Ransomware as a Service is Bringing In Some Serious Money - Bitcoinist.net

Ransomware as a Service is Bringing In Some Serious Money

Keyboard equipped with a red ransomware dollar button.

Ransomware is now becoming standardized to create a lucrative business model, ransomware as a service for amateur hackers.

Also read: OXBTC Releases New BTC/ETH Cloudhash Hosting Services

Ransomware as a Service

Developers of the crypto-ransomware tool, Cerber, have set up a RaaS (Ransomware as a Service) platform for amateur threat actors that could end up bringing in some big money by distributing their tool to a network of affiliates. The business technique could end up netting nearly $2 million.

Security vendor Check Point Software Technologies has gathered data on the ransomware tool and determined that in July alone Cerber-affiliates have extorted $195,000 from victims.

According to the same source, the attacks are multinational with a significant amount of them occurring in South Korea, United States, China, and Taiwan. Additionally, a total of 161 affiliates used Cerber to infect about 150,000 computers during that period.

Check Point released a statement about the ransomware racket and the average rate the attackers have demanded from victims to decrypt their files, around 1 Bitcoin or $590 at the time the statement was made.

The company also noted the amount of profit the developers have made annually:download (4)

“From a yearly perspective, the ransomware author’s estimated take is approximately $946,000—a significant sum.”

All ransom amounts paid are transferred directly to the developers themselves who take a slice of the pie, between 20% and 40%. The rest of the money is then distributed back to the affiliate. TheCerber

developers are also using Bitcoin mixing services to obfuscate the source of the money from the affiliates, keeping their identities anonymous and hidden from everyone — including their customers.

Ransomware Made Easy

The PaaS model, which is often used to standardize some complex system to provide a platform for customers to easily develop applications, is now being used to for amateurs to enter the ransomware business.

Having removed a barrier-to-entry, novice cybercriminals now can more easily join in on the action and has given the hacker community a new way to monetize their wares. Of course, removing barriers-to-entry often is followed by more people entering the market where the barrier was eliminated.

As a result, people must be more cautious as more attackers means more attacks, which for Maya Horowitz, group manager of threat research at Check Point, is reason to reiterate the need for proper security measures.

“It is now not only spread by threat actors who are capable of creating their own malware, but also by less technically skilled actors who merely purchase this service. So for organizations, it emphasizes the need to create backups and to deploy strong security measures.”

What do you think of RaaS and its potential to make ransomware attacks easier? Let us know in the comments below!


Source: darkreading.com

Images courtesy of CumulusGlobal.com, Check Point

Trevor Hill

Trevor Hill

Trevor is a writer at Bitcoinist. He is currently attending his first year at the University of Wisconsin-Fox Valley, with a selected major in Economics. Subscribes to the Austrian school of economics.

  • Get Liquid!

    Easiest malware to protect yourself against, regular backups, yet it gets the most media coverage. And malware for sale is nothing new….

  • BACKUPS and Investigations starting on the software download side.

    I mean you don’t blame cash when there is a mugger do you?
    Why not just track the muggers/virus software authors down.
    If you can’t verify via Encryption on a site that is not blacklisted then DON’T DOWNLOAD it.

    Basically just don’t download software that you can’t first verify is the answer.
    Otherwise just give the keys to your house to people at random LOL.

  • Dan Bolser

    Is this the killer app for smart contracts?