Tech Wavo
  • Home
  • Technology
  • Computers
  • Gadgets
  • Mobile
  • Apps
  • News
  • Financial
  • Stock
Tech Wavo
No Result
View All Result

It doesn’t take a genius to be a cybercriminal – and open source ransomware is making it easier than ever

Tech Wavo by Tech Wavo
September 15, 2025
in Computers
0




  • Check Point has observed ransomware being re-used
  • Yurei ransomware has targeted a Sri Lankan food manufacturing firm
  • Open-source ransomware lowers the barrier for criminals

A new study by Check Point research has revealed that cybercriminals are sharing their tactics by using open-source ransomware models, which is ‘enabling even less-skilled threat actors to launch ransomware operations.’

By observing one particular cyberattack which targeted a Sri Lankan food manufacturing firm, the researchers were able to identify the new ransomware group, Yurei, only made very slight modifications to an existing tool in the Prince-Ransomware strain.

The attack is a ‘double ransomware’ model, in which the victim’s files are encrypted, sensitive data is exfiltrated, followed by the demand for a ransom to both decrypt the information, and also to refrain from posting the data on dark web sites or selling it to the highest bidder.


You may like

Yurei ransomware

The ransomware group, named Yurei after a Japanese ghost tale, has utilized an existing open-source ransomware project. Open-source projects enable lower-skilled threat actors to enter the ransomware space with ease.

But, by re-using Prince-Ransomware’s code base, Yurei inherited all of the same flaws, the research says, including the ‘the failure to remove Volume Shadow Copies’ and the ‘oversight enables partial recovery in environments where VSS is enabled.’

“While open-source malware is a threat, it also gives defenders opportunities to detect and mitigate these variations. However, Yurei succeeded in running their operation on several victims, which shows that even low-effort operations can still lead to success,” the study concludes.

The barriers are lowered both in terms of skill and effort, which is only compounded by the huge increase in the use of AI. Only 20% of ransomware is not powered by AI – and it’s used in CAPTCHA bypass, password cracking, code generation, and even to build sophisticated social engineering attacks.

Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!

You might also like

Previous Post

Apple’s Mac mini M4 is up to $110 off right now

Next Post

China says Nvidia violated antitrust regulations

Next Post
Nvidia says two mystery customers accounted for 39% of Q2 revenue

China says Nvidia violated antitrust regulations

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Android Auto’s media player looking faded? This may be why

by Tech Wavo
September 15, 2025
0
Android Auto’s media player looking faded? This may be why
Mobile

C. Scott Brown / Android AuthorityTL;DR Android Auto users are reporting that the media window now looks washed out. The...

Read more

If you were running betas, you may need to turn that off to get the updates

by Tech Wavo
September 15, 2025
0
If you were running betas, you may need to turn that off to get the updates
Technology

Apple released iOS 26 and its companion updates worldwide on September 15 but if you running the betas, you could...

Read more

How A Irrevocable Life Insurance Trust Can Reduce Estate Taxes

by Tech Wavo
September 15, 2025
0
How A Irrevocable Life Insurance Trust Can Reduce Estate Taxes
Financial

Lately, I’ve been thinking more about estate planning. Part of it is just getting older. Part of it is having...

Read more

iOS 26 not downloading? Try these workarounds to get you up and running

by Tech Wavo
September 15, 2025
0
iOS 26 not downloading? Try these workarounds to get you up and running
Computers

iOS 26 is now rolling out to all iOS 26-compatible devices, and in this step-by-step guide, we’ll walk you through...

Read more

Site links

  • Home
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms of use
  • Home
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms of use

No Result
View All Result
  • Home
  • Technology
  • Computers
  • Gadgets
  • Mobile
  • Apps
  • News
  • Financial
  • Stock