Operate more efficiently, reduce complexity, improve EBITDA, and much more with the purpose-built platform for MSPs.
Protect and defend what matters most to your clients and stakeholders with ConnectWise's best-in-class cybersecurity and BCDR solutions.
Leverage generative AI and RPA workflows to simplify and streamline the most time-consuming parts of IT.
Join fellow IT pros at ConnectWise industry & customer events!
Check out our online learning platform, designed to help IT service providers get the most out of ConnectWise products and services.
Search our resource center for the latest MSP ebooks, white papers, infographics, webinars and more!
Join hundreds of thousands of IT professionals benefiting from and contributing to a legacy of industry leadership when you become a part of the ConnectWise community.
Join hundreds of thousands of IT professionals benefiting from and contributing to a legacy of industry leadership when you become a part of the ConnectWise community.
It’s every MSP’s nightmare: a message from a cybercriminal that they encrypted and locked a customer’s data. Until the organization pays a significant fee (often in the form of cryptocurrency), the cybercriminal will hold access to the data hostage indefinitely, or they will publish or sell the data on the dark web for other criminals to access and exploit.
Known as ransomware, this cybercrime is becoming more common due to the proliferation of ransomware-as-a-service (RaaS). Criminal groups have adopted the efficiencies and scalability of the software-as-a-service (SaaS) model to make this kind of cyberattack easier and faster than ever—and for the purveyors of ransomware-as-a-service, even more lucrative.
RaaS can incur significant costs to victims due to downtime, unhappy customers, lost or destroyed data, and compromised infrastructure and systems that are expensive to replace or fix. There is also the damage stemming from the bad publicity of a data breach and the release of sensitive information.
Beyond the damage to the victim, ransomware-as-a-service can disrupt critical services like utilities, transportation, finance and banking, manufacturing, and even healthcare that customers depend on. Individuals may suffer from their private data being sold online, leading to identity theft and other scams.
The consequences of RaaS attacks can be far-reaching across hundreds of additional businesses and impact thousands of people. For MSPs, understanding what ransomware-as-a-service is and how it works is essential.
When ransomware is offered as a service, it makes the technology easily available to buy, install, and use. Cybercriminals no longer need deep technical expertise to design and implement their own program—they can simply purchase or subscribe to a ready-made solution at a fairly low cost, and they’re in business.
RaaS providers may use social media and other platforms to promote their services on the dark web, often using sophisticated marketing tactics to identify and target potential customers. They may even use ads, bundles, and special offers to attract and entice them.
How does ransomware-as-a-service work? Just like SaaS solutions, RaaS typically offers a user-friendly dashboard or control panel with various features and functionalities. Ransomware typically involves malware that encrypts files, but some versions may include other capabilities, such as data theft or blockers that prevent users from accessing systems or programs.
Besides data encryption, ransomware-as-a-service has expanded to include data exfiltration and theft, distributed denial-of-service (DDoS) attacks, the ability to lock cloud-based backups, and variants that can infiltrate smartphones and internet of things (IoT) devices such as thermostats.
Ransomware-as-a-service platforms can be remarkably robust and similar to offerings from legitimate companies. Their features can include:
Beyond these capabilities, RaaS gives cybercriminals the ability to carry out attacks on many targets simultaneously through automated processes. The greater the number of victims, the greater the profits.
In the basic ransomware-as-a-service model, cybercriminals (often large criminal enterprises) create a ransomware platform and sell it on the dark web. The RaaS provider takes on the costs of designing, maintaining, and marketing the technology, then profits from the sales of the technology and sometimes from the resulting ransoms.
Ransomware-as-a-service works with a few different payment variations:
RaaS services can run from less than $100 a month to thousands of dollars, depending on the sophistication, features, and capabilities of the platform. Since ransom demands can go up to millions of dollars, the returns on the investment for buyers can be significant even when the cost of the service is relatively high.
Just like “traditional” ransomware attacks, ransomware-as-a-service attacks exploit vulnerabilities in networks and systems. One of the classic ransomware-as-a-service examples involves sending a phishing email with a link or a file to be downloaded. Cybercriminals may also use other methods of social engineering to gain access to security credentials or leverage technical weaknesses in the system or third-party software. With a RaaS solution, they can attack dozens or hundreds of different victims at once.
In the case of a phishing scam, when the victim clicks a link or downloads an infected file, the resulting malware encrypts or locks data on some or all their files, rendering them inaccessible, and identifies additional targets on the network. It may also disable security software and attack or destroy backups.
The victim then receives a message that they must pay a ransom for the decryption key, usually in cryptocurrency or via some other hard-to-trace method. The cybercriminals may threaten to leak, sell, or delete the files if the ransom is not paid.
If the victim decides to pay, they are directed to a portal for payment that is run by the RaaS provider. Once the ransomware-as-a-service provider receives the payment, it is divided among the provider and the subscriber or affiliate according to the terms of their agreement.
Theoretically, the victim should receive the decryption key or see files unlocked upon payment, but in some cases, the attackers may simply disappear or make additional demands. Decryption keys don’t always work correctly on encrypted files, however. Even after paying the ransom, victims only get about 60% of their data back on average.
According to IBM, the average cost of a data breach in the United States in 2022 was $9.44M, including downtime and lost business. But even less expensive breaches can be devastating, especially for smaller businesses.
Ransomware-as-a-service presents a significant challenge for MSPs. The availability of such solutions increases the likelihood and frequency of ransomware attacks: in the same report, IBM noted that RaaS accounts for 11% of all cybersecurity attacks—a percentage that is likely to grow.
In addition, smaller businesses may be more at risk. Attackers sometimes assume that ransomware incidents involving such organizations attract less attention than attempts on larger, well-known enterprises—making it easier for cybercriminals to evade law enforcement and more likely that companies will pay ransoms. Read our Cyber Threat Report for more details on the landscape.
The sheer number of attacks that ransomware-as-a-service enables presents a significant burden for MSPs, who may have trouble deploying sufficient resources to monitor and defend multiple systems from attacks. In addition, the proliferation of so many types of ransomware makes it challenging to effectively protect networks and systems.
As a result, your organization will be under even more pressure to implement risk assessment tools, train employees to recognize phishing and other scam attempts, protect and back up critical data, and have strategies in place to address, mitigate, and recover from ransomware attacks quickly.
RaaS providers come on the scene, evolve, and change all the time, so as an MSP, you need to stay abreast of the major groups and tactics. These are a few of the main ransomware-as-a-service examples and criminal groups:
Protecting your clients from ransomware-as-a-service attacks requires a multifaceted strategy that combines awareness, end-user security, cybersecurity tools, and planning. A good starting point is the NIST Framework. By tying concepts of ransomware-as-a-service defenses to this structure, you can create a more holistic approach. Here’s an example of how these tie together.
Cybersecurity software can alert you to any suspicious or unusual activity across the network. Track all devices with network access and ensure employees are following security protocols when working remotely. In addition, managed detection and response systems help you know when a breach happens as soon as possible so you can react.
Acting quickly in the face of a ransomware-as-a-service attack is critical, as the malware can spread quickly. Here are four steps you should take immediately following a RaaS attack:
With threats like ransomware-as-a-service being an active danger to your clients, providing that additional layer of security is critical. ConnectWise offers a suite of cybersecurity management software for MSPs looking to protect their clients’ critical business assets, from Endpoint Detection and Monitoring (EDR) to SIEM.
See our software in action by requesting a Cybersecurity suite demo today.
The Computer Fraud and Abuse Act (CFAA) states that it is a crime to access any computer or computer network without authorization, which includes ransomware-as-a-service (RaaS). Because the damage and costs associated with RaaS crime can be so severe, some businesses choose to pay up.
However, federal law enforcement agencies warn against this for several reasons. There is no guarantee that criminals will restore the data, and they may even attack victims a second time. In addition, paying may serve to encourage the perpetrators to attack other victims and attract additional criminals to the RaaS model.
Plus, paying ransomware-as-a-service attackers could violate federal law. For example, it’s illegal to “carry out business” with an entity on the sanctions list of the U.S. Treasury’s Office of Foreign Assets Control (OFAC), which can include ransomware perpetrators.
The federal government has several agencies and initiatives focused on preventing and addressing ransomware-as-a-service (RaaS) attacks. The website StopRansomware.gov serves as a center for resources, including training modules and webinars, to help organizations and individuals lessen their risk of falling victim to ransomware.
Any business facing a RaaS attack should report to a local FBI field office or file a report with the FBI’s Internet Crime Complaint Center (IC3). Reporting RaaS attempts or attacks can help law enforcement professionals stay up-to-date on tactics and infiltrate criminal groups.