
What is ransomware-as-a-service and how is it evolving?
Ransomware attacks are becoming more frequent and costlierâbreaches caused by ransomware grew 41 percent in the last year, the average cost of a destructive attack rising to $5.12 milllion. Whatâs more, a good chunk of the cyber criminals doing these attacks operate on a ransomware-as-a-service (RaaS) model.
RaaS is not much different, in theory, from the software-as-a-service (SaaS) business model, where cloud providers ârent outâ their technology to you on a subscription basisâjust swap out âcloud providersâ with âransomware gangsâ and âtechnologyâ with ransomware (and the related crimes involved).Â
In this post, weâll talk more about how RaaS works, why it poses a unique threat to businesses, and how small-and-medium-sized (SMBs) businesses can prepare for the next generation of RaaS attacks.
How does ransomware-as-a-service work?
How ransomware-as-a-service changed the game
Why ransomware-as-a-service attacks are so dangerous
Is ransomware here to stay? The evolution of RaaS attacks
How SMBs can protect themselves against next-gen RaaS
The perfect one-two combo for fighting RaaS
How does ransomware-as-a-service work?
Donât get it twisted: RaaS gangs arenât your run-of-the-mill hackers looking to score a few hundred bucks. Weâre talking big, sophisticated businesses with up to a hundred employeesâLockBit, BlackBasta, and AvosLocker are just a few of the RaaS gangs we cover in our monthly ransomware review.
âThis is run as a business,â says Mark Stockley, Security Evangelist at Malwarebytes. âYou’ve got developers, you’ve got managers, you’ve got maybe a couple of levels of people doing the negotiations, things like that. And these gangs have made hundreds of millions of dollars each year in the last few years.â
RaaS gangs like LockBit make money by selling âRaaS kitsâ and other services to groups called affiliates who actually launch the ransomware attacks. In other words, affiliates donât need crazy technical skills or knowledge to carry out attacks. By working closely with âInitial Access Brokersâ (IABs), some RaaS gangs can even offer affiliates direct access into a company’s network.
How ransomware-as-a-service changed the game
Letâs jump back to the year 2015. These were the “good olâ days” where ransomware attacks were automated and carried out on a much smaller scale.Â
Hereâs how it went: somebody would send you an email with an attachment, you double-clicked on it, and ransomware ran on your machine. Youâd be locked out of your machine and would have to pay about $300 in Bitcoin to get it unlocked. Attackers would send out loads of these emails, lots of people would get encrypted, and lots of people would pay them a few hundred bucks. That was the business model in a nutshell.Â
But then ransomware gangs sniffed out a golden opportunity.Â
Rather than attacking individual endpoints for chump change, they realized they could target organizations for big money. Gangs switched from automated campaigns to human-operated ones, where the attack is controlled by an operator. In human-operated attacks, attackers try hard to wedge themselves into a network so that they can move laterally throughout an organization.Â
At the forefront of this evolution from automated ransomware to human-operated ransomware attacks are ransomware-as-a-service gangsâand their new business model seems to be paying off: in 2021, ransomware gangs made at least $350 million in ransom payments.
Why ransomware-as-a-service attacks are so dangerous
The fact that RaaS attacks are human-operated means that ransomware attacks are more targeted than they used to beâand targeted attacks are far more dangerous than un-targeted ones.Â
In targeted attacks, attackers spend more time, resources, and effort to infiltrate a businesses network and steal information. Such attacks often take advantage of well-known security weaknesses to gain access, with attackers spending days to even months burrowing themselves in your network.Â
The human-operated element of RaaS attacks also means that RaaS affiliates can control precisely when to launch an attackâincluding during times where organizations are more vulnerable, such as on holidays or weekends.
âFamously, RaaS affiliates love long weekends,â Stockley said. âThey want to run the ransomware when you’re not going to notice to give themselves however much time they need in order for the encryption to complete. So they like to do it at nighttime, they love to do it during holidays.â
âYouâre dealing with a person,â Stockley continued. âIt’s not about software running trying to figure everything out; itâs a person trying to figure everything out. And they’re trying to figure out what’s the best way to attack you.â
Is ransomware here to stay? The evolution of RaaS attacks
One of the biggest innovations in the RaaS space in recent years has been the use of double extortion schemes, where attackers steal data before encryption and threaten to leak it if the ransom isnât paid.Â
Companies have gotten more aware of ransomware and better prepared in terms of things like backups, for example. But if affiliates have already broken into your environment, they can simply use stolen data as extra leverage, leaking bits of it to get your attention, to speed up negotiations, or prove what kind of access they have.  Â
All of the RaaS gangs these days do double extortion, leaking data on dedicated leak websites on the dark web. Many RaaS programs even feature a suite of extortion support offerings, including leak site hosting. Not only is this trend growing, but thereâs chatter about whether or not stand-alone data leaking is the next stage in evolution for RaaS.Â
âThere are now gangs that only do data leaking, and they don’t bother doing the encryption at all,â Stockley said. âBecause it’s sufficiently successful. And you don’t have to worry about software, you don’t have to worry about software being detected, you donât have to worry about it running.â

In other words, the evolution from âransomware-focusedâ RaaS to âleaking-focusedâ RaaS means that businesses need to rethink the nature of the problem: Itâs not about ransomware per se, itâs about an intruder on your network. The really dangerous thing is turning out to be the access, not the ransomware software itself.Â
How SMBs can protect themselves against next-gen RaaS
Preparing for RaaS attacks isnât any different from preparing for ransomware attacks in general, and advice isnât going to vary all that much across different sized businesses or industries. Because next-gen RaaS is so focused on intrusion, however, SMBs have their own unique challenges in combating it.Â
Monitoring a network 24/7 for signs of a RaaS intrusion is tough work, period, let alone for organizations with shoe-string budgets and barely any security staff. Consider the fact that, when a threat actor breaches a target network, they donât attack right away. The median number of days between system compromise and detection is 21 days.
By that time, itâs often too late. Data has been harvested or ransomware has been deployed. In fact, 23 percent of intrusions lead to ransomware, 29 percent to data theft, and 30 percent to exploit activityâwhen adversaries use vulnerabilities to initiate further intrusions.
Even with tools such as EDR, SIEM, and XDR, sifting through alerts and recognizing Indicators of Compromise (IOCs) is the work of seasoned cyber threat huntersâtalent that SMBs just canât afford. Thatâs why investing in Managed Detection and Response (MDR) is hugely beneficial for SMBs looking to get a leg-up against RaaS attacks.Â
âObviously, the most cost effective thing is to not let people in in the first place. And this is why things like patching, two-factor authentication, and multi-vector Endpoint Protection (EP) are so important,â Stockley said. âBut at the point where they’ve broken in, then you want to detect them before they do anything bad. Thatâs where MDR comes in.â
The perfect one-two combo for fighting RaaSÂ
Human-operated, targeted, and easy to execute, RaaS attacks are a dangerous evolution in the history of ransomware.Â
Double-extortion tactics, where attackers threaten to leak stolen data to the dark web, are another important evolutionary stage of RaaS campaigns todayâto the point where ransomware itself might become obsolete in the future. As a result, SMBs should focus their anti-RaaS efforts on intruder detection with MDR, in addition to implementing ransomware prevention and resilience best practices.
Have a burning question or want to learn more about our cyberprotection? Get a free business trial below.
More resources
Get the eBook: Is MDR right for my business?
Top 5 ransomware detection techniques: Pros and cons of each
Cyber threat hunting for SMBs: How MDR can help
A threat hunter talks about what heâs learned in his 16+ year cybersecurity career