Home Malware-as-a-Service gaining traction

Malware-as-a-Service gaining traction

May 16 — Cyber criminals are pushing a new modular Malware-as-a-Service offering that enables potential cyber criminals to select off-the-shelf threat tools via a Telegram channel. More than 500 individuals are subscribed to the channel.

With this malware service, known as the Eternity Project, cyber criminals can target victims with a customized threat offering based on modules that range in price from $90 to $490. The modules provide access to a stealer, clipper, worm, miner and ransomware, depending on the interests of the attacker. Cyber criminal developers are also working to create a module that offers distributed denial of service (DDoS) bots.

According to cyber security researchers, Eternity demonstrates how cyber crime is proliferating via Telegram channels and cyber crime forums. This appears to be the case on account of the fact that criminals can sell their products in these spaces without any regulation.

All modules are sold individually. Each one retains a different functionality. Researchers believe that the criminals behind Eternity may be repurposing code from an existing Github repository, which criminals are modifying, relabeling, and reselling under a new names.

Module information

The Malware-as-a-Service Eternity Stealer is priced at $260, provided that hackers wish to maintain an annual subscription. This module pinches passwords, credit cards and crypto-walets from assorted applications. Once the info has been stolen, it is sent along to a cyber criminal-owned Telegram Bot.

The Eternity Miner is listed for the price of $90.00 annually. The Miner includes features such as silent Monero mining, the ability to restart when killed and the ability to remain hidden from the task manager.

The Eternity Ransomware option sells for $490 and leads to encryption of all documents, photos and databases on disks, local shares and USB drives; both online and offline. A product feature enables criminals to set a ransomware execution timer, after which the files cannot be decrypted.

Eternity and cyber crime for the masses

One cyber security expert points out that the existance of this type of software suggests that users may wish to rethink saving credentials on a machine, as this data can be exfiltrated by certain kinds of software.

But above all, individuals and organizations can stop these Malware-as-a-Service threats through the development, acquisition and implementation of multiple security layers.

Protecting your passwords is essential. For more insights into the latest password technology developments, see CyberTalk.org’s interview with Co-Founder of OwnID, Rooly Eliezerov. Lastly, to receive more cutting-edge cyber security news, best practices and analyses, please sign up for theĀ CyberTalk.org newsletter.