CYBER OFFENSIVE

Ransomware

Ransomware is computer malware that either holds the victim's data hostage, or mounts leakware that threatens to publish the victim's data, until a ransom is paid.

It is typically executed using a Trojan that has a payload disguised as a legitimate file. Initially popular in Russia, the use of ransomware has grown internationally.

RANSOMWARE INVENTORY

1. Cryptolocker

  • Uploads a generated 2048-bit RSA key pair to a command-and-control server.
  • Spreads via infected email attachments and the Gameover ZeuS botnet.
  • Operating system(s) affected: Windows.
  • Encrypts these*.odt, *.ods, *.odp, *.odm, *.odc, *.odb, *.doc, *.docx, *.docm, *.wps, *.xls, *.xlsx, *.xlsm, *.xlsb, *.xlk, *.ppt, *.pptx, *.pptm, *.mdb, *.accdb, *.pst, *.dwg, *.dxf, *.dxg, *.wpd, *.rtf, *.wb2, *.mdf, *.dbf, *.psd, *.pdd, *.pdf, *.eps, *.ai, *.indd, *.cdr, *.jpg, *.jpe, img_*.jpg, *.dng, *.3fr, *.arw, *.srf, *.sr2, *.bay, *.crw, *.cr2, *.dcr, *.kdc, *.erf, *.mef, *.mrw, *.nef, *.nrw, *.orf, *.raf, *.raw, *.rwl, *.rw2, *.r3d, *.ptx, *.pef, *.srw, *.x3f, *.der, *.cer, *.crt, *.pem, *.pfx, *.p12, *.p7b, *.p7c file types.

INFECTIONS ($10K)


Infect any remote computer, server, network, or POS system.

We do all the work. Guaranteed infection in 7 business days.

LEASING ($500K)


Download software allowing you to infect other devices.

Take limited control without the source code for 14 days.

SOURCE CODE ($1 MILLION)


Download the complete source code.

Take unlimited control and modify the malware anytime.

2. Fusob

  • Uses a blocking mechanism on the entire device instead of encryption.
  • Delivers payload by masquerading as a pornographic multimedia player.
  • Operating system(s) affected: Android.
  • Ransom must be paid in the form of iTunes gift cards.

INFECTIONS ($10K)


Infect any remote Android device.

We do all the work. Guaranteed infection in 7 business days.

LEASING ($500K)


Download software allowing you to infect other devices.

Take limited control without the source code for 14 days.

SOURCE CODE ($1 MILLION)


Download the complete source code.

Take unlimited control and modify the malware anytime.

3. KeyRanger

  • Uploads a generated 2048-bit RSA key pair to a command-and-control server.
  • Spreads via infected torrenting client installers.
  • Operating system(s) affected: OS X.
  • encrypt all files under the “/Users” and “/Volumes” directory.

INFECTIONS ($10K)


Infect any remote computer.

We do all the work. Guaranteed infection in 7 business days.

LEASING ($500K)


Download software allowing you to infect other devices.

Take limited control without the source code for 14 days.

SOURCE CODE ($1 MILLION)


Download the complete source code.

Take unlimited control and modify the malware anytime.

CHECK OUT

Bitcoin Payment Address:
CRYPTOLOCKER Infection: $10,000

Device Type:


Device Owner:


Firmware Version:


OS Version:


IP Address:


Lease: $500,000
Soure Code: $1,000,000
No Purchase
FUSOB Infection: $10,000

Device Type:


Device Owner:


Firmware Version:


OS Version:


IP Address:


Lease: $500,000
Soure Code: $1,000,000
No Purchase
KEYRANGER Infection: $10,000

Device Type:


Device Owner:


Firmware Version:


OS Version:


IP Address:


Lease: $500,000
Soure Code: $1,000,000
No Purchase

TOTAL

$0

* * * CLICK ON THE PURCHASE BUTTON ONLY AFTER YOU HAVE SENT THE PAYMENT THROUGH YOUR BITCOIN WALLET TO THE ADDRESS LISTED ABOVE
* * * YOU MAY ONLY PURCHASE ONE PRODUCT PER RANSOMWARE AT A TIME