Satan Free Ransomware as a Service is released online

If you ever get hit by ransomware that encodes the names of encrypted files using the .stn extension, then you are a victim of Satan, not the "Prince of Darkness", but the new Ransomware service of the same name. Yes a new Ransomware as a is released online.

The new ransomware was detected on Wednesday by Xylitol security researcher and as it turns out, the new RAAS is marketed through underground forums.Satan

Anyone can use Satan for free, as the seller states, but they will have to give 30 percent of each successful ransom in exchange for providing the service.

A visit to the Tor's website reveals a well designed page that offers users the ability to create a variation of malware to their preferences.

Stakeholders can choose dropper hide techniques and have the ability to translate the ransom note, change ways to communicate with the victim, or choose how malware will communicate with them.

Through this site, registered users using the service can also see how many of the attacks with the ransomware were successful, and the amount they have earned so far.

At this time, we do not know the method s that Satan uses, so it's probably too early to talk about a decryption tool.

So beware of your online walks because, unfortunately, Satan RAAS is extremely easy to use and accessible to anyone who has no hesitation even if it does not have any special knowledge.

iGuRu.gr The Best Technology Site in Greecefgns

every publication, directly to your inbox

Join the 2.087 registrants.

Written by giorgos

George still wonders what he's doing here ...

Leave a reply

Your email address is not published. Required fields are mentioned with *

Your message will not be published if:
1. Contains insulting, defamatory, racist, offensive or inappropriate comments.
2. Causes harm to minors.
3. It interferes with the privacy and individual and social rights of other users.
4. Advertises products or services or websites.
5. Contains personal information (address, phone, etc.).