The Kaspersky Digital Footprint Intelligence team presented a new study that reveals ransomware as the most widespread Malware-as-a-Service (MaaS) over the past seven years. The study is based on research conducted on 97 malware families been distributed on the dark web and other resources. Additionally, the researchers found that cybercriminals often lease infostealers, botnets, loaders, and backdoors to carry out their attacks.
Malware-as-a-Service (MaaS) is an illicit model of business involving the leasing of software to carry out cyberattacks. Typically, clients of such services are offered a personal account through which they can control the attack, as well as technical support. It lowers the initial threshold of expertise needed by would-be cybercriminals.
Ransomware to be the most popular Malware-as-a-Service
Kaspersky’s experts examined various malware families’ sale volumes, as well as mentions, discussions, posts, and search ads on the darknet and other resources regarding MaaS to identify the most popular types. The leader turned out to be ransomware, or malicious software that encrypts data and demands to payment for decryption. It accounted for 58 percent of all families distributed under the MaaS model between 2015 and 2022. The popularity of ransomware can be attributed to its ability to generate higher profits in a shorter space of time than other types of malware.
Cybercriminals can “subscribe” to Ransomware-as-a-service (RaaS) for free. Once they become partners in the program, they pay for the service after the attack happens. The payment amount is determined by a percentage of the ransom paid by the victim, typically ranging from 10 percent to 40 percent of each transaction. However, entering the program is no simple task, as it entails meeting rigorous requirements.
Malware families distribution, 2015-2022, with examples of the most popular families in each type. Source:Â Kaspersky Digital Footprint Intelligence
Infostealers accounted for 24 percent of malware families distributed as a service over the analyzed period. These are malicious programs designed to steal data such as credentials, passwords, banking cards and accounts, browser history, crypto wallets data, and more.
Infostealer services are paid through a subscription model. They are priced between 100 and 300 U.S. dollars per month. For example, Raccoon Stealer, which was discontinued in early February 2023, could be acquired for 275 U.S. dollars per month or 150 U.S. dollars per week. Its competitor, RedLine, has monthly price of 150 U.S. dollars, and there is also an option to purchase a lifetime license for 900 U.S. dollars, according to the information posted on the Darknet by its operators. Attackers also make use of additional services for extra pay.
Eighteen percent of malware families being sold as a service proved to be botnets, loaders, and backdoors. These threats are combined into one group since they often have a common goal: to upload and run other malware on the victim’s device. “For instance, the price of loader Matanbuchus tends to vary over time. The price in June of the current year starts from 4900 U.S. dollars per month. This type of malware is more expensive than infostealers, for example, the malicious code itself is more complex, and the operator provides all the infrastructure, meaning the partners don’t have to pay extra for bulletproof hosting services when they use Matanbuchus. It is worth noting that the number of subscribers to Matanbuchus is very limited, allowing attackers to remain undetected for a longer time”, said Alexander Zabrovsky, Digital Footprint Analyst at Kaspersky.