Ransomware as a Service: Cybercriminals Embrace Commercialization

1 min read
Source: The Hacker News
Ransomware as a Service: Cybercriminals Embrace Commercialization
Photo: The Hacker News
TL;DR Summary

The Play ransomware strain, also known as Balloonfly and PlayCrypt, has transitioned into a Ransomware-as-a-Service (RaaS) operation, offering its services to other cybercriminals. Evidence suggests that affiliates who have purchased the ransomware are carrying out attacks using step-by-step instructions provided with the malware. The attacks exhibit little variation, including the use of the same tactics, passwords, and commands. Play initially targeted Microsoft Exchange Server vulnerabilities and dropped remote administration tools before deploying the ransomware. This shift to RaaS is expected to attract script kiddies and lead to a surge in ransomware incidents.

Share this article

Reading Insights

Total Reads

0

Unique Readers

1

Time Saved

1 min

vs 2 min read

Condensed

70%

31092 words

Want the full story? Read the original article

Read on The Hacker News