• Cyber Security
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware File Recovery
    • Ransomware Types
  • Ransomware Services
    • Ransomware Removal
    • Ransomware File Recovery
  • News
  • Tutorials
  • Ransomware TV

Kraken operators come up with a new exploit for RaaS activity

November 9, 2018Simeon Georgiev

In the last few months, it has been proved that Ransomware-as-a-Service (RaaS) has turned out to be a lucrative business model in the cybercriminal world.  The latest report jointly devised by two cybersecurity companies reveals that Kraken operators have introduced a new exploit kit for the RaaS activity instigated by the strain.

The new exploit primarily affects the devices operating on Windows 8.0, 8.1 and 10 and it has been developed to get around the activity of antivirus software programs. This means Kraken will be able to infiltrate the affected device in more like a stealth mode.

The experts have done sufficient research on the dark web to find out further details about RaaS model of Kraken. According to their digging on several cybercriminal platforms on the dark web, the operators of Kraken RaaS are asking anywhere between 0.075 and 1.25 Bitcoins to provide the decryption key for ransomware removal.

Moreover, the developers are promising 80 percent of ransom amount to their affiliates and also providing them an email ID, which is used in the ransom note as the attackers’ contact. Also, they are promising to help the partners with the 24/7 customer support model.

It is interesting to note that the developers of the latest Kraken RaaS exploit have also compiled a list of countries not to be targeted. There are more than a dozen countries in this list including Russia and Syria.

The activity of latest Kraken exploit suggests that it has been developed by employing exceptional malware expertise. The strain is not only able to bypass UAC, but it also deletes itself from the targeted computer after wreaking havoc. This is an anti-forensic technique employed by really few cybercriminals in their malware activity. The self-deletion feature of Kraken will also make it difficult for experts to carry out professional ransomware removal measures.

Simeon Georgiev
https://www.linkedin.com/in/simeon--georgiev/
I am a Cyber Security Enthusiast from Bulgaria. I like to write about malware and ransomware and global cyber attacks. You can reach me on Twitter @sgeorgiev1995 or Email: [email protected]
Previous post Cryptovirological discovery: GMPF ransomware Next post CommonRansomware: A strain that also demands RDP credentials for decryption

Related Articles

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

January 27, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Ransomware: 4 Types of the Latest Trend in Cybercrimes

February 1, 2018Simeon Georgiev
Ransomware: 4 Types of the Latest Trend in Cybercrimes

NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

February 1, 2018Simeon Georgiev
NonPetya Ransomware Caused Millions of Dollars Worth of Damage to Maersk

Latest on Ransomware TV

https://vimeo.com/399908876?loop=0

Recent Posts

  • How to protect your organization against ransomware reinfections
  • AuKill Helps Ransomware Operators Disable EDR and Security Tools
  • AI-ransomware is a real threat, just not a realistic one yet
  • Rorschach is the new speed king in the ransomware space
  • The Role of Supply Chain Breaches in Ransomware Attacks

Stay Protected

Subscribe to our mailing list to get the latest cyber security and ransomware removal articles!

Thank you for subscribing.

Something went wrong.

Navigation

  • Cyber Security
    • Ransomware File Recovery
    • Ransomware Prevention
    • Ransomware Removal
    • Ransomware Types
  • News
  • Tutorials

Ransomware Attacks (Last 6M)

0

Connect & Protect

Facebook
Google+
LinkedIn
YouTube
Vimeo

More

  • BECOME A CONTRIBUTOR

MonsterCloud Reviews

© 2020 MonsterCloud.com. All Rights Reserved.