Solutions

For new threat landscape detection, trust Elementrica solutions

Solutions

Solutions

Boost cyber resilience with our comprehensive services for a secure digital future.

Company

Company

At Elementrica, our people are at the heart of everything we do. Our expertise, dedication, and passion for cyber security drive us to deliver innovative solutions to protect our clients' digital assets.

Company

Company

At Elementrica, our people are at the heart of everything we do. Our expertise, dedication, and passion for cyber security drive us to deliver innovative solutions to protect our clients' digital assets.

Unmasking Farnetwork: The Rising Menace in Cybersecurity

Unmasking Farnetwork: The Rising Menace in Cybersecurity

A new name has emerged in the constantly evolving landscape of cyber threats, causing ripples across the cybersecurity community: Farnetwork. Known for its insidious Ransomware-as-a-Service (RaaS) operations, Farnetwork has established itself as a formidable entity in the dark web’s criminal underworld over the past four years.

Group-IB, a Singapore-based cybersecurity firm, unravelled the intricate web woven by Farnetwork, linking it to five different RaaS programs. Since 2019, this threat actor has been a pivotal figure in developing and managing several ransomware projects, including JSWORM, Nefilim, Karma, and Nemty, before spearheading its own RaaS program using the Nokoyawa ransomware​​.

Operating in Shadows: The Farnetwork Modus Operandi

Operating under various aliases like farnetworkit, farnetworkl, jingo, jsworm, piparkuka, and razvrat, Farnetwork initially advertised a remote access trojan, RazvRAT, on underground forums such as RAMP. In 2022, this Russian-speaking entity shifted its focus to Nokoyawa, launching a botnet service to access compromised corporate networks​​.

Farnetwork’s recruitment strategy for its Nokoyawa RaaS program was aggressive and sophisticated. Potential recruits were tasked with using stolen corporate account credentials to escalate privileges, deploy ransomware, encrypt victims’ files, and demand payment for decryption keys. These credentials were typically sourced from logs sold on underground markets, obtained through malware like RedLine distributed via phishing and malvertising campaigns​​.

The Financials of Ransomware-as-a-Service

Farnetwork’s RaaS model presented a novel and lucrative approach for affiliates. The structure allowed them to receive 65% of the ransom, while the botnet owner and ransomware developer received 20% and 15%, respectively. This arrangement, though reducing the payout for affiliates, significantly enhanced the efficiency and speed of ransomware operations. Farnetwork’s botnet was crucial in accessing corporate networks, effectively replacing initial access brokers​​.

The Implications and Future Threats

Although Nokoyawa ceased operations in October 2023, the cybersecurity community remains vigilant. Experts from Group-IB emphasize the high probability of Farnetwork resurfacing under a different name with a new RaaS program. The threat actor’s experience and skill set place them among the most active players in the RaaS market, underscoring the ongoing challenges cybersecurity experts face​​.

Conclusion: A Persistent Cyber Threat

As we delve into the intricate workings of Farnetwork, it becomes evident that the battle against cybercrime is far from over. The adaptability and resourcefulness of entities like Farnetwork highlight the need for continuous innovation and collaboration within the cybersecurity community. The fight against RaaS operations and their perpetrators is a testament to the dynamic and ever-changing nature of cyber threats, demanding constant vigilance and proactive measures.

This comprehensive exploration of Farnetwork’s RaaS operations sheds light on the intricacies of modern cybercrime and serves as a call to action for stronger cybersecurity measures and collaborations.

CONTACT OUR EXPERTS

Our team is ready to help

Give us a call or leave us a message. We look forward to hearing about your cyber security project, network challenges and any other queries you would like help with.
Get in touch