Iran-linked Pay2Key operation resurfaces with pseudo-ransomware tactics and expanded affiliate network
Summary
Hide ▲
Show ▼
Iran has reactivated the state-backed Pay2Key ransomware operation, recruiting affiliates from Russian cybercrime forums to conduct pseudo-ransomware attacks against high-impact US targets as part of its ongoing geopolitical conflict with the US and Israel. The campaign blends destructive wiper malware (e.g., Apostle retrofitted as ransomware) with extortion schemes to obscure geopolitical motives, complicate attribution, and maximize disruptive and financial impact. Affiliates receive profit-sharing incentives (up to 80% payouts) for attacks aligning with Iranian state objectives, effectively outsourcing cyber retribution to the global cybercrime ecosystem.
Timeline
-
31.03.2026 16:31 1 articles · 4h ago
Pay2Key re-emerges with pseudo-ransomware tactics and expanded affiliate network targeting US entities
Iran-linked Pay2Key ransomware operation has been reactivated with recruitment of affiliates from Russian cybercrime forums to conduct pseudo-ransomware attacks. The campaign leverages destructive wiper malware (e.g., Apostle repurposed as ransomware) to disguise geopolitically motivated sabotage as financial extortion. Affiliates receive profit-sharing incentives (up to 80%) for attacks targeting US and Israeli entities, aligning with Iranian state objectives.
Show sources
- Iran Deploys 'Pseudo-Ransomware,' Revives Pay2Key Operations — www.darkreading.com — 31.03.2026 16:31
Information Snippets
-
Pay2Key, an Iranian state-backed ransomware operation, has been reactivated with recruitment of affiliates from Russian cybercriminal forums.
First reported: 31.03.2026 16:311 source, 1 articleShow sources
- Iran Deploys 'Pseudo-Ransomware,' Revives Pay2Key Operations — www.darkreading.com — 31.03.2026 16:31
-
The operation deploys pseudo-ransomware, where encryption is used to disguise destructive activities typical of wiper malware.
First reported: 31.03.2026 16:311 source, 1 articleShow sources
- Iran Deploys 'Pseudo-Ransomware,' Revives Pay2Key Operations — www.darkreading.com — 31.03.2026 16:31
-
Iranian APT Agrius has repurposed the Apostle malware—originally a data wiper—into a ransomware variant to create destructive smokescreens.
First reported: 31.03.2026 16:311 source, 1 articleShow sources
- Iran Deploys 'Pseudo-Ransomware,' Revives Pay2Key Operations — www.darkreading.com — 31.03.2026 16:31
-
Affiliates receive increased profit-sharing (70% to 80%) for attacks targeting US and Israeli entities, aligning with Iranian geopolitical goals.
First reported: 31.03.2026 16:311 source, 1 articleShow sources
- Iran Deploys 'Pseudo-Ransomware,' Revives Pay2Key Operations — www.darkreading.com — 31.03.2026 16:31
-
Iran’s cyber strategy leverages hybrid state-criminal operations to conduct punitive cyberattacks while complicating attribution and regulatory compliance for victims.
First reported: 31.03.2026 16:311 source, 1 articleShow sources
- Iran Deploys 'Pseudo-Ransomware,' Revives Pay2Key Operations — www.darkreading.com — 31.03.2026 16:31