In today’s hyper connected world, the distinction between legitimate business practices and cybercriminal operations is becoming increasingly blurred. On the public Internet, SaaS companies routinely partner to create more robust solutions. On the dark web, shadowy hacker organizations are following a similar script to enhance their own devious capabilities. One striking example is EncryptHub, a malware-as-a-service offering available for purchase on the dark web, whose operations and partnerships mirror those of bona fide tech enterprises.
Recent investigations, such as the detailed research by KrakenLabs, reveal that security missteps within EncryptHub’s network of command and control (C2) systems allowed researchers to penetrate its inner workings. Much like a high profile database misconfiguration that leaked millions of chat log entries from DeepSeek, these security errors with EncryptHub provided KrakenLabs researchers critical insights into its operations, kill chain, and toolset.
In the online public Internet world, companies often form strategic alliances to bolster their service offerings. In the dark web, cybercriminals are employing a similar approach. EncryptHub partnered with a hacking entity known as LabInstalls, which offers malware distribution services on a pay-per-install basis, ranging from $10 for 100 installs to $450 for 10,000 installs. This collaboration is eerily reminiscent of how SaaS providers join forces to deliver integrated solutions that maximize customer value.
The key takeaways here are two-fold. First, hacking organizations are teaming up to bring best-of-malware solutions together to further their cause. Secondly, configuration and security mistakes don’t discriminate: they expose anyone’s data whether a SaaS platform provider like DeepSeek or an elite hacker organization such as EncryptHub! So with this new found kill-chain recently investigated by KrakenLabs, let’s look at what EncryptHub was up to.
A close review of KrakenLabs’ research paper provides a clear view of EncryptHub’s infection methods. This malware-as-a-service operates via a multi-stage attack process, where the initial compromise is just the beginning of a carefully orchestrated kill chain::
EncryptHub employs a multi-stage approach that actively prioritizes systems based on high-value criteria. The malware scans compromised machines for indicators of wealth and vulnerability such as active cryptocurrency wallets, VPN software, and password manager data. By flagging these systems, EncryptHub ensures that attackers can quickly identify the most lucrative targets for follow-up attacks, maximizing the potential for significant data exfiltration or financial theft.
In another page torn right from the public SaaS platforms playbooks, dark web marketplaces have incorporated user rating and feedback systems for the malware and services provided. These rating mechanisms allow buyers to evaluate the quality, support, and even the ROI of each malware service offering. As a result, cybercriminal organizations have adopted sophisticated quality assurance processes similar to those used by legitimate SaaS providers, enabling them to continuously refine and improve their services based on community feedback.
To defend against EncryptHub malware and similar threats, organizations should implement the following best practices:
Only by studying the various parallels and sophisticated attack methods of our adversaries can we hope to secure our companies, networks, and data. Attacks today are more sophisticated, more frequent, and more damaging when successful. Sun Tzu wrote over 2000 years ago, “that to know your enemy’s strengths and weaknesses is to ensure success in a hundred battles.” Never has that been more true than in today’s online digital warzone.
Not ready to sign up yet, but want to learn more? Attend our monthly webinar to see a demo of CyberHoot, ask questions, and learn what’s new. Click the Green Box below to Register. You want to, I can feel it!
Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.
Stop tricking employees. Start training them. Take Control of Your Security Awareness Training with a Platform...
Read moreA recent discovery by cybersecurity firm Oligo Security has unveiled a series of critical vulnerabilities in...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.