CyberSecurity news

FlagThis

@newsinterpretation.com //
Iran is reportedly sponsoring cyber warfare by leveraging ransomware-as-a-service (RaaS) operations with increased profit-sharing incentives for affiliates targeting the United States and Israel. The Pay2Key RaaS group, now operating as Pay2Key.I2P, has resurfaced with an offering of an 80% profit share to hackers who successfully attack Iran's adversaries. This tactic aims to undermine the economies and critical infrastructure of these targeted nations, aligning with a broader trend of nation-states utilizing cyberattacks to advance foreign policy and circumvent economic sanctions. Reports indicate that this operation has already collected over $4 million in extortion payments within a four-month period, with individual operators boasting significant profits.

The resurgence of Pay2Key.I2P highlights the evolving capabilities of Iranian-backed advanced persistent threat (APT) groups. These groups, including those tracked as MuddyWater and APT33, have been observed launching more attacks against U.S. industrial entities. The Pay2Key.I2P campaign is noted for its sophistication, utilizing the I2P anonymizing network and integrating features from other known malware like Mimic. This strategic move not only expands their attack surface but also demonstrates a clear ideological commitment, with operators explicitly encouraged to target those perceived as enemies of Iran. The group has also expanded its capabilities to include Linux-targeted ransomware, further broadening its potential impact.

This development underscores a growing concern in the cybersecurity landscape, where nation-states are increasingly employing cyberattacks as a tool for geopolitical objectives. The increased profit-sharing offered by Pay2Key.I2P signifies a more aggressive recruitment strategy for cybercriminals willing to engage in these state-sponsored attacks. As these nations continue to invest in and develop their cyber warfare capabilities, the global cybersecurity risks are expected to escalate significantly. Security professionals are urged to stay informed about these evolving threats, understanding attacker methodologies and tools to effectively manage the mounting risks posed by nation-state actors.

Share: bluesky twitterx--v2 facebook--v1 threads


References :
  • securityaffairs.com: Iranian group Pay2Key.I2P ramps Up ransomware attacks against Israel and US with incentives for affiliates
  • www.morphisec.com: Reporting on Iranian CyberWarfare
  • newsinterpretation.com: Iranian ransomware gang Pay2Key/I2P returns, offers huge rewards for attacks on U.S. and Israel.
  • Matthew Rosenquist: Iran sponsored Pay2Key Ransomware-as-a-Service (RaaS)
  • securityonline.info: Iranian Ransomware “Pay2Key.I2P†Resurfaces on I2P Network, Offering 80% Profit for Targeting Western Enemies
  • The Hacker News: Iranian-Backed Pay2Key Ransomware Resurfaces with 80% Profit Share for Cybercriminals
Classification: