INC ransomware source code reportedly on sale for $300,000

INC ransomware source code reportedly on sale for $300,000

The source code of the notorious INC Ransom, a ransomware-as-a-service (RaaS) operation, has surfaced on hacking forums for $300,000, the tech news site BleepingComputer reported.

INC Ransom, launched in August 2023, previously targeted high-profile entities including the US division of Xerox Business Solutions (XBS), Yamaha Motor Philippines, and Scotland's National Health Service (NHS).

The ransomware source code was put up for sale on the Exploit and XSS hacking forums by an individual who goes online as “salfetka.” The announcement of the sale includes both the Windows and Linux/ESXi versions of INC.

Security researchers at threat intelligence firm KELA have confirmed the authenticity of the sale, noting that technical details provided by “salfetka” align with public analysis of INC Ransom samples. “Salfetka” has been an active presence on hacking forums since March 2024, previously engaging in activities such as seeking to purchase network access and offering cuts from ransomware attack proceeds to initial access brokers.

The legitimacy of the sale is further bolstered by "salfetka" including URLs of both the old and new INC Ransom page URLs on their signature, indicating they are affiliated with the ransomware operation. However, it’s possible that the sale could be an elaborate scam orchestrated by the threat actor, BleepingComputer notes.

Additionally, the INC Ransom operation appears to be undergoing significant changes. On May 1, 2024, INC Ransom announced its transition to a new data leak extortion blog, with a new TOR address. The old leak site is slated for closure within the next two to three months. Interestingly, the design of the new extortion page bears similarity to that of Hunters International, hinting at a potential connection between the two RaaS operations.


Back to the list

Latest Posts

UNC6148 threat actor actively targets outdated and patched SonicWall devices

UNC6148 threat actor actively targets outdated and patched SonicWall devices

The group is using stolen credentials and OTP seeds to regain access to devices even after security updates have been applied.
17 July 2025
Google patches Chrome zero-day allowing sandbox escape

Google patches Chrome zero-day allowing sandbox escape

The flaw stems from insufficient validation of untrusted input in ANGLE and GPU.
16 July 2025
Ukrainian police dismantle major server network used for malware distribution

Ukrainian police dismantle major server network used for malware distribution

Authorities identified a 33-year-old French national as the organizer of the illegal operation.
16 July 2025