The rise of ransomware as a service

Ransomware is no longer just for hackers - it's available off-the-shelf

Ransomware as a service (RaaS) is designed so that anyone, no matter how limited their programming knowledge, can get started in cybercrime. Professional criminals write and package the code before making it available for amateurs to download and use, flooding the market with new ransomware strains in the process.

Read Kaspersky's free security bulletin The ransomware revolution' for a deep-dive view of ransomware and other security threats

.my-newsletter-btn{ font-family: Droid Sans; background: #0064af; display: inline-block; color: #fff !important; font-size: 14px; padding: 4px 16px; text-decoration: none;}.my-newsletter-btn:hover{ background: #0b2644;}

Download now

Advertisement - Article continues below
Advertisement - Article continues below

While this is not a new trend, the model is developing rapidly, with increasing numbers of ransomware creators offering their malicious products on demand'. This approach has proved immensely appealing to criminals who lack the skills, resources or inclination to develop their own.

This makes ransomware very cheap to download and easy to spread, compared to other types of malware and cyber attacks which require a higher level of programming and distribution knowledge. It is this growth in RaaS platforms which is likely to be one of the primary drivers behind the huge spike in ransomware attacks over the past 12 months.

Notable examples which appeared last year and use this model are Petya/Mischa (see below) and Shark ransomware, which was later rebranded under the name Atom and offered a high 80% share on ransom payments. Other popular tools like Satan claim to enable distribution of ransomware in under a minute.

The business model for RaaS is a simple, franchise-like deployment model. Instead of writing and deploying their own ransomware software, a criminal will sign up to a traditional commission-based arrangement. One example is Peyta ransomware (see table below); if a partner makes 125 Bitcoins a week, they will walk away with 106.25 Bitcoins after commission. Some even get to see an estimate of their potential earnings before they sign up.

There is also often an initial usage fee. Someone looking to use the Stompado ransomware, for example, needs to spend just $39 to get started. Other RaaS authors instead opt to take a cut of each ransom, incentivising a higher volume of attacks.

Have you protected your infrastructure from the risks of ransomware? Keep up to date with current threats to businesses with Kaspersky's security whitepaper detailing trends from the past year.

Advertisement - Article continues below

Download now

With other criminals offering their services in spam distribution and ransomware notes, it's no longer difficult for an amateur attacker to get started.

Typical antivirus solutions are designed to stop known attacks, so unfortunately are relatively ineffective against such a rapidly growing number of new ransomware strains. Using a reliable security solution, particularly one with a dedicated ransomware feature is an important way to keep your data and devices secure.

Businesses should also take steps to educate employees and IT teams about suspicious emails, and what to do in the event of falling victim to a ransomware attack. IT teams can take steps such as keeping sensitive data separate, restricting access and backing up everything regularly to mitigate the effects of a potential ransomware attack.

Petya RaaS screenshots via Kaspersky Security Bulletin 2016, The Ransomware Revolution, p13

Featured Resources

Digitally perfecting the supply chain

How new technologies are being leveraged to transform the manufacturing supply chain

Download now

Three keys to maximise application migration and modernisation success

Harness the benefits that modernised applications can offer

Download now

Your enterprise cloud solutions guide

Infrastructure designed to meet your company's IT needs for next-generation cloud applications

Download now

The 3 approaches of Breach and Attack Simulation technologies

A guide to the nuances of BAS, helping you stay one step ahead of cyber criminals

Download now



How can you protect your business from crypto-ransomware?

4 Nov 2019

Hackers abuse LinkedIn DMs to plant malware

25 Feb 2019

Best free malware removal tools 2019

23 Dec 2019
internet security

Avast and AVG extensions pulled from Chrome

19 Dec 2019

Most Popular

operating systems

17 Windows 10 problems - and how to fix them

13 Jan 2020
data breaches

Misconfigured security command exposes 250 million Microsoft customer records

23 Jan 2020
Microsoft Windows

What to do if you're still running Windows 7

14 Jan 2020

Windows 10 and the tools for agile working

20 Jan 2020