Friday, September 13, 2024
HomeDark WebINPIVX Service Let Anyone to Develop Malware From Scratch

INPIVX Service Let Anyone to Develop Malware From Scratch

Published on

Cybercriminals posted a new service called Inpivx, which provides a management dashboard for its customers to manage and to develop the malware from scratch.

The new straightforward service allows anyone with average computer skill can create ransomware with all file encrypting mechanism including the decryptor.

The service was promoted in Tor site and the package sold by Cybercriminals for $500. The management panel written in C++ and supports from Windows XP to Windows 10.

- Advertisement - EHA

An Inpivx member said, that the “ransomware and the dashboard are tied together. Moreover, the client can adapt the ransomware code to what they need and they also provide tutorials for customization.”

The supply chain service control panel also includes chat support, lightweight, and responsive, fast and flat design.

Once the malware affected victim’s machine it encrypts all the files and the control panel acts as the central point, it lists the number of encrypted files, ransomware installations, operating systems and geographical location.

Also it details the individual victim’s ransom amount, the decryption key and payment status.

Ransomware is the fast-growing threat and it is considered as a leader of Global cyber attack in recent days. It still continues to be a global threat, it’s become a billion-dollar industry that shows no signs of going away anytime soon.

Here you can find the Ransomware Attack Response and Mitigation Checklist.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Citrix Workspace App Vulnerable to Privilege Escalation Attacks

Citrix released a security bulletin (CTX691485) detailing two critical vulnerabilities in the Citrix Workspace...

Beware Of Weaponized Excel Document That Delivers Fileless Remcos RAT

A recent advanced malware campaign leverages a phishing attack to deliver a seemingly benign...

Hackers Exploiting Apache OFBiz RCE Vulnerability in the Wild

A critical vulnerability in the Apache OFBiz framework has been actively exploited by hackers....

Docker Desktop Vulnerabilities Let Attackers Execute Remote Code

Docker has addressed critical vulnerabilities in Docker Desktop that could allow attackers to execute...

Free Webinar

Decoding Compliance | What CISOs Need to Know

Non-compliance can result in substantial financial penalties, with average fines reaching up to $4.5 million for GDPR breaches alone.

Join us for an insightful panel discussion with Chandan Pani, CISO - LTIMindtree and Ashish Tandon, Founder & CEO – Indusface, as we explore the multifaceted role of compliance in securing modern enterprises.

Discussion points

The Role of Compliance
The Alphabet Soup of Compliance
Compliance
SaaS and Compliance
Indusface's Approach to Compliance

More like this

CosmicBeetle Exploiting Old Vulnerabilities To Attacks SMBs All Over The World

CosmicBeetle, a threat actor specializing in ransomware, has recently replaced its old ransomware, Scarab,...

New Developer-As-A-Service In Hacking Forums Empowering Phishing And Cyberattacks

SCATTERED SPIDER, a ransomware group, leverages cloud infrastructure and social engineering to target insurance...

New RansomHub Attack Killing Kaspersky’s TDSSKiller To Disable EDR

RansomHub has recently employed a novel attack method utilizing TDSSKiller and LaZagne, where TDSSKiller,...