Prince Ransomware – An Open Source Ransomware Builder That Automatically Build Ransomware Freely Available in GitHub

Prince Ransomware – An Open Source Ransomware Builder That Automatically Build Ransomware Freely Available in GitHub

Cybersecurity experts observed the emergence of a concerning trend in which ransomware attacks leveraging malware created with an open-source tool called “Prince Ransomware.”

This Go-language builder was freely available on GitHub, significantly lowering the technical barrier for attackers to launch sophisticated ransomware campaigns.

The tool’s architecture enables even those with limited technical expertise to generate fully functional ransomware by simply modifying a configuration file to customize elements like ransom notes and encrypted file extensions.

Attack vectors vary by deployment, but in documented cases, attackers combined Prince-built ransomware with defense evasion techniques like “Bring Your Own Vulnerable Driver” (BYOVD) and lateral movement tools such as SharpGPOAbuse to maximize impact across networks.

This combination has proven particularly effective, allowing threat actors to disable security products and spread ransomware throughout organizational networks.

WithSecure Labs security analysts noted multiple instances of Prince Ransomware-based attacks, including a prominent case in February 2025, when Taiwan’s Mackay Memorial Hospital fell victim to “CrazyHunter” ransomware.

The initial infection vector was reportedly a USB device inserted into a hospital computer, leading to the encryption of over 600 devices across two branches, severely disrupting hospital operations and patient care.

Prince Ransomware

The researchers found that Prince Ransomware generates variants with minimally modified ransom notes, demonstrating how little customization is needed to deploy new ransomware strains.

The default ransom note template requires just simple text editing:

---------- Prince Ransomware ----------
Your files have been encrypted using Prince Ransomware!
They can only be decrypted by paying us a ransom in cryptocurrency.
Encrypted files have the .prince extension.
IMPORTANT: DO not modify or rename encrypted files, as they may become unrecoverable.
Contact us at the following email address to discuss payment.
[email protected]
---------- Prince Ransomware -------------
Ransom note template by Prince Ransomware (Source – Withsecure)

The encryption mechanism employed by Prince Ransomware demonstrates considerable sophistication. It utilizes a hybrid approach combining ChaCha20 and ECIES cryptography.

For each file, the builder generates a unique ChaCha20 key and nonce, then encrypts using a pattern where 1 byte is encrypted followed by 2 bytes left unencrypted.

The ChaCha20 key and nonce are encrypted using an ECIES public key and appended to the file beginning, making decryption without the private key extremely difficult.

This architecture represents a significant evolution in the ransomware threat landscape, enabling a new generation of cyber attackers to deploy sophisticated encryption capabilities with minimal technical knowledge.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try 50 Request for Free

The post Prince Ransomware – An Open Source Ransomware Builder That Automatically Build Ransomware Freely Available in GitHub appeared first on Cyber Security News.

​The original article found on Cyber Security News Read More

Tags

About Author

Chad Barr

Chad Barr is a visionary and executive leader, blending over two decades of expertise with a unique ability to demystify complex technical concepts. As a cybersecurity leader, prolific author, and director at AccessIT Group, Chad has empowered organizations across diverse industries to build resilient security frameworks. His engaging writing, speaking engagements, and thought leadership inspire proactive cybersecurity practices, making him a trusted voice in the ever-evolving digital landscape.

My Books

Categories