Ransomware-as-a-Service: Commoditizing ransomware

Discussion in 'Emsisoft' started by Umbra, Dec 8, 2017.


Did you know about it?

  1. Yes

    10 vote(s)
  2. No

    18 vote(s)
  1. Umbra

    Umbra Level 61
    Content Creator

    May 16, 2011
    Beta tester
    Europe > S-E Asia
    Windows 10
    One of the most profound changes in the modern business landscape has been the gradual shift to the Subscription Economy. In years gone by, you handed over your hard-earned money and in return received a product or service that was yours to keep. Now, both companies and consumers are ditching the traditional pay-per-product approach in favor of the as-a-service model – an arrangement that offers greater flexibility for consumers and more predictable, stable income for businesses. In most cases, it’s a better all-round experience for everyone involved.

    Sadly, it’s not just Netflix and Spotify that have adopted this way of offering their services. In the dark recesses of the digital underworld, malware authors hawk ransomware subscriptions that are swiftly snapped up by buyers with unscrupulous motives. A relatively recent phenomenon, Ransomware as a Service (RaaS) allows anyone with an internet connection – regardless of their technical literacy – to purchase powerful ransomware via the Dark Web and carry out devastating encryption attacks against the targets of their choice.

    Read more here
    RoboMan, Faybert, Weebarra and 7 others like this.
  2. overdivine

    overdivine Level 1

    Aug 21, 2013
    you can buy ransomware to use it yourself
    you can rent the ransomware for hours/days
    you can find targets for the ransomware and refer them to the owner of the ransomware and get like 5% of the proffit
  3. daljeet

    daljeet Level 6

    Jun 14, 2017
    Linux Ubuntu
    #3 daljeet, Dec 8, 2017
    Last edited: Dec 8, 2017
    Ransomware-as-a-Service Like hiring a detective from the criminal web. The criminal web is full of these types of services and definitely, there are many services which are a scam and criminal web scamming each other If newbie goes there for these types of services how He/She know this service work. Coding new ransomware is not an easy task and bypassing protection is also not easy but not difficult. Black Hat conference 2017 In Las Vegas 73% say traditional perimeter security firewalls and antivirus are irrelevant or obsolete and Multi-factor authentication and encryption are biggest hacker obstacles
    Survey by: Thycotic
    Privileged Access Management Solutions and Software for IT Security

    Sorry for bad English it's not my native language
  • About Us

    Our community has been around since 2010, and we pride ourselves on offering unbiased, critical discussion among people of all different backgrounds about security and technology . We are working every day to make sure our community is one of the best.
  • Need Malware Removal Help?

    If you're being redirected from a site you’re trying to visit, seeing constant pop-up ads, unwanted toolbars or strange search results, your computer may be infected with malware. We offer free malware removal assistance to our members in the Malware Removal Assistance forum.
  • Quick Tip

    Without meaning to, you may click a link that installs malware on your computer. To keep your computer safe, only click links and downloads from sites that you trust. Don’t open any unknown file types, or download programs from pop-ups that appear in your browser.