SparkOnSoft campaign continues and mutates

Avi Lamay

23/12/2025

Intro

Recently we on reported on SparkOnSoft which our Active Ransomware Prevention platform prevented in multiple customers’ environments worldwide.
Since then we’ve noticed that not only the campaign continues, it also mutates as new samples use another PDF application signed by a different certificate

Basic Information

The new payload is a PDF application called Proton PDF though the file name starts with ClearEdit and the file was signed with an Extended Validation certificate by Hawk Integrated Inc issued by Sectigo
Interestingly, the payload is a NSIS installer while SparkOnSoft samples, including new ones, still use InnoSetup to create the installers
The new payload is identified as part of the SparkOnSoft campaign according to VirusTotal (see IOCs below)
In addition, since our last post our prevention platform identified more samples which were still being downloaded from sparkonsoft[.]com and are still signed by Mainstay Crypto LLC issued by Microsoft

IOCs

Contact Us

Don’t Miss a Thing

Sign up today and we’ll send an email when new posts come out.

We collect and use this information in accordance with our privacy policy.

Skip to content