Home Malware Programs Ransomware INPIVX Ransomware

INPIVX Ransomware

Posted: June 6, 2019

The Deep Web is a developing ground for many innovative malware projects, and the INPIVX Ransomware seems to be one of them certainly since it is not the typical ransomware-as-a-service scheme that has been used by projects such as the Rapid RaaS and the Hermes RaaS. The latter two provided their customers with a Command & Control server and pre-configured payload and dashboard that can be used as soon as the product fee is paid. However, the INPIVX Ransomware’s authors have opted to use a different method – they offer to sell the ransomware’s source code for $500, and also promise to provide buyers with customer support and a manual on how to set up the administrator area, payload and decryptor. While the INPIVX Ransomware is a bit more complicated to set up, it can still be used by users with no programming experience, and with the help of the project authors, they should be able to modify many aspects of the INPIVX Ransomware’s final version.

Of course, despite the INPIVX Ransomware’s increased flexibility, there are still some setbacks – since the product does not come with ready-to-use infrastructure, its users would need to provide a Command & Control server. Screenshots supplied by the INPIVX Ransomware’s authors show off the project’s dashboard, and reveal that it should be easy-to-use – it provides the attacker with information about the infected machines, ransom fees paid, operating systems, number of encrypted files, etc. The same dashboard can be used to complete the decryption process automatically for victims who have paid the ransom fee.

There is no information to determine whether the INPIVX Ransomware campaign is active or not so that it is not possible to tell if this file-encryption Trojan will turn out to be decryptable. What is for sure is that the INPIVX Ransomware may end up being a very threatening product, since experienced criminals who use its source code may end up adding more features that would enhance the threat’s ability to impair the files and systems of its victims.

Loading...