{"id":43417,"date":"2021-10-15T00:00:00","date_gmt":"2021-10-15T00:00:00","guid":{"rendered":"https:\/\/www.trendmicro.com\/en_us\/research\/21\/j\/ransomware-operators-found-using-new-franchise-business-model.html"},"modified":"2021-10-15T00:00:00","modified_gmt":"2021-10-15T00:00:00","slug":"ransomware-operators-found-using-new-franchise-business-model-sr-threat-researcher","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/ransomware-operators-found-using-new-franchise-business-model-sr-threat-researcher\/","title":{"rendered":"Ransomware Operators Found Using New &#8220;Franchise&#8221; Business Model Sr. Threat Researcher"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/j\/ransomware-operators-found-using-new-franchise-business-model\/Mount%20Locker%20banner.jpg\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/research\/21\/j\/ransomware-operators-found-using-new-franchise-business-model\/Mount%20Locker%20banner.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p><span class=\"body-subhead-title\">Shared infrastructure&nbsp;<\/span><\/p>\n<p>To date, we have found fifteen onion addresses used by at least four different servers, and three others still unknown.<\/p>\n<table cellpadding=\"1\" cellspacing=\"0\" border=\"1\" width=\"100\" height=\"100\">\n<tbody readability=\"13\">\n<tr>\n<td width=\"100\" height=\"100\" valign=\"middle\"><b>Onion Address<\/b><\/td>\n<td><b>Server<\/b><\/td>\n<\/tr>\n<tr readability=\"2\">\n<td>w6ilafwwrgtrmilorzqex6pgpvfsa667fydca2wpoluj6sajka225byd[.]onion<\/td>\n<td>A<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td>accdknc4nmu4t5hclb6q6kjm2u7u5xdzjnewut2up2rlcfqe5lootlqd[.]onion<\/td>\n<td>A<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td>c6zkofycoumltpmm6zpyfadkuddpmlqk6vyd3orrfjgtq3vrgyifl6yd[.]onion<\/td>\n<td>A<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td>3klsbd4dwj3yqgo4xpogfgwqkljbnbdxjryeqks2cjion5jj33wvkqyd.onion<\/td>\n<td>B<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td>yk7erwdvj4vxcgiq3gmcufkben4bk4ixddl5j2xvu7gurtdq754jmiad.onion<\/td>\n<td>B<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td>z4cn6lpet4y4r6mdlbpklpcrjdruwb6kiuvxn6gsiuoub23z6prlx6ad.onion<\/td>\n<td>B<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td>ibih5znjxf2cqgo737xmooyvmxhac45wd4rivh6n5hd7fysn42g3fayd.onion<\/td>\n<td>B<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td>ikrah6fb4e6r2raxkyvyoxp22jam5z6ak5ajfnzxutmassoagvr2bhad.onion<\/td>\n<td>B<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td>hceesrsg6f5p4gcph4j6jv6vl4mkmaik735oz4r45lgjfyedsxfoprad.onion<\/td>\n<td>B<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td>qfgh2lpslhjb33z3wsenmqrxcdragelinvcpowlgkbjca6yig5zloeyd.onion<\/td>\n<td>B<\/td>\n<\/tr>\n<tr>\n<td>x4mjvffmytkw3hyu.onion<\/td>\n<td>C<\/td>\n<\/tr>\n<tr>\n<td>tpze4yo74m6qflef.onion<\/td>\n<td>D<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td>evl425tkt4hkwryyplvqu6bn6slfow3fa4xwgvwe5t4zf6gizs3ewuyd.onion<\/td>\n<td>Unknown 1<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td>xingnewj6m4qytljhfwemngm7r7rogrindbq7wrfeepejgxc3bwci7qd.onion<\/td>\n<td>Unknown 2<\/td>\n<\/tr>\n<tr readability=\"2\">\n<td>zckdr5wmbzxphoem77diqb2ome2a54o23jl2msz3kmotjlpdnjhmn6yd.onion<\/td>\n<td>Unknown 3<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Table 1. The onion addresses used by the different servers<\/p>\n<p>And here is how they relate to the group:<\/p>\n<table cellpadding=\"1\" cellspacing=\"0\" border=\"1\" width=\"100\" height=\"100\">\n<tbody>\n<tr>\n<td width=\"100\" height=\"100\" valign=\"middle\"><b>Server<\/b><\/td>\n<td><b>XingLocker<\/b><\/td>\n<td><b>AstroLocker Team<\/b><\/td>\n<\/tr>\n<tr>\n<td>A<\/td>\n<td>x<\/td>\n<td>&nbsp;<\/td>\n<\/tr>\n<tr>\n<td>B<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<\/tr>\n<tr>\n<td>C<\/td>\n<td>x<\/td>\n<td>x<\/td>\n<\/tr>\n<tr>\n<td>D<\/td>\n<td>x<\/td>\n<td>&nbsp;<\/td>\n<\/tr>\n<tr>\n<td>Unknown 1<\/td>\n<td>x<\/td>\n<td>&nbsp;<\/td>\n<\/tr>\n<tr>\n<td>Unknown 2<\/td>\n<td>x<\/td>\n<td>&nbsp;<\/td>\n<\/tr>\n<tr>\n<td>Unknown 3<\/td>\n<td>x<\/td>\n<td>&nbsp;<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Table 2. The different servers in relation to XingLocker and AstroLocker Team<\/p>\n<p>While this is not a sophisticated innovation, it is important to highlight that ransomware groups are looking for <a href=\"https:\/\/www.trendmicro.com\/vinfo\/ph\/security\/news\/cybercrime-and-digital-threats\/ransomware-double-extortion-and-beyond-revil-clop-and-conti\" target=\"_blank\" rel=\"noopener\">new ways<\/a> to run their affiliate programs and RaaS businesses. This form of shared infrastructure and code can make things harder from an investigative point of view. It is not uncommon to find XingLocker samples detected as Mount Locker, or identify two different onion addresses pointing to the same onion service but used by different groups. Investigators should be aware of these factors when researching ransomware.<\/p>\n<p>Why is this important? Most RaaS models operate by <a href=\"https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/cybercrime-and-digital-threats\/modern-ransomwares-double-extortion-tactics-and-how-to-protect-enterprises-against-them\" target=\"_blank\" rel=\"noopener\">affiliates working with the ransomware group<\/a> to install a specifically named ransomware on as many machines as possible, then splitting the profits. This is advantageous for the attackers because when victims look up the ransomware and see many reports about it, they are more likely to pay. As a disadvantage, affiliates are largely anonymous and can\u2019t use these attacks as the basis of THEIR own criminal business. They are just like managers in a burger chain.<\/p>\n<p>It seems likely we have now observed a new &#8220;franchise&#8221; RaaS model involving XingLocker, AstroLocker and Mount Locker. In this model there seems to be a main RaaS (in this case Mount Locker), and then affiliates license the ransomware and release it under their own name and brand.&nbsp;<\/p>\n<p>In this scenario, the affiliates are like managers of their own local burger joint, getting products from a generic food supplier. The products are provided by the parent company, but the individual operators conduct business under their own branding, with unique names and images. This method gives more flexibility and recognition for the affiliates, especially mid-tier aspiring criminal gang leaders. One disadvantage is that it means less brand recognition for specific ransomware, so victims may be less inclined to pay. Of course, from an investigation point of view, this method adds confusion in terms of naming and makes tracking harder.<\/p>\n<p><span class=\"body-subhead-title\">How to Defend Against Ransomware<\/span><\/p>\n<p>Ransomware is a continuously evolving threat, and organizations should be vigilant in maintaining the best and most effective security policies and practices. Protection frameworks set by the <a href=\"https:\/\/www.cisecurity.org\/controls\/\" target=\"_blank\" rel=\"noopener\">Center of Internet Security<\/a> and the <a href=\"https:\/\/www.nist.gov\/cyberframework\" target=\"_blank\" rel=\"noopener\">National Institute of Standards and Technology<\/a> can help organizations prevent and mitigate the impact of ransomware attacks:&nbsp;<\/p>\n<ul>\n<li><span class=\"rte-red-bullet\">Audit and inventory: Take an inventory of all organizational assets and data, and identify authorized and unauthorized devices, software, and personnel accessing particular systems. Audit and monitor all logs of events and incidents to identify unusual patterns and behaviors.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Configure and monitor: Deliberately manage hardware and software configurations, and only grant administrative privileges and access to specific personnel when absolutely necessary. Monitor the use of network ports, protocols, and services. Implement security configurations on network infrastructure devices such as firewalls and routers, and have a software allow list to prevent malicious applications from being executed.&nbsp;<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Patch and update: Perform periodic vulnerability assessments, and conduct regular patching or virtual patching for operating systems and applications. Ensure that all installed software and applications are updated to their latest versions.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Protect and recover: Enforce data protection, backup, and recovery measures. Implement multifactor authentication in all devices and platforms used whenever available.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Secure and defend: Perform sandbox analysis to examine and block malicious emails. Employ the latest version of security solutions to all layers of the system, including email, endpoint, web, and network. Spot early signs of an attack such as the presence of suspicious tools in the system, and enable advanced detection technologies such as those powered with AI and machine learning.<\/span><\/li>\n<li><span class=\"rte-red-bullet\">Train and test: Perform security skills assessment and training for all personnel regularly, and conduct red-team exercises and penetration tests.<\/span><\/li>\n<\/ul>\n<p><span class=\"body-subhead-title\">Trend Micro Solutions<\/span><\/p>\n<p>Organizations can benefit from security solutions that encompass a system\u2019s multiple layers (endpoint, email, web, and network) not only for detecting malicious components but also for close monitoring of suspicious behaviors in the network.&nbsp;&nbsp;<\/p>\n<p><a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/services\/managed-xdr.html\" target=\"_blank\" rel=\"noopener\">Trend Micro\u2122 Vision One\u2122<\/a> provides multilayered protection and behavior detection, spotting questionable behaviors that might otherwise seem benign when viewed from only a single layer. For an even closer inspection of endpoints, <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/technologies\/control-manager.html\" target=\"_blank\" rel=\"noopener\">Trend Micro Apex One\u2122<\/a> offers next-level automated threat detection and response against advanced concerns such as fileless threats and ransomware. This allows detecting and blocking ransomware early on before it can do any real damage to the system.<\/p>\n<p>With techniques such as virtual patching and machine learning, <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/campaigns\/cloud-one-services.html\" target=\"_blank\" rel=\"noopener\">Trend Micro\u2122 Cloud One\u2122 Workload Security<\/a> protects systems against both known and unknown threats that exploit vulnerabilities. It also takes advantage of the latest in global threat intelligence to provide up-to-date, real-time protection.&nbsp;<\/p>\n<p>Ransomware often gets into the system through phishing emails. <a href=\"https:\/\/www.trendmicro.com\/en_us\/business\/products\/user-protection\/sps.html\" target=\"_blank\" rel=\"noopener\">Trend Micro\u2122 Deep Discovery\u2122 Email Inspector<\/a> employs custom sandboxing and advanced analysis techniques to effectively block ransomware before it gets into the system.<\/p>\n<p>For the Indicators of Compromise, please see this <a href=\"https:\/\/documents.trendmicro.com\/images\/TEx\/blogs\/IOCs-Ransomware-Operators-Found-Using-New-Franchise-Business-Modelh7RHcuA.txt\" target=\"_blank\" rel=\"noopener\">document<\/a>.&nbsp;<\/p>\n<p> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/research\/21\/j\/ransomware-operators-found-using-new-franchise-business-model.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>We found a relatively new and interesting ransomware operation that takes inspiration from franchise business models. It seems that the operators are rebranding a &#8220;supplier&#8221; ransomware before deployment instead of simply distributing it under the original name. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":43418,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9510,9508,9513,9509],"class_list":["post-43417","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-research-articles-news-reports","tag-trend-micro-research-endpoints","tag-trend-micro-research-malware","tag-trend-micro-research-research"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ransomware Operators Found Using New &quot;Franchise&quot; Business Model Sr. Threat Researcher 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/ransomware-operators-found-using-new-franchise-business-model-sr-threat-researcher\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware Operators Found Using New &quot;Franchise&quot; Business Model Sr. Threat Researcher 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/ransomware-operators-found-using-new-franchise-business-model-sr-threat-researcher\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-15T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/ransomware-operators-found-using-new-franchise-business-model-sr-threat-researcher.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"533\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/ransomware-operators-found-using-new-franchise-business-model-sr-threat-researcher\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/ransomware-operators-found-using-new-franchise-business-model-sr-threat-researcher\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Ransomware Operators Found Using New &#8220;Franchise&#8221; Business Model Sr. Threat Researcher\",\"datePublished\":\"2021-10-15T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/ransomware-operators-found-using-new-franchise-business-model-sr-threat-researcher\/\"},\"wordCount\":1052,\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/ransomware-operators-found-using-new-franchise-business-model-sr-threat-researcher\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/ransomware-operators-found-using-new-franchise-business-model-sr-threat-researcher.jpg\",\"keywords\":[\"Trend Micro Research : Articles, News, Reports\",\"Trend Micro Research : Endpoints\",\"Trend Micro Research : Malware\",\"Trend Micro Research : Research\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/ransomware-operators-found-using-new-franchise-business-model-sr-threat-researcher\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/ransomware-operators-found-using-new-franchise-business-model-sr-threat-researcher\/\",\"name\":\"Ransomware Operators Found Using New \\\"Franchise\\\" Business Model Sr. Threat Researcher 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/ransomware-operators-found-using-new-franchise-business-model-sr-threat-researcher\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/ransomware-operators-found-using-new-franchise-business-model-sr-threat-researcher\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/ransomware-operators-found-using-new-franchise-business-model-sr-threat-researcher.jpg\",\"datePublished\":\"2021-10-15T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/ransomware-operators-found-using-new-franchise-business-model-sr-threat-researcher\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.threatshub.org\/blog\/ransomware-operators-found-using-new-franchise-business-model-sr-threat-researcher\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/ransomware-operators-found-using-new-franchise-business-model-sr-threat-researcher\/#primaryimage\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/ransomware-operators-found-using-new-franchise-business-model-sr-threat-researcher.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/ransomware-operators-found-using-new-franchise-business-model-sr-threat-researcher.jpg\",\"width\":800,\"height\":533},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/ransomware-operators-found-using-new-franchise-business-model-sr-threat-researcher\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.threatshub.org\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro Research : Articles, News, Reports\",\"item\":\"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-research-articles-news-reports\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Ransomware Operators Found Using New &#8220;Franchise&#8221; Business Model Sr. Threat Researcher\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#website\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\/\/www.threatshub.org\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware Operators Found Using New \"Franchise\" Business Model Sr. Threat Researcher 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/ransomware-operators-found-using-new-franchise-business-model-sr-threat-researcher\/","og_locale":"en_US","og_type":"article","og_title":"Ransomware Operators Found Using New \"Franchise\" Business Model Sr. Threat Researcher 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/ransomware-operators-found-using-new-franchise-business-model-sr-threat-researcher\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-10-15T00:00:00+00:00","og_image":[{"width":800,"height":533,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/ransomware-operators-found-using-new-franchise-business-model-sr-threat-researcher.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/ransomware-operators-found-using-new-franchise-business-model-sr-threat-researcher\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/ransomware-operators-found-using-new-franchise-business-model-sr-threat-researcher\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Ransomware Operators Found Using New &#8220;Franchise&#8221; Business Model Sr. Threat Researcher","datePublished":"2021-10-15T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ransomware-operators-found-using-new-franchise-business-model-sr-threat-researcher\/"},"wordCount":1052,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ransomware-operators-found-using-new-franchise-business-model-sr-threat-researcher\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/ransomware-operators-found-using-new-franchise-business-model-sr-threat-researcher.jpg","keywords":["Trend Micro Research : Articles, News, Reports","Trend Micro Research : Endpoints","Trend Micro Research : Malware","Trend Micro Research : Research"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/ransomware-operators-found-using-new-franchise-business-model-sr-threat-researcher\/","url":"https:\/\/www.threatshub.org\/blog\/ransomware-operators-found-using-new-franchise-business-model-sr-threat-researcher\/","name":"Ransomware Operators Found Using New \"Franchise\" Business Model Sr. Threat Researcher 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/ransomware-operators-found-using-new-franchise-business-model-sr-threat-researcher\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/ransomware-operators-found-using-new-franchise-business-model-sr-threat-researcher\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/ransomware-operators-found-using-new-franchise-business-model-sr-threat-researcher.jpg","datePublished":"2021-10-15T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/ransomware-operators-found-using-new-franchise-business-model-sr-threat-researcher\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/ransomware-operators-found-using-new-franchise-business-model-sr-threat-researcher\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/ransomware-operators-found-using-new-franchise-business-model-sr-threat-researcher\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/ransomware-operators-found-using-new-franchise-business-model-sr-threat-researcher.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/ransomware-operators-found-using-new-franchise-business-model-sr-threat-researcher.jpg","width":800,"height":533},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/ransomware-operators-found-using-new-franchise-business-model-sr-threat-researcher\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro Research : Articles, News, Reports","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-research-articles-news-reports\/"},{"@type":"ListItem","position":3,"name":"Ransomware Operators Found Using New &#8220;Franchise&#8221; Business Model Sr. Threat Researcher"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43417","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=43417"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43417\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/43418"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=43417"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=43417"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=43417"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}