Pay2Key.I2P Resurfaces: Iranian Cyber Crew Offers Cash for US and Israel Attacks
Iran’s ransomware operation is back, targeting the US and Israel with Pay2Key.I2P. Now with an 80% cut for attackers, it’s like a cybercrime loyalty program. Researchers infiltrated the crew by feigning support, uncovering ties to both Pioneer Kitten and Mimic ransomware. It’s a dangerous mix of state-sponsored cyber warfare and global cybercrime.

Hot Take:
Oh, great! Just when we thought it was safe to go back into the cyber waters, the Iranian ransomware crew decides to make a grand re-entrance. If only they had stayed on their five-year vacation, we might have been able to enjoy a little more peace and quiet in the world of cybersecurity. But no, they heard the siren call of the ransomware-as-a-service model and couldn’t resist the allure of cybercrime infamy. Now they’re back, offering cybercriminals a fat paycheck to wreak havoc on the US and Israel. Talk about a hostile comeback tour!
Key Points:
- Pay2Key.I2P reemerges with Iranian backing and ransomware-as-a-service model.
- Updated Pay2Key malware now includes Mimic ransomware capabilities.
- 80% profit cut offered for attacks against US and Israel.
- Pay2Key.I2P operates on I2P network, a Tor alternative.
- US Homeland Security warns of heightened threats following airstrikes on Iran.