From RALord to Nova: How This RaaS Gang Is Wreaking Havoc Worldwide

  • January 13, 2026

Explore Nova ransomware (formerly RALord) its recent attacks, evolution, and key indicators. Learn how this RaaS group operates, stats on victims, and MITRE-based tactics.

This group, which was previously known by the name RALord, rebranded in approximately April 2025. Therefore, it did not take them long to become a force to be reckoned with in the ransomware-as-a-service (RaaS) market. The fact is that the number of victims they have targeted stands at over 86, spread across five continents by early 2026.

For instance, in January 2026, Nova launched several confirmed attacks, including the breach of Epi du Rouergue, which is a food production company, on January 6, followed by an attack on the Cisneros Group, a global conglomerate in the media and entertainment sectors, on January 11, and an attack on Dubai Air Wing on January 13, in which the group claimed to have breached systems and stolen internal data.

Nova Ransomware by the Numbers 2026

GLOBAL IMPACT DASHBOARD
CRITICAL THREAT LEVEL
Confirmed Targets 0
[ NODES_COMPROMISED ]
Data Exfiltration 0%
STEALER_NET_SYNC
Ransom Window 0d
ESTIMATED_DEMAND_DELAY

d=Day

Sector Analysis
Technology11 Units
Healthcare11 Units
Manufacturing9 Units
Education7 Units
Hospitality and Tourism3 Units
Geographic Spread
United States10 Nodes
France8 Nodes
Brazil6 Nodes
Netherlands5 Nodes
Spain5 Nodes

Major Nova Attacks and Targets

Some notable Nova incidents include:

  • Dubai Air Wing (UAE, January 13, 2026): This is another organization in the UAE that was listed on the leak site by Nova for having its internal information stolen.
  • Cisneros Group (Global, January 11, 2026): The attackers focused on this large media and entertainment conglomerate, boasting that they had gained access to the company’s systems and stolen important business information.
  • Epi du Rouergue (France, January 6, 2026): Nova launched an attack on this company that produces food, encrypting their internal systems and including it in their leak list.
  • Novabio Laboratories (France, December 10, 2025): The attacker, named Nova, announced that they had encrypted approximately 500GB of data from this lab, which was a healthcare facility, and asked for payment in return for the decryptor.
  • ANG BROTHERS (Singapore, December 2025): The syndicate announced a breach on this plumbing & HVAC company, warning of a data dump of 2.5TB of stolen corporate data if a ransom wasn’t paid.
  • Clinical Diagnostics (Netherlands, July 2025): This was the cancer screening lab that Nova targeted, encrypting the systems and taking valuable patient information. After the first ransom payment, the gang unexpectedly doubled the ransom, reflecting the unpredictability of the extortion practices of Nova.

Nova Operational Profile

THREAT LEVEL: ACTIVE
MARCH 2025 Started as RALord
APRIL 2025 Nova Rebranding
MAY 2025+ Advanced Portal
RaaS Revenue Share
AFFILIATE 85% OP 15%

The group aims for rapid growth by attracting more attackers with a lower operational cut.

Attack Vectors
Phishing & Infiltration via Exposed Services
Disabling Security Software
Destruction of Backup Systems
Data Theft & Double Encryption

Rebranding and RaaS Model

Initially, Nova operated as RALord in March of 2025, following the conventional RaaS affiliate business model. The affiliates received approximately 85% of any ransom payment, while the operators received the remaining amount. Towards the end of April 2025, the group renamed its leak site “Nova.” However, it continued to offer similar services.

Moreover, the new portal brought with it functionalities such as the “Nova Chat” channel and the affiliate registration form. Security researchers point out that the tactics used by Nova resemble those used by ransomware attackers, where the attackers enter the system (either through phishing attacks or exposed services) and proceed to shut down the backups and security solutions before stealing and/or encrypting the data. Thus, the progression of Nova indicates efficiency, where the attackers quickly rebrand and use the affiliate program to deliver the payload.

MITRE ATT&CK Tactics, Techniques, and Procedures (TTPs)

Tactic Technique Description
Initial Access (TA0001) T1078
T1566
T1133
Valid Accounts: Attackers use stolen or compromised credentials, often obtained via infostealer malware, to gain initial access.
Phishing: Nova affiliates deliver the initial payload via phishing emails with malicious attachments or links.
External Remote Services: Exposed RDP and VPN services are abused using stolen credentials to access internal networks.
Execution (TA0002) T1059
T1204
Command and Scripting Interpreter: Nova executes commands using PowerShell, CMD, and its Rust-based ransomware payload.
User Execution: The victim is tricked into running a malicious file, often delivered through phishing.
Persistence (TA0003) T1547
T1133
Boot or Logon Autostart Execution: Registry run keys or startup folders are used to maintain persistence.
External Remote Services: Previously compromised RDP or VPN access is reused to keep access.
Privilege Escalation (TA0004) T1078
T1068
Valid Accounts: Stolen administrator or domain credentials are used to gain elevated privileges.
Exploitation for Privilege Escalation: Local vulnerabilities are exploited to gain higher-level access.
Defense Evasion (TA0005) T1027
T1497
T1070
Obfuscated Files or Information: Nova’s Rust-based payload provides inherent obfuscation.
Virtualization/Sandbox Evasion: Delayed execution and environment checks evade analysis.
Indicator Removal on Host: Logs and forensic artifacts are deleted.
Discovery (TA0007) T1083
T1082
T1012
File and Directory Discovery: Nova scans systems to identify files for encryption.
System Information Discovery: OS and configuration details are collected.
Query Registry: Registry keys are queried to detect security software.
Lateral Movement (TA0008) T1021
T1550
Remote Services: RDP and SMB are used for lateral movement.
Use Alternate Authentication Material: Pass-the-hash and similar techniques enable movement without passwords.
Collection (TA0009) T1005
T1074
Data from Local System: Sensitive data is collected from compromised hosts.
Data Staged: Data is staged locally before exfiltration.
Exfiltration (TA0010) T1048 Exfiltration Over Alternative Protocol: Stolen data is transferred to attacker-controlled infrastructure using cloud services or custom protocols.
Impact (TA0040) T1486
T1490
T1491
Data Encrypted for Impact: Files are encrypted and the .ralord extension is added.
Inhibit System Recovery: Backups and Shadow Copies are deleted.
Defacement: Ransom notes and desktop changes are used to intimidate victims.

Case Study: Xcitium vs. Nova Ransomware

This demo illustrates how Xcitium protects against the Nova ransomware in real-time during a live attack simulation. A number of Nova variants are deployed to simulate a sophisticated attack attempt on a large scale. Contrary to other security tools that wait for cloud responses or signature patterns to identify threats, the Zero-Dwell functionality in Xcitium considers all unknown processes as malicious and isolates them upon execution.

Because of this automatic isolation, the capabilities that the Nova malware lacks include encrypting files, persisting in the system, and communication with the command and control server, even for new or altered versions that have not been seen before.

With Xcitium, this exposure window is eliminated altogether, providing constant security that keeps your systems up and running and your data protected. This video shows how current ransomware attacks, like Nova, are instantly protected against by Xcitium’s prevention-led, Zero-Dwell strategy.

Indicators of Compromise (IOCs)

Key IOCs associated with Nova include:

  • Session token: 054f55ec93aca9bac362b9d91eff36a7ce451e7caba47c0b2e004ba429f9529c79 (A unique identifier used in Nova’s ransom negotiations.)
  • Tox ID: 8E9A6195A769FE7115F087C61D75CF32874C339B3AB0947D07480C9A8A12DA5009151BE6A51F (QtOx encrypted chat ID linked to Nova operators.)
  • File extension: .ralord (Extension appended to files encrypted by Nova / former RALord.)
  • Malware hash (SHA-256): 456B9ADAABAE9F3DCE2207AA71410987F0A571CD8C11F2E7B41468501A863606
  • Malware hash (MD5): be15f62d14d1cbe2aecce8396f4c6289
  • Ransom note filename: README-.txt
  • Tor leak & negotiation sites (.onion):
    novavdivko2zvtrvtllnq45lxhba2rfzp76qigb4nrliklem5au7czqd.onion
    pifk3xu3vad6cuxsjll4qjomyaaaoyvnyqppro75pazadzctrrvpdnyd.onion
    novadmrkp4vbk2padk5t6pbxolndceuc7hrcq4mjaoyed6nxsqiuzyyd.onion

For example, tracking these signs like the .ralord extension or known QtOx IDs can help defenders spot a Nova breach early. Vigilant monitoring for these IOCs can trigger rapid response to any infection.

Nova Ransomware SHA-1 Samples & Zero‑Dwell Threat Intelligence Reports

Conclusion: RaaS at Scale, Destruction at Speed

Nova’s evolution from RALord into a mature RaaS operation shows how quickly ransomware groups adapt, rebrand, and expand. In less than a year, Nova affiliates compromised dozens of organizations across healthcare, manufacturing, education, and critical services worldwide. The playbook is familiar but devastating, stolen credentials, exposed services, rapid lateral movement, data theft, then encryption and extortion. Scale and speed are now the advantage.

Why This Threat Is So Hard to Stop

Modern RaaS groups like Nova succeed because they exploit common weaknesses that persist across environments:

  • Valid credentials abused for initial access
  • Phishing and exposed remote services bypassing perimeter defenses
  • Security tools disabled before encryption begins
  • Backups destroyed to eliminate recovery options
  • New or modified payloads evading signature-based detection

When unknown code is allowed to execute freely, attackers gain minutes or hours. That is all ransomware needs.

Where Xcitium Changes the Outcome

For organizations using Xcitium Advanced EDR, Nova ransomware fails at the point of execution.

  • Unknown ransomware payloads are isolated immediately
  • Encryption routines cannot access real files or systems
  • Credential abuse cannot escalate into lateral movement
  • Command and control communication is blocked before impact
  • Code can run without being able to cause damage

Affiliates lose their leverage because the attack chain never reaches the system.

Stop RaaS Before It Becomes a Business Crisis

Nova proves that ransomware is no longer rare or slow. It is operational, repeatable, and global. Defense must move faster than affiliates can deploy payloads.

Protect your endpoints before encryption begins.
Choose Xcitium Advanced EDR, powered by the patented Zero-Dwell platform.

Like what you see? Share with a friend.

Move Away From Detection With Patented Threat Prevention Built For Today's Challenges.

No one can stop zero-day malware from entering your network, but Xcitium can prevent if from causing any damage. Zero infection. Zero damage.

Book a Demo