Monday, December 4, 2023

INPIVX Service Let Anyone to Develop Malware From Scratch

Cybercriminals posted a new service called Inpivx, which provides a management dashboard for its customers to manage and to develop the malware from scratch.

The new straightforward service allows anyone with average computer skill can create ransomware with all file encrypting mechanism including the decryptor.

The service was promoted in Tor site and the package sold by Cybercriminals for $500. The management panel written in C++ and supports from Windows XP to Windows 10.

An Inpivx member said, that the “ransomware and the dashboard are tied together. Moreover, the client can adapt the ransomware code to what they need and they also provide tutorials for customization.”

The supply chain service control panel also includes chat support, lightweight, and responsive, fast and flat design.

Once the malware affected victim’s machine it encrypts all the files and the control panel acts as the central point, it lists the number of encrypted files, ransomware installations, operating systems and geographical location.

Also it details the individual victim’s ransom amount, the decryption key and payment status.

Ransomware is the fast-growing threat and it is considered as a leader of Global cyber attack in recent days. It still continues to be a global threat, it’s become a billion-dollar industry that shows no signs of going away anytime soon.

Here you can find the Ransomware Attack Response and Mitigation Checklist.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Website

Latest articles

Hackers Use Weaponized Documents to Attack U.S. Aerospace Industry

An American aerospace company has been the target of a commercial cyberespionage campaign dubbed...

Active Attacks Targeting Google Chrome & ownCloud Flaws: CISA Warns

The CISA announced two known exploited vulnerabilities active attacks targeting Google Chrome & own...

Cactus Ransomware Exploiting Qlik Sense code execution Vulnerability

A new Cactus Ransomware was exploited in the code execution vulnerability to Qlik Sense...

Hackers Bypass Antivirus with ScrubCrypt Tool to Install RedLine Malware

The ScrubCrypt obfuscation tool has been discovered to be utilized in attacks to disseminate the RedLine Stealer...

Hotel’s Booking.com Hacked Logins Let Attacker Steal Guest Credit Cards

According to a recent report by Secureworks, a well-planned and advanced phishing attack was...

Critical Zoom Vulnerability Let Attackers Take Over Meetings

Zoom, the most widely used video conferencing platform has been discovered with a critical...

Hackers Using Weaponized Invoice to Deliver LUMMA Malware

Hackers use weaponized invoices to exploit trust in financial transactions, embedding malware or malicious...

API Attack Simulation Webinar

Live API Attack Simulation

In the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Products at Indusface demonstrate how APIs could be hacked.The session will cover:an exploit of OWASP API Top 10 vulnerability, a brute force account take-over (ATO) attack on API, a DDoS attack on an API, how a WAAP could bolster security over an API gateway

Related Articles