explore more

Closing the Feedback Gap Helps Retain Top Talent

The silent departure of a high-performing employee often begins months before any formal resignation is submitted, usually triggered by a persistent lack of meaningful dialogue with their immediate supervisor. This communication breakdown represents a critical vulnerability for modern organizations. When talented individuals perceive that their professional growth and daily contributions are being ignored, the psychological contract between the employer and

Employment Design Becomes a Key Competitive Differentiator

The modern professional landscape has transitioned into a state where organizational agility and the intentional design of the employment experience dictate which firms thrive and which ones merely survive. While many corporations spend significant energy on external market fluctuations, the real battle for stability occurs within the structural walls of the office environment. Disruption has shifted from a temporary inconvenience

How Is AI Shifting From Hype to High-Stakes B2B Execution?

The subtle hum of algorithmic processing has replaced the frantic manual labor that once defined the marketing department, signaling a definitive end to the era of digital experimentation. In the current landscape, the novelty of machine learning has matured into a standard operational requirement, moving beyond the speculative buzzwords that dominated previous years. The marketing industry is no longer occupied

Why B2B Marketers Must Focus on the 95 Percent of Non-Buyers

Most executive suites currently operate under the delusion that capturing a lead is synonymous with creating a customer, yet this narrow fixation systematically ignores the vast ocean of potential revenue waiting just beyond the immediate horizon. This obsession with immediate conversion creates a frantic environment where marketing departments burn through budgets to reach the tiny sliver of the market ready

How Will GitProtect on Microsoft Marketplace Secure DevOps?

The modern software development lifecycle has evolved into a delicate architecture where a single compromised repository can effectively paralyze an entire global enterprise overnight. Software engineering is no longer just about writing logic; it involves managing an intricate ecosystem of interconnected cloud services and third-party integrations. As development teams consolidate their operations within these environments, the primary source of truth—the