Skip to content

Services, Wiki-Artikel, Blog-Beiträge und Glossar-Einträge durchsuchen

↑↓NavigierenEnterÖffnenESCSchließen
Cyberkriminalität Glossary

Ransomware-as-a-Service (RaaS)

A criminal business model in which ransomware developers rent out their malware as a service to "affiliates" who carry out attacks and share the ransom proceeds. RaaS has made ransomware attacks massively scalable—no programming knowledge required.

Ransomware-as-a-Service (RaaS) has democratized cybercrime. Instead of spending months developing malware, criminals today buy or rent a complete "ransomware business kit"—including a C2 panel, negotiation chat interface, payment processing, and technical support. The result: significantly more attackers and significantly more attacks.

The RaaS Ecosystem

The Players

Ransomware Developers (Core Team):

  • Write and maintain the ransomware software
  • Operate backend infrastructure (C2, leak site, payment processing)
  • Recruit and manage affiliates
  • Take 20–30% of the ransom

Affiliates (Attackers):

  • Carry out the actual attacks
  • Purchase initial access or use their own phishing skills
  • Receive 70–80% of the ransom
  • No technical coding expertise required—everything is provided as a service

Initial Access Brokers (IABs):

  • Sell compromised access to corporate networks
  • Typical products: VPN credentials, compromised RDP accounts
  • Prices: $200–$5,000 depending on company size and depth of access

Negotiators:

  • Specialized criminals who negotiate ransom demands
  • Understand psychology, know which companies will pay
  • Often have their own infrastructure (encrypted chats)

The Lean Startup of Cybercrime

  1. Affiliate sees IAB offer: "Access to German pharmaceutical company, 500 employees, annual revenue €80M, domain admin, VPN access – $1,200"
  2. Affiliate purchases access
  3. Affiliate deploys RaaS (e.g., LockBit payload, via RaaS panel)
  4. Lateral movement, data exfiltration, then ransomware deployment
  5. Victim: All servers encrypted + "Your data has been exfiltrated—pay €800,000 or we’ll publish everything"
  6. Negotiation via RaaS chat interface
  7. Payment in Monero/Bitcoin
  8. Split: 70% affiliate, 30% RaaS developer

Known RaaS Groups

GroupStatusNotable Features
LockBit 3.0Partially dismantled (FBI 2024)Largest RaaS group, bug bounty program!
ALPHV/BlackCatInactive following FBI operation in 2024Rust-based, highly advanced
Cl0pActiveMOVEit mass attack (2023, 2,500+ victims)
RansomHubActive (new in 2024)Many former ALPHV affiliates
Play RansomwareActiveOften targets managed service providers
AkiraActiveFocus on Linux + VMware ESXi
8BaseActiveFocus on small and medium-sized businesses, many German victims

Double Extortion: The Escalation

Classic ransomware: Encrypt, demand ransom, decrypt.

Double Extortion (since ~2020): Encrypt AND exfiltrate data.

Phase 1: Exfiltration (stealthy, over weeks)

  • Files, emails, database dumps to attacker’s server

Phase 2: Encryption (high-profile, all systems simultaneously)

Ransom threat:

> “If you don’t pay, we’ll publish your data on our leak site on the dark web. Customers, partners, competitors, and journalists will see everything.”

Pressure: Even with a perfect backup, the company is vulnerable to extortion!

Triple Extortion: Additionally, DDoS attacks on the company’s website and direct contact with customers.

Why “never pay” is the right approach

  1. Payment funds further attacks—directly targeting other victims
  2. No guarantee of a decryption key – 20–30% of those who pay do not receive a working key
  3. No guarantee against publication – Data could still be leaked
  4. Compliance risk – OFAC sanctions for payments to certain groups (U.S. law)
  5. Victims who pay are attacked again – attackers know: “They pay”
  6. Flagged as willing to pay – IABs and affiliates share this information

Protection against RaaS

Most ransomware attacks begin with one of these vectors:

  1. Phishing (47% according to IBM)
  2. Unpatched public services (VPN, RDP, Exchange, Fortinet, Citrix)
  3. Weak credentials (credential stuffing, brute force)
  4. Insider/compromised vendor

Priority protective measures

Immediately:

  • MFA for all remote access (VPN, RDP, M365)
  • Critical patches within 48 hours (Fortinet, Citrix, Exchange CVEs!)
  • RDP not directly accessible from the internet

Short term:

  • Set up immutable backups (ransomware cannot delete backups)
  • EDR on all endpoints (often prevents ransomware deployment)
  • Network segmentation (limits spread)

Medium-term:

  • Security awareness training (phishing detection)
  • PAM for admin accounts (prevents privilege escalation)
  • Penetration testing with ransomware simulation