• Skip to main content
  • Skip to header right navigation
  • Skip to site footer
RestorePrivacy

RestorePrivacy

Resources to stay safe and secure online

  • News
  • Tools
    • Secure Browser
    • VPN
    • Ad Blocker
    • Secure Email
    • Private Search Engine
    • Password Manager
    • Secure Messaging App
    • Tor
    • Identity Theft Protection
    • Unblock Websites
    • Browser Fingerprinting
    • Privacy Tools
  • Email
    • Secure Email
    • ProtonMail Review
    • Tutanota Review
    • Mailfence Review
    • Mailbox.org Review
    • Hushmail Review
    • Posteo Review
    • Fastmail Review
    • Skiff Mail Review
    • StartMail Review
    • Runbox Review
    • Temporary Disposable Email
    • Encrypted Email
    • Alternatives to Gmail
  • VPN
    • What is VPN
    • VPN Reviews
    • VPN Comparisons
    • Best VPNs
    • VPN Coupons
    • VPN Routers
  • Password
    • Best Password Managers
    • KeePass Review
    • NordPass Review
    • 1Password Review
    • Dashlane Review
    • RoboForm Review
    • LastPass Review
    • Bitwarden Review
    • Strong Password
  • Storage
    • Best Cloud Storage
    • pCloud Review
    • Nextcloud Review
    • IDrive Review
    • SpiderOak Review
    • Sync.com Review
    • MEGA Cloud Review
    • NordLocker Review
    • Tresorit Review
    • Google Drive Alternatives
  • Messenger
    • Secure Messaging Apps
    • Signal Review
    • Telegram Review
    • Wire Review
    • Threema Review
    • Session Review
  • Info
    • Mission
    • Press
    • Contact
  • News
  • Tools
    • Secure Browser
    • VPN
    • Ad Blocker
    • Secure Email
    • Private Search Engine
    • Password Manager
    • Secure Messaging App
    • Tor
    • Identity Theft Protection
    • Unblock Websites
    • Browser Fingerprinting
    • Privacy Tools
  • Email
    • Secure Email
    • ProtonMail Review
    • Tutanota Review
    • Mailfence Review
    • Mailbox.org Review
    • Hushmail Review
    • Posteo Review
    • Fastmail Review
    • Skiff Mail Review
    • StartMail Review
    • Runbox Review
    • Temporary Disposable Email
    • Encrypted Email
    • Alternatives to Gmail
  • VPN
    • What is VPN
    • VPN Reviews
    • VPN Comparisons
    • Best VPNs
    • VPN Coupons
    • VPN Routers
  • Password
    • Best Password Managers
    • KeePass Review
    • NordPass Review
    • 1Password Review
    • Dashlane Review
    • RoboForm Review
    • LastPass Review
    • Bitwarden Review
    • Strong Password
  • Storage
    • Best Cloud Storage
    • pCloud Review
    • Nextcloud Review
    • IDrive Review
    • SpiderOak Review
    • Sync.com Review
    • MEGA Cloud Review
    • NordLocker Review
    • Tresorit Review
    • Google Drive Alternatives
  • Messenger
    • Secure Messaging Apps
    • Signal Review
    • Telegram Review
    • Wire Review
    • Threema Review
    • Session Review
  • Info
    • Mission
    • Press
    • Contact

Hacktivists Launch ‘GhostLocker’ Ransomware to Finance their Operations

October 19, 2023 By Heinrich Long — 1 Comment
Hacktivists Launch 'GhostLocker' Ransomware to Finance their Operations

A new ransomware as a service (RaaS) operation named ‘GhostLocker’ was launched earlier this month, calling affiliates to join.

The new operation was announced by GhostSec, a hacktivist group and, member of the ‘Five Families’ collective, which also comprises SiegedSec and Stormous.

The statement released on Telegram touts military-grade encryption, completely undetectable payloads, and centralized negotiation managed by the primary RaaS operators, who claim to be “professionals” in the field. Affiliates are only required to execute the breach and are assured 15% of the proceeds. The project also offers an insightful web panel for affiliates, giving them an overview of their operational success, a sneak peek into the negotiations with the ability for intervention, and more.

For starters, GhostLocker v0.1 was opened to only 15 affiliates, who are requested to pay $999 to join. The RaaS operators claimed that this price would be later increased to $4,999, an entrance fee to filter out less capable/serious affiliates.

No cybersecurity firms have yet dissected GhostLocker, so the claims about encryption strength and the lightness of the binaries haven’t been independently confirmed. A ransom note sample shared by a restoration service claims that the encryption is based on RSA-2048 and AES-128 ciphers, theoretically unbreakable, while victims are given 48 hours to respond to the threat actors’ demands.

PCRisk.com

Today, the authors of GhostLocker released the first major update for the strain, adding a persistence mechanism for the locker that prevents victims or security tools from killing its process, improving the encryption speed, and adding a safeguard to avoid redundant encryption jobs. This reduces the chances of this being a publicity stunt, and the project will likely enjoy continuous development.

Already, the Stormous ransomware group, which made unverified claims of hacking NVIDIA and stealing customer data and source code last year, have announced on their Telegram channel that they will be using GhostLocker alongside their own program, “StormousX.”

Double-edged knife

Incorporating ransomware into a hacktivist’s arsenal can magnify their message and bolster their financial standing. Employing ransomware to target organizations that oppose their core beliefs offers a more impactful approach than executing DDoS attacks, and it provides a lucrative financial incentive.

However, ransomware blurs the line between hacktivism and common cybercrime, threatening to hurt the credibility and reputation of these groups that claim to have a higher moral group. If their actions are driven by profit as much as principle, their message can be diluted or even wholly disregarded.

A recent report by KELA on how hacktivist groups fund their operations shed more light on the subject, involving common cybercrime tactics like data and malware sales, demanding ransom from breached organizations, selling hack guides, renting their DDoS botnet firepower, and offering hack-for-hire services.

Further reading:

  • Prominent Hacktivists to Launch Secure Messaging Framework Veilid
  • CapCut Video App Faces Lawsuit for Illegal Data Collection
  • How to Recognize Phone Scams and Stop Scam Calls
  • Stormous Ransomware Group Claims it Has Stolen NVIDIA Source Code, Threatens to Leak Customer Data

About Heinrich Long

Heinrich is an associate editor for RestorePrivacy and veteran expert in the digital privacy field. He was born in a small town in the Midwest (USA) before setting sail for offshore destinations. Although he long chafed at the global loss of online privacy, after Edward Snowden’s revelations in 2013, Heinrich realized it was time to join the good fight for digital privacy rights. Heinrich enjoys traveling the world, while also keeping his location and digital tracks covered.

Reader Interactions

Comments

  1. Alameen Karim Merali

    November 7, 2023

    Nice and good research. Could you send me the sample for Malware Analysis?

    Reply

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Sidebar

Digital Privacy Essentials:
Secure Browser
Private Search Engines
Secure Email
Best Password Managers
Secure Messaging Services
Best Ad Blockers
Best VPN Services
Secure Cloud Storage

Privacy & Security Guides:
Privacy Tools
Alternatives to Google Products
Firefox Privacy Modifications
Five Eyes, 9 Eyes, 14 Eyes Spying
Browser Fingerprinting
Is Tor Safe?
Alternatives to Gmail
VPN vs Tor
Alternatives to WhatsApp
Is Your Antivirus Spying on You?
Controlling Communication Channels is Crucial for Privacy
Anonymity Networks: VPNs, Tor, and I2P
How to Really Be Anonymous Online
Private and Anonymous Payments

Secure Email Reviews:
ProtonMail Review
Tutanota Review
Mailfence Review
Mailbox.org Review
Hushmail Review
Posteo Review
Fastmail Review
Runbox Review
CTemplar Review
Temporary Email Services
Encrypted Email

Password Manager Reviews:
Bitwarden Review
LastPass Review
KeePass Review
NordPass Review
Dashlane Review
1Password Review
Best Password Managers

Secure Messaging App Reviews:
Wire Review
Signal Review
Threema Review
Telegram Review
Session Review
Wickr Review

Secure Cloud Storage Reviews
Tresorit Review
MEGA Cloud Review
Sync.com Review
Nextcloud Review
IDrive Review
pCloud Review
SpiderOak Review
NordLocker Review

How To Guides
How to Encrypt Files on Windows
How to Encrypt Email
How to Configure Windows 10 for Privacy
How to use Two-Factor Authentication (2FA)
How to Secure Your Android Device for Privacy
How to Secure Your Home Network
How to Protect Yourself Against Identity Theft
How to Unblock Websites
How to Fix WebRTC Leaks
How to Test Your VPN
How to Hide Your IP Address
How to Create Strong Passwords
How to Really Be Anonymous Online

About RestorePrivacy

Contact

Checklist to Restore Privacy:

  1. Secure browser: Brave or Modified Firefox
  2. VPN: NordVPN (69% Off Coupon) or Surfshark VPN
  3. Ad blocker: uBlock Origin or AdGuard
  4. Secure email: ProtonMail or StartMail
  5. Secure Messenger: Signal or Threema
  6. Private search engine: MetaGer or Brave
  7. Password manager: NordPass or Bitwarden

About

RestorePrivacy is a digital privacy advocacy group committed to helping people stay safe and secure online. You can support this project through donations, purchasing items through our links (we may earn a commission at no extra cost to you), and sharing this information with others. See our mission here.

We’re available for Press and media inquiries here.

RestorePrivacy is also on Twitter

COPYRIGHT © 2023 RESTORE PRIVACY, LLC · PRIVACY POLICY · TERMS OF USE · CONTACT · SITEMAP