Home Just In Kaspersky Study Shows 58 Percent of Malware Families Sold as Service are Ransomware

Kaspersky Study Shows 58 Percent of Malware Families Sold as Service are Ransomware

by CIOAXIS Bureau

According to a study by Kaspersky, 58% of malware families sold as a service are ransomware, making it the most widespread Malware-as-a-Service.

A new study has revealed that 58 percent of malware families sold as a service are ransomware.

The Kaspersky Digital Footprint Intelligence team presented a study that unveiled ransomware as the most widespread Malware-as-a-Service (MaaS) over the past seven years. The study is based on research conducted on 97 malware families distributed on the dark web and other resources.

Moreover, the researchers discovered that cybercriminals often hire info stealers, botnets, loaders and backdoors to carry out their attacks. MaaS is an illicit model of business involving the leasing of software to carry out cyberattacks. Clients of such services are typically provided with a personal account via which they can control the attack as well as technical support.

It lowers the initial threshold of expertise that would-be cybercriminals must meet. Experts analyzed malware families’ sales volumes, posts, mentions, discussions and more to identify popular MaaS types. Ransomware emerged as the top MaaS type, accounting for 58 percent of all distributed families from 2015 to 2022.

Cybercriminals can subscribe to Ransomware-as-a-service (RaaS) for free. After they become partners in the programme, they have to pay for the service after each successful attack. “Cybercriminals actively trade illicit goods and services, including malware and stolen data, over the shadow segments of the internet.

By understanding how this market is structured, companies can gain insights into the methods and motivations of potential attackers,” said Alexander Zabrovsky, Digital Footprint Analyst at Kaspersky.

Organizations can protect themselves from MaaS by always keeping software updated on all the devices to prevent attackers from infiltrating the network by exploiting vulnerabilities and by using the latest Threat Intelligence information to stay aware of actual TTPs used by threat actors.

– IANS

Recommended for You

This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Close Read More

See Ads