'Cheap ransomware that even beginners can use' is circulating in large quantities on the dark web



News reports of cyber attacks using ransomware tend to portray them as being carried out by highly specialized actors, such as 'nation-sponsored criminal groups.' However, a survey by security company

Sophos revealed that there is a large amount of 'cheap ransomware that even beginners can use.'

'Junk gun' ransomware: Peashooters can still pack a punch – Sophos News
https://news.sophos.com/en-us/2024/04/17/junk-gun-ransomware-peashooters-can-still-pack-a-punch/

There are two types of attacks using ransomware: one where the ransomware developer also carries out the attack, and one where the developer purchases the ransomware from another developer and carries out the attack. Ransomware is sold in various forms, but in recent years the mainstream form of sales, called ' Ransomware as a Service Explained (RaaS) ,' in which a portion of the ransom obtained from a ransomware attack is paid as a fee, is becoming more widespread.

However, when Sophos investigated dark web forums where 'low-skilled criminal groups' gather, it was found that many of the low-skilled criminal groups purchase 'cheap, one-time purchase ransomware.' Some of these cheap ransomware contain flaws or backdoors that can cause damage to the attacker themselves. For this reason, Sophos calls the type of cheap ransomware purchased by low-skilled criminal groups 'junk gun ransomware,' likening it to a cheap, low-quality gun (junk gun).

Sophos discovered a total of 19 types of junk gun ransomware on four forums between June 2023 and February 2024. These included free ones developed with open source and inexpensive ones costing tens of dollars (several thousand yen). Information on the junk gun ransomware discovered by Sophos is as follows.
name Posting time situation price Language
CatLogs December 2023 Sale not clear .NET
Name unknown November 2023 under development - C#
Custom RaaS July 2023 Sale $200 not clear
Diablo January 2024 Sale $50/month not clear
Evil Extractor December 2023 Sale $99-$199/month not clear
HardShield September 2023 Open Source free C++
Jigsaw June 2023 Sale $500 .NET
Kryptina December 2023 Sale Single build: $20 Source code: $800 C
Lolicrypt August 2023 Sale $1000 not clear
Loni July 2023 Sale $999/month $9999/one-time purchase C
Nevermore October 2023 Sale $250 C#
RansomTuga June 2023 Open Source free C++
Yasmha February 2024 Sale $500 C#
Ergon September 2023 Sale 1 Compilation: 0.5BTC
Source code: 2.5BTC
not clear
Name unknown September 2023 under development - Go
Name unknown July 2023 Sale $1000 C++
Name unknown January 2024 Sale $60 not clear
Name unknown February 2024 Sale $50 Python
Name unknown June 2023 Sale $500 not clear


According to Sophos, while many well-known ransomware use sophisticated logos and interfaces, JunkGun ransomware uses 'shoddy and amateurish logos and interfaces.' For example, here is the logo used by Lolicrypt:



Sophos also notes that well-known ransomware is shifting to development in Rust and Go. Sophos points out that 'Junk Gun ransomware is developed in relatively easy-to-learn languages such as C# and .NET,' and speculates that Junk Gun ransomware is developed by relatively inexperienced programmers.

in Software,   Security, Posted by log1o_hf