Ransomware as a Service (RaaS) – The Business of Ransomware

Discussion in 'malware problems & news' started by guest, Aug 12, 2020.

  1. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,126
    Location:
    U.S.A. (South)
    And one thing very evident stretching all the way back to CoolWebSearch on Windows 98.

    Russians who by the way FIRST achieved and mastered orbital satellite tech (Sputnik) are inherently very BRIGHT minds.

    Doubt there is little that they can't advance in when it comes to tech. And these days Microsoft is generously given them plenty of toys to play with and master again. Fact of life.

    And China is NO MATCH for them, not even close though they may think otherwise.
     
    Last edited: Jul 28, 2021
  2. guest

    guest Guest

    Ransomware operators love them: Key trends in the Initial Access Broker space
    In a threat actor's mind, take out the legwork, reap the proceeds of blackmail.
    August 2, 2021
    https://www.zdnet.com/article/ranso...ey-trends-in-the-initial-access-broker-space/
    KELA: All Access Pass: Five Trends with Initial Access Brokers
     
  3. guest

    guest Guest

    LockBit ransomware recruiting insiders to breach corporate networks
    August 4, 2021
    https://www.bleepingcomputer.com/ne...uiting-insiders-to-breach-corporate-networks/
     
  4. guest

    guest Guest

    Ransomware-as-a-Service
    August 10, 2021
    https://www.professionalsecurity.co.uk/products/cyber/ransomware-as-a-service/
     
  5. guest

    guest Guest

    10 Initial Access Broker Trends: Cybercrime Service Evolves
    $5,400 Is the Average Price for Access to Hacked Networks, Kela Reports
    August 10, 2021

    https://www.databreachtoday.com/10-initial-access-broker-trends-cybercrime-service-evolves-a-17249
    1. Affordable Access
    For the period from July 1, 2020, through June 30, Kela reports that the average price for remote access to a network was $5,400, while the median was $1,000.

    2. RDP and VPN Credentials Rule
    Remote desktop protocol and VPN credentials were the most common types of access being listed. But other types of access also get offered - for example, via remote management software, which many managed service providers will install on the endpoints they manage for customers.

    3. Active Directory Credentials: Extra Valuable
    "The most valuable offers include domain admin privileges on a computer within a company with hundreds of millions of dollars in revenue," Kivilevich writes in the report.

    4. Top Target: U.S. Organizations
    The greatest number of remote access credentials being listed, Kela found, were for targets in the United States, which accounted for 28% of all listings, followed by France, the U.K., Australia, Canada, Italy, Brazil, Spain, Germany and United Arab Emirates.

    5. Access to Manufacturing Leads Offerings
    Organizations in the manufacturing sector were most listed, followed by education, IT, financial services, government and healthcare.

    6. One Buyer Often Preferred
    Some brokers will list a sample of the access they have for sale and tell buyers to contact them for more details.
    "These brokers generally are interested in getting one buyer for all the accesses being sold and sometimes go as far as to request a percentage of the ransom if an attack is successful," Kivilevich says.

    7. Multiple Monetization Strategies
    Some network-access brokers appear to sell not just access but also data from victims' environments.

    8. Brokers React to White House Moves
    In recent months, ransomware has become a political hot potato.
    In response, some cybercrime forums - including the Russian-language Exploit and XSS forums - have announced bans on ransomware, although security experts say such prohibitions are not always heavily enforced.

    9. Private Communications Still Happening
    But such sales may well still be occurring behind the scenes.
    But understanding how many organizations have been hit can be difficult, because not all types of access get posted on cybercrime forums. And even when they do, brokers will often obscure the victim's identity, because, of course, they wouldn't want to see them get tipped off.

    10. Dominant Groups Foster Relationships
    Many established brokers appear to form relationships with specific crime groups or affiliates of ransomware operations, leading to them no longer listing their "accesses" for sale on public cybercrime forums, but rather sharing them via private conversations, Kivilevich says.
     
  6. guest

    guest Guest

    LockBit 2.0 Ransomware Proliferates Globally
    ...promising millions of dollars in exchange for valid account credentials for initial access
    August 17, 2021

    https://threatpost.com/lockbit-ransomware-proliferates-globally/168746/
     
  7. guest

    guest Guest

    Ransomware-as-a-service: The future is bright — for cybercriminals
    August 18, 2021
    https://techtalk.gfi.com/ransomware-as-a-service/
     
  8. EASTER

    EASTER Registered Member

    Joined:
    Jul 28, 2007
    Posts:
    11,126
    Location:
    U.S.A. (South)
    Incredible
     
  9. guest

    guest Guest

    FBI sends its first-ever alert about a ‘ransomware affiliate’
    August 23, 2021
    https://therecord.media/fbi-sends-its-first-ever-alert-about-a-ransomware-affiliate/
     
  10. guest

    guest Guest

    FBI Releases Indicators of Compromise Associated with OnePercent Group Ransomware
    August 25, 2021
    https://us-cert.cisa.gov/ncas/curre...cators-compromise-associated-onepercent-group
    Flash Report - (PDF): https://www.ic3.gov/Media/News/2021/210823.pdf
     
  11. guest

    guest Guest

    How REvil May Have Ripped Off Its Own Affiliates
    September 22, 2021
    https://threatpost.com/how-revil-may-have-ripped-off-its-own-affiliates/174887/
     
  12. guest

    guest Guest

    REvil Affiliates Confirm: Leadership Were Cheating
    September 23, 2021
    https://threatpost.com/revil-affiliates-leadership-cheated-ransom-payments/174972/
     
  13. guest

    guest Guest

    Buckle up: a novel RaaS group, Ranion, offers 'pay & go' malware
    a new ransomware-as-a-service (RaaS) group just made cyber extortion easier
    October 1, 2021

    https://cybernews.com/security/buckle-up-a-novel-raas-group-ranion-offers-pay-go-malware/
    Fortinet threat research:
    Ranion Ransomware - Quiet and Persistent RaaS
     
  14. guest

    guest Guest

    When criminals go corporate: Ransomware-as-a-service, bulk discounts and more
    Pen-testers, rogue developers, dodgy hosters, etc. etc.
    October 11, 2021
    https://www.theregister.com/2021/10/11/ransomware_as_a_service/
     
  15. NormanF

    NormanF Registered Member

    Joined:
    Feb 20, 2009
    Posts:
    2,882
    Its a high gain, low risk crime and the payoff is better for criminals than bank robbery since its untraceable. Fighting cybercrime like ransomware is a challenge unlikely to be squashed anytime soon.
     
  16. guest

    guest Guest

    CERT-France: Lockean ransomware group behind attacks on French companies
    November 3, 2021
    https://therecord.media/cert-france-lockean-ransomware-group-behind-attacks-on-french-companies/
     
  17. guest

    guest Guest

    BlackBerry report highlights initial access broker providing entry to StrongPity APT, MountLocker and Phobos ransomware gangs
    November 5, 2021
    https://www.zdnet.com/article/black...-apt-mountlocker-and-phobos-ransomware-gangs/
     
  18. guest

    guest Guest

    Scale of crime-as-a-service economy a growing concern, say researchers
    November 11, 2021
    https://www.computerweekly.com/news...ice-economy-a-growing-concern-say-researchers
    Sophos: Ransomware-as-a-Service has changed the landscape – find out the impact of this shift
     
  19. guest

    guest Guest

    Ransomware gangs are now rich enough to buy zero-day flaws, say researchers
    Zero-day cybersecurity vulnerabilities have traditionally been the area of nation-states
    November 16, 2021
    https://www.zdnet.com/article/ranso...enough-to-buy-zero-day-flaws-say-researchers/
    Digital Shadows: Vulnerability Intelligence: What’s The Word In Dark Web Forums?
     
  20. guest

    guest Guest

    Russian ransomware gangs start collaborating with Chinese hackers
    November 17, 2021
    https://www.bleepingcomputer.com/ne...ngs-start-collaborating-with-chinese-hackers/
    Intel471: RAMP Ransomware’s Apparent Overture to Chinese Threat Actors
     
  21. guest

    guest Guest

    Conti gang has made at least $25.5 million since July 2021
    November 18, 2021
    https://therecord.media/conti-gang-has-made-at-least-25-5-million-since-july-2021/
    Prodaft: [Conti] Ransomware Group In-Depth Analysis
     
  22. guest

    guest Guest

    Yanluowang ransomware operation matures with experienced affiliates
    November 30, 2021
     
    Last edited by a moderator: Dec 6, 2021
  23. guest

    guest Guest

    FBI seized $2.2M from affiliate of REvil, Gandcrab ransomware gangs
    November 30, 2021
     
    Last edited by a moderator: Dec 6, 2021
  24. guest

    guest Guest

    New Redeemer ransomware version promoted on hacker forums
    Redeemer 2.0 Being Distributed Via Affiliate Program
    July 21, 2022
    Cyble: Redeemer Ransomware Back Action
     
  25. guest

    guest Guest

    Lockbit 3.0 and the ransomware business model
    July 25, 2022
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.