Stormous has unveiled the third version of their ransomware program, introducing a host of new features and enhancements aimed at providing a superior user experience and increased efficiency in managing victims.
Enhanced Features and Capabilities
The latest version of the ransomware program, developed using GOLang, claims to offer fully effective and speedy encryption, ensuring all files are quickly and thoroughly encrypted. The program is designed to be lightweight, with a unique executable file for each subscriber, and they claimed compatible with both x86 and x64 Windows platforms.
Key Features:
- Full and Fast Encryption: Encrypt all files effectively and swiftly.
- Task Manager Disabling: Prevent victims from stopping the malware by disabling the Task Manager.
- UAC Bypass: Enable bypassing of User Account Control (UAC).
- Custom Ransom Note: Design and customize the ransom note to suit individual needs.
C2 Dashboard (RaaS) Features:
- IP Tracking: Monitor the victim’s IP address.
- Infected Device Tracking: Track the status of the infected device.
- Encryption File Tracking: Log and track encrypted files in real-time.
- Device Control and Data Sending: Send data uploads to a private server.
- Link to Private Blog: Direct victims to a blog via the C2 dashboard that provides updated information on victims, including companies and high-profile targets.
Additional Features:
- Offline Encryption Not Supported: Ensures the program operates only when connected to the internet.
- Comprehensive Technical Support: Full user support through a dedicated team.
- Undetectable: Strong protection against detection by security programs.
- Optional File Types for Encryption: Users can choose specific file types to encrypt.
- User-Friendly Dashboard: An easy-to-understand control panel for seamless operation.
- Secure Communication: Effective and secure communication channels with victims.
- Full Operator Support: Complete support from the operator team for users.
The ransomware program is priced at $1500, providing lifetime access to the C2 dashboard via the Tor network.
You can contact us for Indicator of Compromise (IOCs)