Group-IB Uncovered Farnetwork’s Ransomware-as-a-Service Business Model

 

In recent findings, cybersecurity experts have uncovered a significant player in the world of cyber threats, known as “farnetwork”. This individual has been tied to five separate cyber attack programs within the last four years, showcasing a high level of proficiency in the field. 
Singapore-based cybersecurity firm Group-IB embarked on an ambitious mission to gain insight into a secretive cyber attack program utilizing the Nokoyawa ransomware. Their approach involved a unique “job interview” process with the threat actor responsible for the program. This unconventional interaction provided Group-IB with invaluable information about the individual’s background and their pivotal role within various cyber attack programs. 
“Throughout the threat actor’s cybercriminal career, which began in 2019, far network has been involved in several connected ransomware projects, including JSWORM, Nefilim, Karma, and Nemty, as part of which they helped develop ransomware and manage the RaaS programs before launching their own RaaS program based on Nokoyawa ransomware,” Nikolay Kichatov, cyber security intelligence said at Group-IB. 
About half a year after successfully infiltrating the Qilin Ransomware-as-a-Service (RaaS) syndicate, the cybersecurity firm has shared comprehensive information on how affiliates are paid and the inner workings of the RaaS program.
Farnetwork is recognized by many names such as farnetworkit, farnetworkl, jingo, js

[…]
Content was cut in order to protect the source.Please visit the source for the rest of the article.

This article has been indexed from CySecurity News – Latest Information Security and Hacking Incidents

Read the original article: