Close Menu
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    • Blogging
    • SEO & Digital Marketing
    • WiFi / Internet & Networking
    • Cybersecurity
    • Tech Tools & Mobile / Apps
    • Privacy & Online Earning
    Facebook X (Twitter) Instagram
    Wifi PortalWifi Portal
    Home»Cybersecurity»Iran Deploys ‘Pseudo-Ransomware,’ Revives Pay2Key Operations
    Cybersecurity

    Iran Deploys ‘Pseudo-Ransomware,’ Revives Pay2Key Operations

    adminBy adminApril 1, 2026No Comments4 Mins Read
    Facebook Twitter LinkedIn Telegram Pinterest Tumblr Reddit WhatsApp Email
    Iran Deploys 'Pseudo-Ransomware,' Revives Pay2Key Operations
    Share
    Facebook Twitter LinkedIn Pinterest Email

    Iran is recruiting Russian cybercriminals and engaging in other creative partnerships that blur the lines between state and criminal cyber activities to advance its geopolitical objectives in its ongoing war with the US and Israel. 

    As part of these activities, Iran has once again revived Pay2Key, an Iranian state-backed ransomware operation, by recruiting affiliates from Russian cybercriminal forums, according to a report from KELA’s Cyber Intelligence Center published this week. Iran is using Pay2Key “as a punitive arm of the Iranian state,” to attack “high-impact US targets,” according to the report.

    This strategy includes deploying “pseudo-ransomware” attacks and acting as an initial access broker (IAB) for ransomware groups to target US entities for cyber disruption and financial gain. KELA researchers explained that pseudo ransomware attacks use encryption but are actually destructive activities typical of wiper malware.

    Related:China Upgrades the Backdoor It Uses to Spy on Telcos Globally

    These recent moves are part of a larger strategy by Iran to weaponize cybercrime techniques and recruit criminal hackers to gain an advantage in the current war that began with the joint US-Israel attack on Iran on Feb. 28, according to KELA. These activities — and how they blur the lines between state and criminal activity — pose a unique threat to organizations by not only causing business disruption, but also by causing an “attribution nightmare” that poses a significant legal and operational risk, according to KELA.

    “If a company falls victim to a successful ransomware or extortion event, identifying the true threat actor is no longer just an IT problem — it is a critical compliance issue,” according to the report. Indeed, victims risk sanctions violations and severe legal and financial penalties if ransom payments inadvertently go to state-linked entities, such as those under sanctions by the US Treasury’s Office of Foreign Assets Control (OFAC).

    Old and New Cyberwarfare Strategies

    The resurgence in Pay2Key activity is similar to what happened last July in the wake of the June’s 12-day conflict against Iran last year, in which the US and Israel targeted and destroyed Iran nuclear facilities. At that time, Pay2Key re-emerged to target Western organizations and offer higher payouts for attacks that meet Iran’s geopolitical goals.

    Iran is engaged in similar profit-sharing now with Pay2Key affiliates that they recruit online, increasing the affiliate’s cut from 70% to 80% if they successfully execute attacks against designated “enemies” of Iran — that is, the US and Israel. 

    Related:Infrastructure Attacks With Physical Consequences Down 25%

    “This bounty system perfectly illustrates the hybrid threat: Iran is effectively outsourcing geopolitical retribution to the global cybercrime talent pool, creating a powerful, scalable force multiplier for its state operations,” the KELA report stated.

    At the same time, Iran has a new cyber trick in the form of destructive smokescreens that leverage ransomware-style encryption to disguise data destruction, sabotage, or political retribution. In these attacks, the Iran-backed APT Agrius is using the Apostle malware, which has been retrofitted from its original data wiper form to function as a ransomware variant.

    “Wrapping destructive wipers in the guise of financial extortion allows actors to obscure their geopolitical motives and complicate incident response,” according to KELA.

    Blurred Offensive Lines Demand New Defense

    KELA researchers said the ongoing conflict has “fundamentally shifted the threat landscape” and led to Iran’s deliberate blurring of lines between state-sponsored cyber warfare and opportunistic cybercrime. Indeed, Iran has stepped up its cyber offensive considerably since the war began, an arena where it has more of an advantage over its adversaries than the physical battle space.

    “The same state apparatus that sponsors purely destructive or hacktivist campaigns is deeply intertwined with the cybercriminal underground,” according to the report.

    Related:SANS: Top 5 Most Dangerous New Attack Techniques to Watch

    This paradigm shift also signals a change for defenders, which now must account for financial, operational, and geopolitical risk simultaneously by implementing foundational resilience measures alongside proactive controls, KELA said in the report.

    Recommended defensive actions including some common measures such as patching and monitoring edge devices, implementing phishing-resistant MFA, and maintaining offline backups and incident response readiness.

    Organizations also should segment IT and operational technology (OT) systems as well as harden access controls to defend against an increasing complex threat from Iranian-backed actors. Maintaining threat-intelligence monitoring also can significantly improve an organization’s visibility into adversary infrastructure and compromised credential markets, according to KELA.

    Deploys Iran Operations Pay2Key PseudoRansomware Revives
    Share. Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email
    Previous ArticleGoogle Gemini may adapt AI answers to match user tone: Report
    Next Article Stan. (Android TV) 5.19.1 APK Download by Stan Entertainment Pty Ltd
    admin
    • Website

    Related Posts

    Vercel Breach Tied to Context AI Hack Exposes Limited Customer Credentials

    April 20, 2026

    Apple account change alerts abused to send phishing emails

    April 19, 2026

    Social media bans might steer kids into riskier corners of the internet

    April 19, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Search Blog
    About
    About

    At WifiPortal.tech, we share simple, easy-to-follow guides on cybersecurity, online privacy, and digital opportunities. Our goal is to help everyday users browse safely, protect personal data, and explore smart ways to earn online. Whether you’re new to the digital world or looking to strengthen your online knowledge, our content is here to keep you informed and secure.

    Trending Blogs

    CachyOS just shipped Linux 7.0, and it has some extra performance tweaks added to the mix

    April 20, 2026

    Vercel Breach Tied to Context AI Hack Exposes Limited Customer Credentials

    April 20, 2026

    Galaxy S26 Ultra vs Galaxy S23 Ultra – Is it FINALLY time to upgrade? [Video]

    April 20, 2026

    That screenless Google band on Stephen Curry’s wrist may finally have a name

    April 20, 2026
    Categories
    • Blogging (65)
    • Cybersecurity (1,404)
    • Privacy & Online Earning (172)
    • SEO & Digital Marketing (850)
    • Tech Tools & Mobile / Apps (1,690)
    • WiFi / Internet & Networking (232)

    Subscribe to Updates

    Stay updated with the latest tips on cybersecurity, online privacy, and digital opportunities straight to your inbox.

    WifiPortal.tech is a blogging platform focused on cybersecurity, online privacy, and digital opportunities. We share easy-to-follow guides, tips, and resources to help you stay safe online and explore new ways of working in the digital world.

    Our Picks

    CachyOS just shipped Linux 7.0, and it has some extra performance tweaks added to the mix

    April 20, 2026

    Vercel Breach Tied to Context AI Hack Exposes Limited Customer Credentials

    April 20, 2026

    Galaxy S26 Ultra vs Galaxy S23 Ultra – Is it FINALLY time to upgrade? [Video]

    April 20, 2026
    Most Popular
    • CachyOS just shipped Linux 7.0, and it has some extra performance tweaks added to the mix
    • Vercel Breach Tied to Context AI Hack Exposes Limited Customer Credentials
    • Galaxy S26 Ultra vs Galaxy S23 Ultra – Is it FINALLY time to upgrade? [Video]
    • That screenless Google band on Stephen Curry’s wrist may finally have a name
    • Starbucks’ New ChatGPT Integration Is a Potential Privacy Nightmare
    • I replaced my entire streaming setup with a $30 device and free apps
    • Blood Strike – FPS for all 1.003.650015 APK Download by NetEase Games
    • The Ray-Ban Meta (Gen 1) smart glasses just scored a rare 25% discount at Amazon
    © 2026 WifiPortal.tech. Designed by WifiPortal.tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms and Conditions
    • Disclaimer

    Type above and press Enter to search. Press Esc to cancel.