Wednesday, April 9, 2025
HomeComputer SecurityDangerous GandCrab Ransomware Shutting Down its Operations after Earning $2 Billion in...

Dangerous GandCrab Ransomware Shutting Down its Operations after Earning $2 Billion in Ransom Payments

Published on

SIEM as a Service

Follow Us on Google News

Gandcrab ransomware first spotted in January 2018, and it is the most sophisticated and continuously changing ransomware. The operators behind the ransomware have released five different ransomware versions in more than one year.

The ransomware was distributed through multiple vectors that include malicious spam emails, exploit kits, social Engineering methods, and other malware campaigns.

According to researchers Damian and David Montenegro, the Gandcrab operators have posted that they are to shut down the operations.

- Advertisement - Google News

Based on the screenshot shared by researchers, it shows that the operators have earned more than $2 billion in ransom payments at an average of 2.5 million dollars per week.

https://twitter.com/CryptoInsane/status/1134727041826377729

The threat actors behind the ransomware have personally earned more than 150 million dollars per year, and they have cashed out money through legit sources.

The Announcement says they have stopped promoting the ransomware and asked affiliates to stop distribution of ransomware within 20 days.

Also, they urge victim’s to pay the ransom; else the key will get deleted. It is still unclear whether the operators would release the keys after they shut down the operation.

GandCrab Ransomware Versions

GandCrab v1 – Discovered in January 2018, distributed via exploit kits such as RIG EK and GrandSoft EK. Ransom payment collected in DASH crypto-currency. Encrypts files and appends .gdcb extension.

GandCrab v2 – The ransomware was distributed through spam emails, and it appends .CRAB extension to the encrypted files.

GandCrab v3 – Next version comes with the ability to change the desktop wallpaper with ransomware notes. This version of ransomware also appends .CRAB extension to the encrypted files.

GandCrab v4 – the Fourth version appends an extension .KRAB instead of CRAB and it uses the Tiny Encryption Algorithm to avoid detection. It was distributed through fake software crack sites.

GandCrab v5 – Appends 5 character extension on the encrypted files and after the encryption process, it creates an HTML ransom notes that shows files, documents, photos are encrypted.

Ransomware has always been a threat for cybersecurity professionals, with new variants and types developed every day; this has become a never-ending routine for IT, administrators, to prevent them from causing havoc to their business.

The Ransomware campaigns will continue to grow in numbers, but not all campaigns would be competent enough to last long. In Jan 2017, there were 635 campaigns, in Feb 2018 it was 1105, and in Jan 2019 it was 1453.

Related Read

Gandcrab Ransomware Attack Windows Users via Compromised Websites

Hackers Launching GandCrab Ransomware via New Fallout Exploit Kit using Malvertising Campaign

GandCrab Ransomware Attack via Compromised Websites using SMB Exploit Spreader

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Researchers Uncover Hacking Tools and Techniques Shared on Russian-Speaking Cybercrime Forums

Trend Micro, a cybersecurity firm, has released its 50th installment report on the Russian-speaking...

SideCopy APT Hackers Impersonate Government Officials to Deploy Open-Source XenoRAT Tool

The Pakistan-linked Advanced Persistent Threat (APT) group known as SideCopy has significantly expanded its...

Russian APT Hackers Use Device Code Phishing Technique to Bypass MFA

Russian state-backed advanced persistent threat (APT) group Storm-2372 has exploited device code phishing to...

Threat Actors Exploit Messaging Services as Lucrative Cybercrime Platforms

Threat actors are exploiting weaknesses in SMS verification systems to generate massive, fraudulent message...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

HollowQuill Malware Targets Government Agencies Globally Through Weaponized PDF Documents

In a disturbing escalation of cyber threats, a new malware campaign dubbed 'HollowQuill' has...

New Double-Edged Email Attack Steals Office 365 Credentials and Delivers Malware

Cybersecurity experts have uncovered a sophisticated phishing campaign that employs a double-edged tactic to...

Ransomware Groups Target Organizations to Exfiltrate Data and Blackmail via Leak Site Posts

Ransomware attacks have continued their relentless assault on organizations worldwide, with a focus on...