Se pone a la venta el código fuente del ransomware Dharma

Dharma ransomware source code
ZDNet informes that the source code for one of the most profitable ransomware of our time, the Dharma ransomware, was put for sale on two hacker forums last weekend. Sources are sold for $2,000.

Let me remind you that this year the FBI called Dharma the second most profitable ransomware in recent years during its report at the conference and RSA. Por lo tanto, desde noviembre 2016 to November 2019, ransomware operators received $24 millón in ransom from their victims.

The most dangerous ransomware last year, I recall, was called Emotet.

“The current sale of the Dharma code is likely to soon result in a leak to the public. Eso es, the malware will become available to a wider audience. Éste, a su vez, will lead to a wide distribution of source code among many hack groups, and this will ultimately be followed by a surge of attacks”, – ZDNet quotes an unnamed information security expert.

Sin embargo, the head of the cyber intelligence department at McAfee told ZDNet that the Dharma code has been circulating among hackers for a long time, and now it just arrived on public forums.

Dharma ransomware source code
Dharma ransomware source code for sale

Al mismo tiempo, the expert expressed the hope that sooner or later the source code will fall into the hands of information security specialists, and this will help to identify the shortcomings of the malware and create decoders.

“Dharma existed since 2016, and the ransomware underlying this malware was originally called CrySiS. It worked on the Ransomware-as-a-Service (RaaS) esquema, eso es, other criminals could create their versions of malware to distribute, usually through spam campaigns, kits de explotación, or RDP brute force”, – noted ZDNet reporters.

Al final de 2016, a user with the nickname crss7777 al corriente on the Bleeping Computer forums a link to Pastebin containing master keys from the CrySiS encryptor, cual, as experts later established, were genuine. Después de eso, CrySiS ceased to exist, “reborn” as Dharma.

Although Dharma keys suffered the same fate in 2017, this time the ransomware operators did not rebrand and continued to work, eventually turning their RaaS into one of the most popular ransomware on the market.

"Entonces, en años recientes, Dharma regularly receives updates. Por ejemplo, en 2018 y 2019, the criminal underground adapted to new trends and moved from the mass distribution of ransomware through mail spam to targeted attacks on corporate networks. So did the Dharma operators», – says the ZDNet publication.

It is noted that in the spring of 2019, a new strain of Phobos ransomware appeared on the network, used mainly for targeted attacks. Investigadores de Coveware y Malwarebytes have noted that it is almost identical to Dharma. Sin embargo, al mismo tiempo, Dharma did not stop existing and continued to work in parallel with Phobos. Por ejemplo, Avast experts observó three new versions of Dharma last week.

Por Vladimir Krasnogolovy

Vladimir es un especialista técnico al que le encanta dar consejos y sugerencias cualificados sobre los productos de GridinSoft. Está disponible las 24 horas del día, los 7 días de la semana para ayudarte con cualquier pregunta relacionada con la seguridad en Internet.

Dejar un comentario

Tu dirección de correo electrónico no será publicada. Los campos obligatorios están marcados con *