Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

When Pyramid Scheme Meets Ransomware

When Pyramid Scheme Meets Ransomware

First hackers created a formidable ransomware. Then, when word got out about how to avoid this ransomware, they began to bundle a second ransomware to create an encryption catch-22. Now, the developers of the Petya and Mischa ransomware have adopted a Ransomware-as-a-Service model and have opened their nefarious malware up to distribution.

Anyone willing to send an entry fee to the developers can begin their own ransomware franchise, of sorts, working as affiliates. These affiliates are then paid a percentage of the booty based on the amount of ill-gotten funds they weasel out of their victims.

According to the welcome screen for those looking to utilize Petya, for bounties amounting to less than 5 Bitcoin each week, the affiliate receives a commission of 25 percent, whereas larger bounties (above 125 Bitcoin) are worth a considerably larger 85 percent of the haul. Clearly, these hackers are more focused on distributing their malware as widely as possible than they are on making a profit. The ransomware developers are providing their 125 Bitcoin-affiliates with a whopping $69,880.63 for sharing their program with victims who may have been previously unreachable.

As another incentive for cybercriminals to adopt the RaaS model, the author released online the keys to Chimera, another ransomware, allowing antivirus developers to create the means of neutralizing the older threat, thereby clearing the field for Petya and Mischa to dominate.

In doing so, the developers of Petya and Mischa have created a perfect storm to distribute their ransomware. By allowing unscrupulous individuals to make a quick buck (or Bit) for contributing to the spread of this ransomware, the developers succeeded in creating a deviously simple method to propagate their malware. Ultimately, this model of ransomware distribution brings in a significant sum of cash, despite sacrificing a pretty hefty portion of the incoming funds

Now that the dastardly duo that is Petya and Mischa is up for rent (with an upgraded Petya no longer vulnerable due to weak encryption) it is more important than ever to remain diligent against threats of all kinds, not only those that come via a misleading email. This diligence needs to become a concrete feature of your security protocol. Otherwise, your company could very well crumble after a RaaS attack or other assault.

To protect your business from ransomware and all other online threats, call Evolve IT at (518) 203-2110.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 22 February 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Internet Best Practices Cloud Hackers Privacy Email Productivity Business Malware Business Computing Software User Tips Workplace Tips Computer Google Hosted Solutions Microsoft Upgrade Efficiency IT Support Mobile Devices Innovation Smartphone Windows 10 Network Security Ransomware Gmail Hardware Office The Internet of Things Backup Social Media Apps Business Continuity Bandwidth Disaster Recovery Communication Hacking WiFi Facebook Operating System Microsoft Office Smartphones Firewall Best Practice Content Filtering Cybercrime Alert Website Networking Data storage Data Windows Experience Employer-Employee Relationship Two-factor Authentication History Mobile Device Management Money Small Business Phishing Network App Managed Service Provider Outlook Mobile Computing Big Data communications Safety Unified Threat Management Quick Tips Wireless Technology Android Apple Remote Computing Document Management Shortcut Encryption DDoS Law Enforcement SaaS VoIP Word Heating/Cooling Proactive IT Retail Cortana Network Congestion Business Management Save Money Music Managed IT services Competition Entrepreneur Laptop Presentation Cryptocurrency Domains Bluetooth IBM Google Docs Education Cleaning Automation Holiday Hacker Black Market Memory YouTube Processors Staffing Office Tips Application LiFi Customer Service BYOD Deep Learning Downtime Passwords BDR Streaming Media Help Desk Disaster Micrsooft Visible Light Communication Vendor Management Router Office 365 Business Growth Data Management Recovery Robot Advertising Analytics Society Monitors Sports Saving Money Lithium-ion battery Google Wallet Spam intranet Running Cable Information Technology Windows 8 Displays Internet of Things Hosted Solution Windows XP Social Networking IT Services Documents Public Speaking Artificial Intelligence IP Address Tech Support End of Support Virtualization Compliance Drones Government Social Augmented Reality Printer Writing Keyboard Browser Search User Virtual Desktop Wireless Securty Hard Drives Unified Communications
QR-Code