EXPLAINER | SECURITY CONCEPTS
Active Threat9 min read

What is Ransomware as a Service (RaaS)? How the Criminal Model Works

$1.1B
Ransomware payments to attackers in 2023 (record high)
4,000+
Organizations publicly claimed as ransomware victims in 2024
80%
Of ransomware attacks trace to RaaS affiliate operators
22 days
Average ransomware dwell time before encryption in 2024

Ransomware as a Service (RaaS) is a criminal business model that separates ransomware development from ransomware deployment, enabling people with little to no technical skill to conduct sophisticated ransomware attacks. A RaaS developer builds and maintains the malware, the encryption infrastructure, the victim negotiation portal, and the data leak site. Affiliates, paying customers who rent access to this infrastructure, conduct the actual intrusions and deploy the ransomware. Revenue is split, typically 70-80% to the affiliate and 20-30% to the RaaS developer.

This model industrialized ransomware. Before RaaS, ransomware attacks required coding skill and infrastructure knowledge. With RaaS, anyone who can conduct an initial access intrusion can launch enterprise ransomware attacks. The result has been an explosion in attack volume, target breadth, and ransom demands.

Free daily briefing

Briefings like this, every morning before 9am.

Threat intel, active CVEs, and campaign alerts — distilled for practitioners. 50,000+ subscribers. No noise.

How the RaaS Criminal Model Works

RaaS operations function as professional criminal businesses. Developers maintain the core technology: the ransomware binary, the key management infrastructure (so encryption keys are server-side and cannot be recovered without paying), the victim negotiation portal (a Tor hidden service where victims communicate with attackers), and the data leak site (where stolen data is published if victims refuse to pay).

Affiliates are recruited through darknet forums. They pay either a subscription fee or receive the ransomware for free in exchange for a revenue-share percentage. To maintain quality and avoid attention, some RaaS groups screen affiliates: requiring demonstrated intrusion capability, ruling out attacks on healthcare or critical infrastructure (to reduce law enforcement pressure), and prohibiting attacks in certain geographies (typically Russia and neighboring countries where the developers are based).

When an affiliate successfully deploys the ransomware, the developer's key management server generates the decryption key and holds it until a ransom is paid. Victims who pay receive a decryptor. Victims who do not pay within a deadline have their stolen data published. This double extortion model (ransomware plus data theft) emerged around 2019 and is now the standard for sophisticated groups.

The RaaS Attack Chain

RaaS attacks follow a consistent playbook that has been documented across hundreds of incident response cases.

Initial access is obtained via phishing emails targeting credentials or delivering loaders, exploitation of internet-facing vulnerabilities (VPN appliances, remote desktop services, and unpatched web applications are consistently targeted), or purchasing access credentials from initial access brokers who specialize in selling footholds to other criminals.

Post-compromise, the affiliate conducts network reconnaissance, escalates privileges (commonly via Kerberoasting, credential dumping from LSASS, or exploiting misconfigured AD delegation), and achieves domain admin rights. This phase typically takes days to weeks in dwell time before encryption begins.

Data exfiltration precedes encryption. Affiliates stage and exfiltrate valuable data to cloud storage (Mega, AWS S3) before deploying the ransomware, ensuring the double extortion threat is credible.

Deployment of the ransomware encryptor is the final stage. Sophisticated operators use legitimate remote management tools (PsExec, Group Policy, Windows Admin Shares) to deploy the encryptor simultaneously to all reachable systems, maximizing damage before defenders can respond.

Key RaaS Groups Operating Today

LockBit was the most prolific RaaS operation from 2022 through early 2024, claiming more than 2,000 victims before law enforcement disruption in February 2024. The group continued operating post-takedown under LockBit 3.0.

Cl0p (TA505) distinguished itself through mass exploitation of zero-day vulnerabilities in managed file transfer products: MOVEit (2023), GoAnywhere (2023), and Accellion FTA (2021). Rather than deploying encryptors, Cl0p typically focused exclusively on data theft and extortion, targeting hundreds of organizations simultaneously from a single vulnerability campaign.

ALPHV/BlackCat operated a technically advanced Rust-based ransomware with cross-platform (Windows, Linux, VMware ESXi) capability. The group was disrupted by the FBI in December 2023 but reformed under various successor identities.

Dark Angels and Hunters International are among the active groups as of 2025. The RaaS ecosystem is fluid: groups are disrupted by law enforcement, rebrand, or have their source code leaked and reused by competitors. Tracking specific group attribution matters less than understanding the consistent TTPs the model produces.

Defenses That Actually Reduce RaaS Risk

Given the RaaS attack chain, the most effective defenses address the consistent entry points and dwell-time activities across groups.

For initial access: phishing-resistant MFA on all remote access and email accounts eliminates credential phishing as an entry vector. Timely patching of internet-facing systems (VPN appliances, web applications, remote desktop) reduces exploitation exposure. External attack surface monitoring identifies exposed services before attackers do.

For lateral movement and privilege escalation: tiered Active Directory administration (no accounts with both domain admin rights and email access), Kerberoasting detection in your SIEM, and LSASS protection via Credential Guard significantly raise the difficulty of achieving domain admin.

For dwell time detection: EDR behavioral detection for the tools affiliates consistently use (Cobalt Strike, AnyDesk, Rclone for exfiltration, Volume Shadow Copy deletion) surfaces intrusions during the reconnaissance phase rather than at encryption. Network monitoring for anomalous data egress detects exfiltration before ransom demands arrive.

For impact limitation: offline, air-gapped backups tested for restoration are the only reliable recovery option when encryption succeeds. Network segmentation limits the blast radius of a successful deployment.

The bottom line

RaaS succeeded by lowering the technical barrier for ransomware attacks while professionalizing the criminal support infrastructure. The consistent attack chain it produces (initial access via phishing or vulnerability exploitation, domain compromise, data exfiltration, then encryption) means defenders can prioritize specific controls that address each stage rather than trying to prevent every possible attack. Phishing-resistant MFA, timely patching, EDR behavioral detection, and offline backups are the controls with the highest consistent impact against the RaaS model.

Frequently asked questions

Should companies pay ransomware demands?

The FBI and CISA recommend against paying ransoms, as payment funds criminal operations and does not guarantee data recovery or the non-publication of stolen data. Practically, the decision depends on whether viable backups exist, the business impact of downtime, and whether the stolen data creates regulatory or liability exposure. Organizations should make this decision with legal counsel before an incident, not under pressure during one. Paying does not remove extortion risk: some groups re-extort victims months after initial payment.

What is double extortion in ransomware?

Double extortion is the RaaS tactic of combining file encryption with data theft. Attackers steal sensitive data before deploying the encryptor, then threaten to publish it on a public leak site if the ransom is not paid. This creates extortion pressure even for organizations with working backups, since restoring from backup does not prevent the publication of stolen customer data, intellectual property, or regulated information.

Can ransomware be decrypted without paying?

Occasionally. Law enforcement operations have seized RaaS infrastructure and published decryption keys for victims. The No More Ransom project (nomoreransom.org) maintains a repository of free decryptors for specific ransomware families. However, for active, sophisticated RaaS groups, decryption without the attacker-controlled key is not currently feasible. Organizations that restore from backup rather than paying are not 'decrypting' encrypted files; they are replacing them with unencrypted copies from before the attack.

What is the difference between ransomware and RaaS?

Ransomware is the malware category: software that encrypts victim files and demands payment for the decryption key. Ransomware as a Service is the distribution and business model: a criminal marketplace where ransomware developers license their tools to affiliate operators who conduct the actual attacks. Not all ransomware is deployed via RaaS (some groups use their own tools exclusively), but the majority of enterprise ransomware incidents today trace to RaaS affiliate operators.

Sources & references

  1. CISA Ransomware Guide
  2. FBI IC3 Internet Crime Report 2024

Free resources

25
Free download

Critical CVE Reference Card 2025–2026

25 actively exploited vulnerabilities with CVSS scores, exploit status, and patch availability. Print it, pin it, share it with your SOC team.

No spam. Unsubscribe anytime.

Free download

Ransomware Incident Response Playbook

Step-by-step 24-hour IR checklist covering detection, containment, eradication, and recovery. Built for SOC teams, IR leads, and CISOs.

No spam. Unsubscribe anytime.

Free newsletter

Get threat intel before your inbox does.

50,000+ security professionals read Decryption Digest for early warnings on zero-days, ransomware, and nation-state campaigns. Free, weekly, no spam.

Unsubscribe anytime. We never sell your data.

Eric Bang
Author

Founder & Cybersecurity Evangelist, Decryption Digest

Cybersecurity professional with expertise in threat intelligence, vulnerability research, and enterprise security. Covers zero-days, ransomware, and nation-state operations for 50,000+ security professionals weekly.

Daily Briefing

Get briefings like this every morning

Actionable threat intelligence for working practitioners. Free. No spam. Trusted by 50,000+ SOC analysts, CISOs, and security engineers.

Unsubscribe anytime.

Get tomorrow's threat briefing before your inbox does.