Threat Actor: Rape Ransomware Team | Rape Ransomware Team
Victim: Enterprise Windows networks | Enterprise Windows networks
Price: 80% profit share
Exfiltrated Data Type: Not specified
Additional Information:
- The Rape Ransomware team is seeking partners experienced in accessing enterprise Windows networks.
- Partners will receive 80% of the ransom profits for each system they facilitate access to.
- The team retains a 20% fee for software development and negotiation services.
- Potential partners must operate in specific countries listed in the provided information.
- The team does not work with healthcare or non-profit organizations.
- The ransomware is capable of operating on Windows, Linux, and ESXi platforms.
- This call for partners aims to expand the team’s reach and maximize profits through collaboration.
Rape Ransomware team has recently issued a call for partners experienced in accessing enterprise Windows networks, offering lucrative commission-based arrangements. According to their announcement, partners stand to gain 80% of the ransom profits for each system they facilitate access to, while the team retains a 20% fee for software development and negotiation services.
However, the team has set strict criteria for potential partners, restricting operations to networks located in specific countries. These countries include Guinea, Hungary, Paraguay, Ivory Coast, Tajikistan, Ethiopia, Serbia, Colombia, Mozambique, Cameroon, Azerbaijan, Saudi Arabia, Yemen, Algeria, Belarus, Jordan, Bhutan, Syria, Zimbabwe, Tanzania, Haiti, Iran, Indonesia, Mexico, Namibia, Bolivia, Malaysia, Central African Republic, Comoros, Bangladesh, Kazakhstan, Nigeria, Laos, Eswatini, Nepal, Sri Lanka, Morocco, Argentina, Kyrgyzstan, Vietnam, DR Congo, Botswana, China, Russia, Belize, Niger, Tunisia, Somalia, Egypt, India, Brazil, Papua New Guinea, Lebanon, Kuwait, Angola, Oman, Honduras, Malawi, Gambia, Brunei, Benin, Senegal, Ukraine, Ecuador, Republic of the Congo, Gabon, Bahrain, Suriname, Qatar, Turkey, Kenya, Mauritania, Nicaragua, Togo, Libya, Uganda, Cambodia, Pakistan, Lesotho, South Africa, Guyana, Ghana, Bosnia and Herzegovina, Burkina Faso, Sierra Leone, Burundi, Fiji, Liberia, Madagascar, Sudan, Iraq, Zambia, Rwanda, United Arab Emirates, Chad, Thailand, Philippines, Myanmar, Djibouti, Guatemala, Venezuela, El Salvador, and Mali.
The team has also made it clear that they do not work with healthcare or non-profit organizations. The ransomware is versatile, capable of operating on Windows, Linux (x86/x64/ARM), and ESXi platforms, showcasing the team’s technical proficiency and broad target range. This call for partners signifies a strategic move to expand their reach and maximize profits through a collaborative cybercriminal effort.
Original Source: https://dailydarkweb.net/rape-ransomware-team-seeks-partners-for-enterprise-windows-network-access-offering-80-profit-share/