A U.S. healthcare group was focused in late February by an Iranian ransomware gang with ties to the nation’s authorities, in accordance with a brand new report.
Incident responders at Beazley Safety helped the unnamed healthcare group cope with an assault involving the Pay2Key ransomware — a pressure utilized by Iranian actors for quite a lot of functions since 2020.
Halcyon Ransomware Analysis Middle assisted within the investigation and located a number of enhancements within the ransomware that made it more durable to detect and extra damaging.
The incident responders famous that there was no proof that knowledge was exfiltrated throughout the intrusion — an uncommon growth contemplating U.S. intelligence businesses beforehand stated Pay2Key assaults had been largely performed for info theft.
The researchers famous that Pay2Key has elevated its exercise following the current army battle between the united statesand Iran. Halcyon specialists stated the group “doesn’t at all times seem to prioritize extortion and monetary acquire over the destruction of sufferer environments for strategic impression.”
“This sample suggests motivations that reach properly past typical financially pushed ransomware operations,” they stated.
Cynthia Kaiser, senior vice chairman at Halcyon’s Ransomware Analysis Middle, stated it seems the ransomware assault occurred concurrently to the army battle initiating with Iran however questioned the motives of the incident.
“Is the group simply in search of to maximise cash amongst chaos? It is a group that does work on behalf of the federal government, however not at all times,” stated Kaiser, who beforehand was deputy assistant director within the FBI’s Cyber Division.
The investigation into the incident revealed that the hackers had compromised an administrative account on the sufferer’s community a number of days earlier than deploying the ransomware and encrypting the setting.
Incident responders additionally discovered that the hackers sought to clear all traces of their exercise and occasion logs after encryption.
Expanded concentrating on
Halcyon stated Pay2Key has been navigating by a interval of chaos since final yr. It started advertising and marketing itself closely on Russian cybercriminal boards throughout the summer season, at occasions providing to promote the whole operation for 0.15 BTC whereas additionally actively in search of to convey associates on board.
In July 2025 the group modified its inner guidelines and supplied associates 80% of ransoms obtained as an alternative of the earlier 70%. At the least one Russian safety firm claimed the group was starting to focus on Russian companies.
Kaiser stated the potential sale was probably a smokescreen contemplating the group nonetheless largely conducts assaults alongside Iranian kinetic conflicts. However Halcyon famous that the group’s potential ties to Russian cybercriminal gangs increase “unresolved questions concerning the present possession, operational management, and future trajectory of the group’s RaaS platform.”
Regardless of the upheaval, Pay2Key was nonetheless conducting profitable assaults. Cybersecurity agency Morphisec tracked 51 ransom funds to the group throughout a four-month stretch in the summertime of 2025 amounting to about $4 million. Since then, the group has focused 170 victims and introduced in $8 million in ransom funds.
The group emerged in 2020 and blockchain researchers discovered a number of ransom funds that got here from Israeli victims routed by Excoino, an Iranian cryptocurrency alternate requiring Iranian nationwide ID for account registration.
The 2024 U.S. advisory stated Pay2Key coordinated with different ransomware gangs and focused organizations within the U.S., Israel, Azerbaijan and the United Arab Emirates.
“So it is actually in line with extra of an Iranian authorities operation that is additionally creating wealth on the facet,” Kaiser stated in an interview.
Specialists warned on the onset of hostilities between the U.S. and Iran that cyberattacks could be a key part of the battle.
The assault on the U.S. healthcare agency came about earlier than the headline-grabbing incident involving Stryker, a U.S. medical gadget firm. That assault, which was claimed by one other Iranian group generally known as Handala, triggered widespread chaos when hackers wiped 200,000 firm units.
Kaiser stated the general public ought to assume different Iranian cyberattacks are taking place however haven’t been made public. Assaults just like the one on Stryker have broader implications that might not be stored out of public gentle, she defined.
“Some assaults might have extra restricted impression, and so there is not going to be as a lot publicity round that, however it’s important to assume that Iran is in search of targets, in search of out what they’ll do,” she stated. “And my assumption is that it is a mixture of wiper assaults, ransomware assaults, and trying to focus on essential infrastructure by unpatched vulnerabilities.”
Recorded Future
Intelligence Cloud.
Be taught extra.



















