Pay2Key.I2P Resurfaces: Iranian Cyber Crew Offers Cash for US and Israel Attacks

Iran’s ransomware operation is back, targeting the US and Israel with Pay2Key.I2P. Now with an 80% cut for attackers, it’s like a cybercrime loyalty program. Researchers infiltrated the crew by feigning support, uncovering ties to both Pioneer Kitten and Mimic ransomware. It’s a dangerous mix of state-sponsored cyber warfare and global cybercrime.

Pro Dashboard

Hot Take:

Oh, great! Just when we thought it was safe to go back into the cyber waters, the Iranian ransomware crew decides to make a grand re-entrance. If only they had stayed on their five-year vacation, we might have been able to enjoy a little more peace and quiet in the world of cybersecurity. But no, they heard the siren call of the ransomware-as-a-service model and couldn’t resist the allure of cybercrime infamy. Now they’re back, offering cybercriminals a fat paycheck to wreak havoc on the US and Israel. Talk about a hostile comeback tour!

Key Points:

  • Pay2Key.I2P reemerges with Iranian backing and ransomware-as-a-service model.
  • Updated Pay2Key malware now includes Mimic ransomware capabilities.
  • 80% profit cut offered for attacks against US and Israel.
  • Pay2Key.I2P operates on I2P network, a Tor alternative.
  • US Homeland Security warns of heightened threats following airstrikes on Iran.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?