Daily Dark Web
  • Home
  • Cyber Attacks
  • DarkWeb News
  • Data Breaches
  • Vulnerability
  • Ransomware News
  • Unauthorized Accesses
  • Contact
No Result
View All Result
  • Home
  • Cyber Attacks
  • DarkWeb News
  • Data Breaches
  • Vulnerability
  • Ransomware News
  • Unauthorized Accesses
  • Contact
No Result
View All Result
Daily Dark Web
No Result
View All Result
Home DarkWeb News & Services

Rape Ransomware Team Seeks Partners for Enterprise Windows Network Access, Offering 80% Profit Share

May 16, 2024
Reading Time: 1 min read
Rape Ransomware Team Seeks Partners for Enterprise Windows Network Access, Offering 80% Profit Share

Rape Ransomware team has recently issued a call for partners experienced in accessing enterprise Windows networks, offering lucrative commission-based arrangements. According to their announcement, partners stand to gain 80% of the ransom profits for each system they facilitate access to, while the team retains a 20% fee for software development and negotiation services.

However, the team has set strict criteria for potential partners, restricting operations to networks located in specific countries. These countries include Guinea, Hungary, Paraguay, Ivory Coast, Tajikistan, Ethiopia, Serbia, Colombia, Mozambique, Cameroon, Azerbaijan, Saudi Arabia, Yemen, Algeria, Belarus, Jordan, Bhutan, Syria, Zimbabwe, Tanzania, Haiti, Iran, Indonesia, Mexico, Namibia, Bolivia, Malaysia, Central African Republic, Comoros, Bangladesh, Kazakhstan, Nigeria, Laos, Eswatini, Nepal, Sri Lanka, Morocco, Argentina, Kyrgyzstan, Vietnam, DR Congo, Botswana, China, Russia, Belize, Niger, Tunisia, Somalia, Egypt, India, Brazil, Papua New Guinea, Lebanon, Kuwait, Angola, Oman, Honduras, Malawi, Gambia, Brunei, Benin, Senegal, Ukraine, Ecuador, Republic of the Congo, Gabon, Bahrain, Suriname, Qatar, Turkey, Kenya, Mauritania, Nicaragua, Togo, Libya, Uganda, Cambodia, Pakistan, Lesotho, South Africa, Guyana, Ghana, Bosnia and Herzegovina, Burkina Faso, Sierra Leone, Burundi, Fiji, Liberia, Madagascar, Sudan, Iraq, Zambia, Rwanda, United Arab Emirates, Chad, Thailand, Philippines, Myanmar, Djibouti, Guatemala, Venezuela, El Salvador, and Mali.

The team has also made it clear that they do not work with healthcare or non-profit organizations. The ransomware is versatile, capable of operating on Windows, Linux (x86/x64/ARM), and ESXi platforms, showcasing the team’s technical proficiency and broad target range. This call for partners signifies a strategic move to expand their reach and maximize profits through a collaborative cybercriminal effort.

Tags: cybercrimedarkwebpartnershipransomwareRape Ransomwarerapelord
ShareTweet

Related Posts

Marks & Spencer Faces Estimated £300 Million Profit Hit Following Cyberattack
Ransomware News

Marks & Spencer Faces £300 Million Profit Hit Following Ransomware Attack

May 21, 2025
Real Estate Giant Landmark Properties Allegedly Hit by Morpheus Ransomware
Ransomware News

Real Estate Giant Landmark Properties Allegedly Hit by Morpheus Ransomware

May 20, 2025
Allegations Emerge of a Massive 1.2B Facebook Data Leak on the Dark Web
DarkWeb News & Services

Allegations Emerge of a Massive 1.2B Facebook Data Leak on the Dark Web

May 20, 2025
Alleged Breach Exposes Data of 88 Million Indian Car Owners
DarkWeb News & Services

Alleged Breach Exposes Data of 88 Million Indian Car Owners

May 15, 2025
Alleged Data Exposure Hits Indonesian Supreme Court
DarkWeb News & Services

Alleged Data Exposure Hits Indonesian Supreme Court

May 15, 2025
China Census Database Allegedly Leaked with 92 Million Records
DarkWeb News & Services

China Census Database Allegedly Leaked with 92 Million Records

May 14, 2025
Next Post
Arcus Media Group Announces Two New Victims: The Egyptian-Sudanese Company and Rio Technology

Arcus Media Group Announces Two New Victims: The Egyptian-Sudanese Company and Rio Technology

KillSec Allegedly Breaches Agrani Bank, Demands €5000 Ransom

KillSec Allegedly Breaches Agrani Bank, Demands €5000 Ransom

Recommended Stories

Data Breach Group UndergroundDataLeaks Increases Data Breach Operations

Data Breach Group UndergroundDataLeaks Increases Data Breach Operations

May 2, 2024
Threat Actor Claims Database Leak of St Jude Laboratories, Exposing Patient Data

Threat Actor Claims Database Leak of St Jude Laboratories, Exposing Patient Data

March 29, 2024
Alleged Data Breach at Moneytor.in Exposes 1.4 Million Records

Alleged Data Breach at Moneytor.in Exposes 1.4 Million Records

December 21, 2024

Popular Stories

  • Threat Actor Claims Sale of Dell Database Containing 49 Million Customer Records

    Threat Actor Claims Sale of Dell Database Containing 49 Million Customer Records

    0 shares
    Share 0 Tweet 0
  • Threat Actor Claims to Have Leaked Database Containing Personal Information of 5 Million Salvadoran Citizens

    0 shares
    Share 0 Tweet 0
  • Threat Actor Claims Sale of State Grid Corporation of China (SGCC) Data, World’s Largest Utility Company

    0 shares
    Share 0 Tweet 0
  • New ATM Malware Threatens European Banking Security

    0 shares
    Share 0 Tweet 0
  • CyberNiggers Group Allegedly Breaches HSBC and Barclays Banks, Compromising Extensive Databases and Source Code

    0 shares
    Share 0 Tweet 0
Daily Dark Web

Daily Dark Web© 2024

No Result
View All Result
  • Contact
  • Home
  • Newsletter
  • Privacy Policy

Daily Dark Web© 2024

Are you sure want to unlock this post?
Unlock left : 0
Are you sure want to cancel subscription?