Monday, May 19, 2025
HomeDark WebINPIVX Service Let Anyone to Develop Malware From Scratch

INPIVX Service Let Anyone to Develop Malware From Scratch

Published on

SIEM as a Service

Follow Us on Google News

Cybercriminals posted a new service called Inpivx, which provides a management dashboard for its customers to manage and to develop the malware from scratch.

The new straightforward service allows anyone with average computer skill can create ransomware with all file encrypting mechanism including the decryptor.

The service was promoted in Tor site and the package sold by Cybercriminals for $500. The management panel written in C++ and supports from Windows XP to Windows 10.

- Advertisement - Google News

An Inpivx member said, that the “ransomware and the dashboard are tied together. Moreover, the client can adapt the ransomware code to what they need and they also provide tutorials for customization.”

The supply chain service control panel also includes chat support, lightweight, and responsive, fast and flat design.

Once the malware affected victim’s machine it encrypts all the files and the control panel acts as the central point, it lists the number of encrypted files, ransomware installations, operating systems and geographical location.

Also it details the individual victim’s ransom amount, the decryption key and payment status.

Ransomware is the fast-growing threat and it is considered as a leader of Global cyber attack in recent days. It still continues to be a global threat, it’s become a billion-dollar industry that shows no signs of going away anytime soon.

Here you can find the Ransomware Attack Response and Mitigation Checklist.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Hackers Exploit RVTools to Deploy Bumblebee Malware on Windows Systems

A reliable VMware environment reporting tool, RVTools, was momentarily infiltrated earlier this week on...

Confluence Servers Under Attack: Hackers Leverage Vulnerability for RDP Access and Remote Code Execution

Threat actors exploited a known vulnerability, CVE-2023-22527, a template injection flaw in Atlassian Confluence...

New ModiLoader Malware Campaign Targets Windows PCs, Harvesting User Credentials

AhnLab Security Intelligence Center (ASEC) has recently uncovered a malicious campaign distributing ModiLoader (also...

Health Care Data Breach Costs BreachForums Admin $700,000 Fine

Conor Brian Fitzpatrick, the 22-year-old former administrator of cybercrime forum Breachforums, will forfeit approximately...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

New Ransomware Attack Targets Elon Musk Supporters Using PowerShell to Deploy Payloads

A newly identified ransomware campaign has emerged, seemingly targeting supporters of Elon Musk through...

Researchers Replicate Advanced Tactics and Tools of VanHelsing Ransomware

Cybersecurity researchers at AttackIQ have meticulously emulated the intricate tactics, techniques, and procedures (TTPs)...

TransferLoader Malware Enables Attackers to Execute Arbitrary Commands on Infected Systems

A formidable new malware loader, dubbed TransferLoader, has emerged as a significant cybersecurity threat,...