Ransomware-as-a-Service: Commoditizing ransomware

Discussion in 'Emsisoft' started by Umbra, Dec 8, 2017.


Did you know about it?

  1. Yes

    10 vote(s)
  2. No

    18 vote(s)
  1. Umbra

    Umbra From Emsisoft

    May 16, 2011
    Community manager
    Vietnam & France
    Windows 10
    One of the most profound changes in the modern business landscape has been the gradual shift to the Subscription Economy. In years gone by, you handed over your hard-earned money and in return received a product or service that was yours to keep. Now, both companies and consumers are ditching the traditional pay-per-product approach in favor of the as-a-service model – an arrangement that offers greater flexibility for consumers and more predictable, stable income for businesses. In most cases, it’s a better all-round experience for everyone involved.

    Sadly, it’s not just Netflix and Spotify that have adopted this way of offering their services. In the dark recesses of the digital underworld, malware authors hawk ransomware subscriptions that are swiftly snapped up by buyers with unscrupulous motives. A relatively recent phenomenon, Ransomware as a Service (RaaS) allows anyone with an internet connection – regardless of their technical literacy – to purchase powerful ransomware via the Dark Web and carry out devastating encryption attacks against the targets of their choice.

    Read more here
    RoboMan, Faybert, Weebarra and 7 others like this.
  2. overdivine

    overdivine Level 1

    Aug 21, 2013
    you can buy ransomware to use it yourself
    you can rent the ransomware for hours/days
    you can find targets for the ransomware and refer them to the owner of the ransomware and get like 5% of the proffit
  3. daljeet

    daljeet Level 5

    Jun 14, 2017
    Linux Ubuntu
    #3 daljeet, Dec 8, 2017
    Last edited: Dec 8, 2017
    Ransomware-as-a-Service Like hiring a detective from the criminal web. The criminal web is full of these types of services and definitely, there are many services which are a scam and criminal web scamming each other If newbie goes there for these types of services how He/She know this service work. Coding new ransomware is not an easy task and bypassing protection is also not easy but not difficult. Black Hat conference 2017 In Las Vegas 73% say traditional perimeter security firewalls and antivirus are irrelevant or obsolete and Multi-factor authentication and encryption are biggest hacker obstacles
    Survey by: Thycotic
    Privileged Access Management Solutions and Software for IT Security

    Sorry for bad English it's not my native language