{"id":3836,"date":"2020-08-18T00:57:00","date_gmt":"2020-08-17T23:57:00","guid":{"rendered":"https:\/\/werle.pro\/?p=3836"},"modified":"2020-08-18T00:57:12","modified_gmt":"2020-08-17T23:57:12","slug":"ssi-exp-pdt-anomali-threat-research-releases-first-public-analysis-of-smaug-ransomware-as-a-service","status":"publish","type":"post","link":"https:\/\/werle.pro\/index.php\/2020\/08\/18\/ssi-exp-pdt-anomali-threat-research-releases-first-public-analysis-of-smaug-ransomware-as-a-service\/","title":{"rendered":"SSI EXP PDT &#8211; Anomali Threat Research Releases First Public Analysis of Smaug Ransomware as a Service"},"content":{"rendered":"\n<p><em>Authored by: Joakim Kennedy and Rory Gould<\/em><\/p>\n\n\n\n<p>Anomali ThreatStream customers can find Indicators of Compromise (IOCs), signatures, and <a href=\"https:\/\/ui.threatstream.com\/tip\/942687?__hstc=41179005.f5263fcedeb8df4a4fd98cf81b671f40.1597708444214.1597708444214.1597708444214.1&amp;__hssc=41179005.1.1597708444214&amp;__hsfp=3118589655\" target=\"_blank\" rel=\"noreferrer noopener\">more information about this threat here<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Introduction<\/h2>\n\n\n\n<p>Threat actors and cybercriminals that don\u2019t have the ability to develop their own ransomware for malicious campaigns can turn to the Smaug Ransomware as a Service (RaaS) offering, which is available via a Dark Web Onion site. At least two threat actors are operating the site, providing ransomware that can be used to target Windows, macOS, and Linux machines. The site is built with ease of use in mind. To launch an attack, threat actors simply need to sign up, create a campaign, and then start distributing the malware. The site also handles decryption key purchasing and tracking for victims.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.anomali.com\/blog\/anomali-threat-research-releases-first-public-analysis-of-smaug-ransomware-as-a-service\">https:\/\/www.anomali.com\/blog\/anomali-threat-research-releases-first-public-analysis-of-smaug-ransomware-as-a-service<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Authored by: Joakim Kennedy and Rory Gould Anomali ThreatStream customers can find Indicators of Compromise (IOCs), signatures, and more information about this threat here. Introduction Threat actors and cybercriminals that don\u2019t have the ability to develop their own ransomware for malicious campaigns can turn to the Smaug Ransomware as a Service (RaaS) offering, which is &#8230; <a title=\"SSI EXP PDT &#8211; Anomali Threat Research Releases First Public Analysis of Smaug Ransomware as a Service\" class=\"read-more\" href=\"https:\/\/werle.pro\/index.php\/2020\/08\/18\/ssi-exp-pdt-anomali-threat-research-releases-first-public-analysis-of-smaug-ransomware-as-a-service\/\" aria-label=\"Read more about SSI EXP PDT &#8211; Anomali Threat Research Releases First Public Analysis of Smaug Ransomware as a Service\">Lire la suite<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[10],"tags":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p7ALXt-ZS","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/posts\/3836"}],"collection":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/comments?post=3836"}],"version-history":[{"count":1,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/posts\/3836\/revisions"}],"predecessor-version":[{"id":3837,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/posts\/3836\/revisions\/3837"}],"wp:attachment":[{"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/media?parent=3836"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/categories?post=3836"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/werle.pro\/index.php\/wp-json\/wp\/v2\/tags?post=3836"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}