Skip to main content
banner image
venafi logo

From Babuk Source Code to Darkside Custom Listings — Exposing a Thriving Ransomware Marketplace on the Dark Web

From Babuk Source Code to Darkside Custom Listings — Exposing a Thriving Ransomware Marketplace on the Dark Web

darkside-ransomware-marketplace
August 2, 2022 | Shelley Boose

Venafi today announced the findings of a dark web investigation into ransomware spread via malicious macros. This comes in the wake of Microsoft’s recent action on malicious macros spread via its Office applications.

Get Fast, Easy, and Secure Enterprise-Grade Code Signing With Venafi
Research: Venafi and Forensic Pathways

Conducted in partnership with criminal intelligence provider Forensic Pathways between November 2021 and March 2022, the research analyzed 35 million dark web URLs, including marketplaces and forums, using the Forensic Pathways Dark Search Engine. The findings uncovered 475 webpages of sophisticated ransomware products and services, with several high-profile groups aggressively marketing ransomware-as-a-service.

 

Graphical user interface, application

Description automatically generated

Darkside Ransomware Marketplace / Credit: Forensic Pathway, Venafi

Results:

  • 87% of the ransomware found on the dark web has been delivered via malicious macros to infect targeted systems.
  • 30 different “brands” of ransomware were identified within marketplace listings and forum discussions.
  • Many strains of ransomware being sold — such as Babuk, GoldenEye, Darkside/BlackCat, Egregor, HiddenTear and WannaCry — have been successfully used in high-profile attacks.
  • Ransomware strains used in high-profile attacks command a higher price for associated services. For example, the most expensive listing was $1,262 for a customized version of Darkside ransomware, which was used in the infamous Colonial Pipeline ransomware attack of 2021.
  • Source code listings for well-known ransomware generally command higher price points, Babuk source code is listed for $950 and Paradise source code is selling for $593.

“Ransomware continues to be one of biggest cybersecurity risks in every organization,” said Kevin Bocek, vice president of security strategy and threat intelligence for Venafi. “The ransomware attack on Colonial Pipeline was so severe that it was deemed a national security threat, forcing President Biden to declare a national state of emergency.”

Microsoft action

Macros are used to automate common tasks in Microsoft Office, helping people to be more productive. However, attackers can use this same functionality to deliver many kinds of malware, including ransomware. In February, Microsoft announced it would disable VBA macros obtained from the Internet. But they temporarily reversed that decision in response to community feedback. (In July, Microsoft reinstated its policy of disabling VBA macros.)

“Given that almost anyone can launch a ransomware attack using a malicious macro, Microsoft's decision to roll back the disabling of macros should scare the pants off everyone,” said Bocek.

Tools allow attacks with minimal technical skills

In addition to a variety of ransomware at various price points, the research also uncovered a wide range of services and tools that help make it easier for attackers with minimal technical skills to launch ransomware attacks. Services with the greatest number of listings include those offering source code, build services, custom development services, and ransomware packages that include step-by-step tutorials.

Generic ransomware build services also command high prices, with some listings costing more than $900. At the other end of the price spectrum, many low-cost ransomware options are available across multiple listings — with prices starting at just $0.99 for Lockscreen ransomware.

Venafi can help

These findings are another example of the need for a machine identity management control plane to drive specific business outcomes including observability, consistency, and reliability. In particular, code signing is a key machine identity management security control that eliminates the threat of macro-enabled ransomware. 

“Using code signing certificates to authenticate macros means that any unsigned macros cannot execute, stopping ransomware attacks in its tracks,” Bocek concludes. “This is an opportunity for security teams to step up and protect their businesses, especially in banking, insurance, healthcare and energy where macros and Office documents are used every day to power decision making.”

About the research:

This research was carried out between November 2021-March 2022 by Venafi in partnership with Forensic Pathways, which has developed Dark Search Engine (DSE), an automated crawler/scraper of the Tor. Onion Dark Web. The intelligence tool contains >35 million URLs in the index.

Publicly available information, such as PC Risk, was used to determine if malicious macros were used in the initial attack vector.

About Forensic Pathways:

Incorporated in 2001 Forensic Pathways provides innovative technologies within the criminal intelligence arena. Focused primarily on the provision of digital forensic technologies, Forensic Pathways offers its international clients unique technologies in the management of mobile phone data, image analysis and ballistics analysis.

Related Posts:

Like this blog? We think you will love this.
tls-one-million-analysis-june-2022
Featured Blog

Top 1 Million Analysis - June 2022

Read More
Subscribe to our Weekly Blog Updates!

Join thousands of other security professionals

Get top blogs delivered to your inbox every week

See Popular Tags

You might also like

TLS Machine Identity Management for Dummies
eBook

TLS Machine Identity Management for Dummies

Certificate-Related Outages Continue to Plague Organizations
White Paper

CIO Study: Certificate-Related Outages Continue to Plague Organizations

About the author

Shelley Boose
Shelley Boose

Shelley is Director of PR and Content Marketing at Venafi. In her own words, "I help companies translate complex technologies into engaging and compelling, digital stories."

Read Posts by Author
get-started-overlay close-overlay cross icon
get-started-overlay close-overlay cross icon
Venafi Risk assessment Form Image

Sign up for Venafi Cloud


Venafi Cloud manages and protects certificates



* Please fill in this field Please enter valid email address
* Please fill in this field Password must be
At least 8 characters long
At least one digit
At last one lowercase letter
At least one uppercase letter
At least one special character
(@%+^!#$?:,(){}[]~`-_)
* Please fill in this field
* Please fill in this field
* Please fill in this field
*

End User License Agreement needs to be viewed and accepted



Already have an account? Login Here

×
get-started-overlay close-overlay cross icon

How can we help you?

Thank you!

Venafi will reach out to you within 24 hours. If you need an immediate answer please use our chat to get a live person.

In the meantime, please explore more of our solutions

Explore Solutions

learn more

Email Us a Question

learn more

Chat With Us

learn more