{"id":7858,"date":"2021-06-03T15:32:50","date_gmt":"2021-06-03T13:32:50","guid":{"rendered":"https:\/\/www.aleph-networks.com\/ransomware-data-disclosure-and-malware-as-a-service-on-the-dark-web-2-2\/"},"modified":"2023-05-09T17:27:22","modified_gmt":"2023-05-09T15:27:22","slug":"ransomware-data-disclosure-and-malware-as-a-service-on-the-dark-web-2-2","status":"publish","type":"post","link":"https:\/\/www.aleph-networks.eu\/en\/ransomware-data-disclosure-and-malware-as-a-service-on-the-dark-web-2-2\/","title":{"rendered":"Ransomware, data disclosure and malware-as-a-service on the Dark Web. 2\/2"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; admin_label=&#8221;Section&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; background_enable_image=&#8221;off&#8221; custom_padding=&#8221;3px||8px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;119px||17px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_post_title meta=&#8221;off&#8221; admin_label=&#8221;Titre du poste&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_orientation=&#8221;center&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_post_title][et_pb_text admin_label=&#8221;Texte&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Barlow Condensed||||||||&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font=&#8221;|600|||||||&#8221; header_2_font_size=&#8221;25px&#8221; min_height=&#8221;98px&#8221; custom_margin=&#8221;-93px||-27px|||&#8221; custom_padding=&#8221;95px|||||&#8221; text_font_tablet=&#8221;&#8221; text_font_phone=&#8221;&#8221; text_font_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; min_height=&#8221;308px&#8221; custom_margin=&#8221;|auto|-30px|auto||&#8221; custom_padding=&#8221;1px||23px|5px||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Barlow Condensed||||||||&#8221; custom_padding=&#8221;55px|||||&#8221; text_font_tablet=&#8221;&#8221; text_font_phone=&#8221;&#8221; text_font_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_text][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Barlow Condensed||||||||&#8221; text_font_tablet=&#8221;&#8221; text_font_phone=&#8221;&#8221; text_font_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;]Analysing the victims of groups like Egregor (some of whose members were arrested in Ukraine in February 2021) reveals that ransomware operators do not just target big or world-renowned companies or institutions. While the victims do include major firms, attacks have also targeted medium-sized companies, such as a company in France\u2019s Rh\u00f4ne-Alpes region with 340 employees and a Canadian logistics company with fewer than 60 employees.[\/et_pb_text][et_pb_text admin_label=&#8221;Texte&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Barlow Condensed||||||||&#8221; text_line_height=&#8221;1.2em&#8221; header_font=&#8221;|600|||||||&#8221; header_2_font=&#8221;|600|||||||&#8221; header_2_font_size=&#8221;24px&#8221; header_2_line_height=&#8221;1.3em&#8221; custom_margin=&#8221;||4px|||&#8221; custom_padding=&#8221;1px||0px|0px||&#8221; text_font_tablet=&#8221;&#8221; text_font_phone=&#8221;&#8221; text_font_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;]Ransomware operators are simply opportunistic. The target\u2019s economic profile ultimately matters little; it is the IT system\u2019s vulnerability that determines the probability of attack. It is more profitable for hackers to target several small companies with weak protection than try to penetrate the highly protected systems of a company that understands the risks. Unfortunately, not everyone thinks about securing their information system, and not all companies can afford this protection.<br \/>\nDue to its ease of execution combined with an increase in intrusion points, ransomware has quickly become one of the most profitable types of attack. This method is very common on the dark web, with a constantly expanding attack surface and the development of the Malware-as-a-Service market.[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2021\/06\/malware-as-a-service-1.png&#8221; title_text=&#8221; &#8221; show_in_lightbox=&#8221;on&#8221; align=&#8221;right&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; max_width=&#8221;53%&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2021\/06\/malware-as-a-service-2.png&#8221; title_text=&#8221; &#8221; show_in_lightbox=&#8221;on&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; width=&#8221;57%&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;|auto|-42px|auto||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Barlow Condensed||||||||&#8221; custom_margin=&#8221;-36px||5px|||&#8221; text_font_tablet=&#8221;&#8221; text_font_phone=&#8221;&#8221; text_font_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\"><em>Examples of Malware-as-a-Service offered by hackers on the dark web<\/em><\/p>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Barlow Condensed||||||||&#8221; custom_padding=&#8221;66px|||||&#8221; text_font_tablet=&#8221;&#8221; text_font_phone=&#8221;&#8221; text_font_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<h2>ANSSI issues alerts but also makes recommendations.<\/h2>\n<p>[\/et_pb_text][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Barlow Condensed||||||||&#8221; min_height=&#8221;188px&#8221; custom_margin=&#8221;23px||-3px|||&#8221; custom_padding=&#8221;0px||55px|||&#8221; text_font_tablet=&#8221;&#8221; text_font_phone=&#8221;&#8221; text_font_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;]This threat, which involves little effort but can be very profitable, has now become firmly embedded in the cyberthreat landscape.<br \/>\nIn September 2020, ANSSI  (French National Cybersecurity Agency) issued an alert about Emotet, a very widespread type of ransomware. The agency had noticed a resurgence in the number of French entities targeted by this malware. However, France was not the only country Emotet attacked, with New Zealand and Japan also among its victims.[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;-23px|||||&#8221; custom_padding=&#8221;3px||55px|||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_margin=&#8221;|auto|-70px|auto||&#8221; custom_padding=&#8221;11px||43px|||&#8221; border_width_all=&#8221;1px&#8221; border_color_all=&#8221;#f7a700&#8243; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2021\/06\/emotet.png&#8221; title_text=&#8221; &#8221; show_in_lightbox=&#8221;on&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Barlow Condensed||||||||&#8221; custom_margin=&#8221;16px|||||&#8221; custom_padding=&#8221;||16px|||&#8221; text_font_tablet=&#8221;&#8221; text_font_phone=&#8221;&#8221; text_font_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\"><strong>Discussions in a dark web forum about new targets (captured by our software)<\/strong><\/p>\n<p>[\/et_pb_text][et_pb_divider admin_label=&#8221;S\u00e9parateur&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_divider][et_pb_image src=&#8221;https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2021\/06\/discussions-sur-forum-dark-Web.jpg&#8221; title_text=&#8221; &#8221; show_in_lightbox=&#8221;on&#8221; align=&#8221;center&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Barlow Condensed||||||||&#8221; custom_margin=&#8221;16px|||||&#8221; custom_padding=&#8221;|268px|16px|260px||&#8221; text_font_tablet=&#8221;&#8221; text_font_phone=&#8221;&#8221; text_font_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\"><b>Job offer from a user looking to use the coronavirus as a vector to spread the Emotet ransomware (captured by our software)<\/b><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text admin_label=&#8221;Texte&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Barlow Condensed||||||||&#8221; text_line_height=&#8221;1.2em&#8221; header_2_font_size=&#8221;24px&#8221; custom_margin=&#8221;4px||7px|||&#8221; custom_padding=&#8221;77px||0px|||&#8221; text_font_tablet=&#8221;&#8221; text_font_phone=&#8221;&#8221; text_font_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;]In addition to the alert issued in September 2020, on 29 October of the same year, the French National Cybersecurity Agency also published a study on Malware-as-a-Service using Emotet  as an example. In this new trend, the cyberattack can simply be outsourced to a hacker, with no skills required. This \u201cuberisation\u201d of cyberattacks further increases existing threats. Now anyone with the means can hire a hacker. The jobs can range from compromising social media or email accounts to completely destabilising information systems.[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=&#8221;1_2,1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2021\/06\/Exemple-de-mise-a-disposition-de-ressources.png&#8221; title_text=&#8221; &#8221; show_in_lightbox=&#8221;on&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;||0px|||&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Barlow Condensed||||||||&#8221; text_font_tablet=&#8221;&#8221; text_font_phone=&#8221;&#8221; text_font_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\"><em>Example of services to launch ransomware attacks that can be found on the dark web<\/em><\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=&#8221;1_2&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_image src=&#8221;https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2021\/06\/Services-de-hacking.png&#8221; title_text=&#8221; &#8221; show_in_lightbox=&#8221;on&#8221; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; min_height=&#8221;389.8px&#8221; height=&#8221;394px&#8221; custom_margin=&#8221;||20px|||&#8221; custom_padding=&#8221;0px||0px|||&#8221; global_colors_info=&#8221;{}&#8221;][\/et_pb_image][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Barlow Condensed||||||||&#8221; text_font_tablet=&#8221;&#8221; text_font_phone=&#8221;&#8221; text_font_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p style=\"text-align: center;\"><em>\u201cTypical\u201d hacking services offered on the dark web<\/em><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.16&#8243; _module_preset=&#8221;default&#8221; text_font=&#8221;Barlow Condensed||||||||&#8221; text_font_tablet=&#8221;&#8221; text_font_phone=&#8221;&#8221; text_font_last_edited=&#8221;on|desktop&#8221; global_colors_info=&#8221;{}&#8221;]Although the network of hackers associated with the Emotet ransomware was dismantled in January 2021 , we have noticed that France remains a preferred target for hackers using this type of cyberattack. Hackers are taking advantage of the increase in attack vectors to create a real cyberattack marketplace. Not only has this become the most common type of cyberattack, but it has significant consequences for the victims.<br \/>\nWe recommend utmost caution as the strongest form of prevention since hackers\u2019 imagination seems to be limitless. ANSSI has also published a guide with many recommendations. Companies of all sizes and all employees must remain vigilant because these kinds of attacks rely on human error to succeed.[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Analysing the victims of groups like Egregor (some of whose members were arrested in Ukraine in February 2021) reveals that ransomware operators do not just target big or world-renowned companies or institutions. While the victims do include major firms, attacks have also targeted medium-sized companies, such as a company in France\u2019s Rh\u00f4ne-Alpes region with 340 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2711,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[41,42],"tags":[],"class_list":["post-7858","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-en","category-resources-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>- Aleph<\/title>\n<meta name=\"description\" content=\"Ransomware, data disclosure and malware-as-a-service on the Dark Web. 2\/2\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aleph-networks.eu\/\/ransomwares-divulgation-de-donnees-et-malware-as-a-service-dans-le-dark-web-partie-2-2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"- Aleph\" \/>\n<meta property=\"og:description\" content=\"Ransomware, data disclosure and malware-as-a-service on the Dark Web. 2\/2\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aleph-networks.eu\/\/ransomwares-divulgation-de-donnees-et-malware-as-a-service-dans-le-dark-web-partie-2-2\/\" \/>\n<meta property=\"og:site_name\" content=\"Aleph\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-03T13:32:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-09T15:27:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aleph-networks.eu\/\/wp-content\/uploads\/2021\/06\/markus-spiske-iar-afB0QQw-unsplash-scaled-e1622728597639.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2880\" \/>\n\t<meta property=\"og:image:height\" content=\"1920\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Aleph\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Aleph\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.aleph-networks.eu\/\/ransomwares-divulgation-de-donnees-et-malware-as-a-service-dans-le-dark-web-partie-2-2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.aleph-networks.eu\/\/ransomwares-divulgation-de-donnees-et-malware-as-a-service-dans-le-dark-web-partie-2-2\/\"},\"author\":{\"name\":\"Aleph\",\"@id\":\"https:\/\/www.aleph-networks.eu\/#\/schema\/person\/8621ecf2e3704397abb59c4937bfc8d9\"},\"headline\":\"Ransomware, data disclosure and malware-as-a-service on the Dark Web. 2\/2\",\"datePublished\":\"2021-06-03T13:32:50+00:00\",\"dateModified\":\"2023-05-09T15:27:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.aleph-networks.eu\/\/ransomwares-divulgation-de-donnees-et-malware-as-a-service-dans-le-dark-web-partie-2-2\/\"},\"wordCount\":1632,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.aleph-networks.eu\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.aleph-networks.eu\/\/ransomwares-divulgation-de-donnees-et-malware-as-a-service-dans-le-dark-web-partie-2-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2021\/06\/markus-spiske-iar-afB0QQw-unsplash-scaled-e1622728597639.jpg\",\"articleSection\":[\"Blog\",\"Resources\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.aleph-networks.eu\/\/ransomwares-divulgation-de-donnees-et-malware-as-a-service-dans-le-dark-web-partie-2-2\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aleph-networks.eu\/\/ransomwares-divulgation-de-donnees-et-malware-as-a-service-dans-le-dark-web-partie-2-2\/\",\"url\":\"https:\/\/www.aleph-networks.eu\/\/ransomwares-divulgation-de-donnees-et-malware-as-a-service-dans-le-dark-web-partie-2-2\/\",\"name\":\"- Aleph\",\"isPartOf\":{\"@id\":\"https:\/\/www.aleph-networks.eu\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aleph-networks.eu\/\/ransomwares-divulgation-de-donnees-et-malware-as-a-service-dans-le-dark-web-partie-2-2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.aleph-networks.eu\/\/ransomwares-divulgation-de-donnees-et-malware-as-a-service-dans-le-dark-web-partie-2-2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2021\/06\/markus-spiske-iar-afB0QQw-unsplash-scaled-e1622728597639.jpg\",\"datePublished\":\"2021-06-03T13:32:50+00:00\",\"dateModified\":\"2023-05-09T15:27:22+00:00\",\"description\":\"Ransomware, data disclosure and malware-as-a-service on the Dark Web. 2\/2\",\"breadcrumb\":{\"@id\":\"https:\/\/www.aleph-networks.eu\/\/ransomwares-divulgation-de-donnees-et-malware-as-a-service-dans-le-dark-web-partie-2-2\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aleph-networks.eu\/\/ransomwares-divulgation-de-donnees-et-malware-as-a-service-dans-le-dark-web-partie-2-2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.aleph-networks.eu\/\/ransomwares-divulgation-de-donnees-et-malware-as-a-service-dans-le-dark-web-partie-2-2\/#primaryimage\",\"url\":\"https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2021\/06\/markus-spiske-iar-afB0QQw-unsplash-scaled-e1622728597639.jpg\",\"contentUrl\":\"https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2021\/06\/markus-spiske-iar-afB0QQw-unsplash-scaled-e1622728597639.jpg\",\"width\":2880,\"height\":1920},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aleph-networks.eu\/\/ransomwares-divulgation-de-donnees-et-malware-as-a-service-dans-le-dark-web-partie-2-2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aleph-networks.eu\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware, data disclosure and malware-as-a-service on the Dark Web. 2\/2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aleph-networks.eu\/#website\",\"url\":\"https:\/\/www.aleph-networks.eu\/\",\"name\":\"Aleph\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.aleph-networks.eu\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aleph-networks.eu\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.aleph-networks.eu\/#organization\",\"name\":\"Aleph\",\"url\":\"https:\/\/www.aleph-networks.eu\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.aleph-networks.eu\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2020\/06\/logo-Aleph.png\",\"contentUrl\":\"https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2020\/06\/logo-Aleph.png\",\"width\":55,\"height\":55,\"caption\":\"Aleph\"},\"image\":{\"@id\":\"https:\/\/www.aleph-networks.eu\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aleph-networks.eu\/#\/schema\/person\/8621ecf2e3704397abb59c4937bfc8d9\",\"name\":\"Aleph\",\"url\":\"https:\/\/www.aleph-networks.eu\/en\/author\/280520aes\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"- Aleph","description":"Ransomware, data disclosure and malware-as-a-service on the Dark Web. 2\/2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aleph-networks.eu\/\/ransomwares-divulgation-de-donnees-et-malware-as-a-service-dans-le-dark-web-partie-2-2\/","og_locale":"en_US","og_type":"article","og_title":"- Aleph","og_description":"Ransomware, data disclosure and malware-as-a-service on the Dark Web. 2\/2","og_url":"https:\/\/www.aleph-networks.eu\/\/ransomwares-divulgation-de-donnees-et-malware-as-a-service-dans-le-dark-web-partie-2-2\/","og_site_name":"Aleph","article_published_time":"2021-06-03T13:32:50+00:00","article_modified_time":"2023-05-09T15:27:22+00:00","og_image":[{"width":2880,"height":1920,"url":"https:\/\/www.aleph-networks.eu\/\/wp-content\/uploads\/2021\/06\/markus-spiske-iar-afB0QQw-unsplash-scaled-e1622728597639.jpg","type":"image\/jpeg"}],"author":"Aleph","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Aleph","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.aleph-networks.eu\/\/ransomwares-divulgation-de-donnees-et-malware-as-a-service-dans-le-dark-web-partie-2-2\/#article","isPartOf":{"@id":"https:\/\/www.aleph-networks.eu\/\/ransomwares-divulgation-de-donnees-et-malware-as-a-service-dans-le-dark-web-partie-2-2\/"},"author":{"name":"Aleph","@id":"https:\/\/www.aleph-networks.eu\/#\/schema\/person\/8621ecf2e3704397abb59c4937bfc8d9"},"headline":"Ransomware, data disclosure and malware-as-a-service on the Dark Web. 2\/2","datePublished":"2021-06-03T13:32:50+00:00","dateModified":"2023-05-09T15:27:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.aleph-networks.eu\/\/ransomwares-divulgation-de-donnees-et-malware-as-a-service-dans-le-dark-web-partie-2-2\/"},"wordCount":1632,"commentCount":0,"publisher":{"@id":"https:\/\/www.aleph-networks.eu\/#organization"},"image":{"@id":"https:\/\/www.aleph-networks.eu\/\/ransomwares-divulgation-de-donnees-et-malware-as-a-service-dans-le-dark-web-partie-2-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2021\/06\/markus-spiske-iar-afB0QQw-unsplash-scaled-e1622728597639.jpg","articleSection":["Blog","Resources"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.aleph-networks.eu\/\/ransomwares-divulgation-de-donnees-et-malware-as-a-service-dans-le-dark-web-partie-2-2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.aleph-networks.eu\/\/ransomwares-divulgation-de-donnees-et-malware-as-a-service-dans-le-dark-web-partie-2-2\/","url":"https:\/\/www.aleph-networks.eu\/\/ransomwares-divulgation-de-donnees-et-malware-as-a-service-dans-le-dark-web-partie-2-2\/","name":"- Aleph","isPartOf":{"@id":"https:\/\/www.aleph-networks.eu\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aleph-networks.eu\/\/ransomwares-divulgation-de-donnees-et-malware-as-a-service-dans-le-dark-web-partie-2-2\/#primaryimage"},"image":{"@id":"https:\/\/www.aleph-networks.eu\/\/ransomwares-divulgation-de-donnees-et-malware-as-a-service-dans-le-dark-web-partie-2-2\/#primaryimage"},"thumbnailUrl":"https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2021\/06\/markus-spiske-iar-afB0QQw-unsplash-scaled-e1622728597639.jpg","datePublished":"2021-06-03T13:32:50+00:00","dateModified":"2023-05-09T15:27:22+00:00","description":"Ransomware, data disclosure and malware-as-a-service on the Dark Web. 2\/2","breadcrumb":{"@id":"https:\/\/www.aleph-networks.eu\/\/ransomwares-divulgation-de-donnees-et-malware-as-a-service-dans-le-dark-web-partie-2-2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aleph-networks.eu\/\/ransomwares-divulgation-de-donnees-et-malware-as-a-service-dans-le-dark-web-partie-2-2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.aleph-networks.eu\/\/ransomwares-divulgation-de-donnees-et-malware-as-a-service-dans-le-dark-web-partie-2-2\/#primaryimage","url":"https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2021\/06\/markus-spiske-iar-afB0QQw-unsplash-scaled-e1622728597639.jpg","contentUrl":"https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2021\/06\/markus-spiske-iar-afB0QQw-unsplash-scaled-e1622728597639.jpg","width":2880,"height":1920},{"@type":"BreadcrumbList","@id":"https:\/\/www.aleph-networks.eu\/\/ransomwares-divulgation-de-donnees-et-malware-as-a-service-dans-le-dark-web-partie-2-2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aleph-networks.eu\/en\/"},{"@type":"ListItem","position":2,"name":"Ransomware, data disclosure and malware-as-a-service on the Dark Web. 2\/2"}]},{"@type":"WebSite","@id":"https:\/\/www.aleph-networks.eu\/#website","url":"https:\/\/www.aleph-networks.eu\/","name":"Aleph","description":"","publisher":{"@id":"https:\/\/www.aleph-networks.eu\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aleph-networks.eu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.aleph-networks.eu\/#organization","name":"Aleph","url":"https:\/\/www.aleph-networks.eu\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.aleph-networks.eu\/#\/schema\/logo\/image\/","url":"https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2020\/06\/logo-Aleph.png","contentUrl":"https:\/\/www.aleph-networks.eu\/wp-content\/uploads\/2020\/06\/logo-Aleph.png","width":55,"height":55,"caption":"Aleph"},"image":{"@id":"https:\/\/www.aleph-networks.eu\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.aleph-networks.eu\/#\/schema\/person\/8621ecf2e3704397abb59c4937bfc8d9","name":"Aleph","url":"https:\/\/www.aleph-networks.eu\/en\/author\/280520aes\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aleph-networks.eu\/en\/wp-json\/wp\/v2\/posts\/7858","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.aleph-networks.eu\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aleph-networks.eu\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aleph-networks.eu\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aleph-networks.eu\/en\/wp-json\/wp\/v2\/comments?post=7858"}],"version-history":[{"count":0,"href":"https:\/\/www.aleph-networks.eu\/en\/wp-json\/wp\/v2\/posts\/7858\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aleph-networks.eu\/en\/wp-json\/wp\/v2\/media\/2711"}],"wp:attachment":[{"href":"https:\/\/www.aleph-networks.eu\/en\/wp-json\/wp\/v2\/media?parent=7858"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aleph-networks.eu\/en\/wp-json\/wp\/v2\/categories?post=7858"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aleph-networks.eu\/en\/wp-json\/wp\/v2\/tags?post=7858"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}