top of page

Understanding Ransomware-as-a-Service (RaaS) Part 4: RaaS Dashboards and Darknet Marketplaces

Introduction

Welcome back to our series on Ransomware-as-a-Service (RaaS)! In this post, we will explore RaaS dashboards and the role of darknet marketplaces in facilitating ransomware attacks. Understanding these components will give you a deeper insight into how ransomware operations are managed and executed. Let’s dive in!


RaaS Dashboards: A Command Center for Cybercriminals

RaaS dashboards provide affiliates with an overview of their ransomware activities. These dashboards are packed with features that help affiliates monitor and manage their attacks effectively. Here’s what you can typically find on a RaaS dashboard:

Key Features of RaaS Dashboards

  • Deployment Effectiveness: Affiliates can track how well their ransomware is spreading.

  • Statistical Analysis: Dashboards display statistics by country, operating system, and more.

  • Communication Tools: Some dashboards allow direct communication with victims for negotiation purposes and many more..


Darknet Marketplaces: Buying and Selling Access

Initial Access Brokers (IABs) and other cybercriminals use darknet marketplaces to trade access to victim networks and stolen data. Let’s take a closer look at how these transactions work.


Key Marketplaces

  • Odin: Focuses on selling remote access to victim networks.

  • Marketo: Specializes in selling and auctioning stolen data.






These marketplaces have evolved to be more anonymous. Initially, they provided detailed information about the victim organizations, but researchers began scraping this data and notifying potential victims. Now, the details are more generic, often including only the top-level domain, hosting provider, operating country, and access type.


Buying and Selling Access

Marketplaces are filled with forum posts where actors buy and sell access. For example:

  • Sellers: Offer access to various organizations, including corporations, institutions, and even governments. Access types include RDP, VNC, cPanel, SSH, and more.

  • Buyers: Seek access to organizations, primarily in the US, EU, and UK. Some buyers avoid targeting hospitals, governments, and educational institutions.


To avoid scams, many forums offer escrow services, ensuring that payments are held until both parties fulfill their part of the deal. Some forums even have dispute resolution systems similar to courts to handle disagreements between users.


Zero-Day Exploits and Social Engineering

The threats posed by RaaS operations extend beyond selling access and ransomware. Let’s look at some concerning trends.


Zero-Day Exploits

IABs sometimes offer zero-day exploits, which are vulnerabilities that have not been disclosed or patched. These exploits can provide remote code execution capabilities, making them highly valuable to ransomware groups.

Social Engineering

Cybercriminals also use social engineering tactics to trick employees into installing ransomware within their company's network. For example, an email might offer a share of the ransom payment in exchange for helping to deploy the ransomware. LockBit, a notorious ransomware group, has been known to use this method. Proofpoint's 2022 Social Engineering report highlights such tactics, demonstrating the ongoing threat of social engineering in ransomware attacks.


Conclusion

Understanding the intricacies of RaaS dashboards and darknet marketplaces is crucial in grasping the full scope of ransomware operations.

In our next post, we’ll continue to explore the complex world of RaaS, focusing on how these operations impact organizations and what steps can be taken to mitigate these threats. Stay informed, stay vigilant, and stay safe.


Akash Patel

31 views0 comments

תגובות


bottom of page