- Feb 4, 2016
- 2,520
...some quotes from the article:
...
..
...
...
..
...
...
..
...
The rise and simplification of RaaS offerings
Overall, Shifr was one of the easiest to use RaaS portals that Bleeping Computer has encountered in the past year. The trend for RaaS seems to be going away from secluded communities and secret forums to open websites providing anyone with access.
In a report released today that details ransomware evolution in the past year, Kaspersky Labs experts also saw a similar rise and proliferation of RaaS portals.
Kaspersky also noted a rise of 11.4% in the number of ransomware victims from April 2016 and March 2017, compared to the previous year.
...
..
...
Several security researchers have spotted a new Ransomware-as-a-Service (RaaS) portal over the weekend that lets anyone generate their own ransomware executable just by filling in three form fields and pressing a button.
The entry level for this new ransomware is hilariously low, compared to similar RaaS portals we've seen in the past.
The ransomware generated through this service is written in Go. We've called it Shifr based on the extension it adds to encrypted files, but G Data security researcher Karsten Hahn has told Bleeping Computer that an initial analysis of this new threat reveals clues that Shifr might be related to Trojan.Encoder.6491, the first ever ransomware written in Go, discovered last year by Dr.Web security researchers.
Shifr offered through RaaS portal on the Dark Web
To obtain a copy of this ransomware, you need to visit a website on the Dark Web and have your Bitcoin address nearby.
A potential customer needs to enter this Bitcoin address, and the size of the ransom demand Shifr should ask from victims. After this, all that's left is for the user to solve a mundane CAPTCHA challenge and press a button.