Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

When Pyramid Scheme Meets Ransomware

When Pyramid Scheme Meets Ransomware

First hackers created a formidable ransomware. Then, when word got out about how to avoid this ransomware, they began to bundle a second ransomware to create an encryption catch-22. Now, the developers of the Petya and Mischa ransomware have adopted a Ransomware-as-a-Service model and have opened their nefarious malware up to distribution.

Anyone willing to send an entry fee to the developers can begin their own ransomware franchise, of sorts, working as affiliates. These affiliates are then paid a percentage of the booty based on the amount of ill-gotten funds they weasel out of their victims.

According to the welcome screen for those looking to utilize Petya, for bounties amounting to less than 5 Bitcoin each week, the affiliate receives a commission of 25 percent, whereas larger bounties (above 125 Bitcoin) are worth a considerably larger 85 percent of the haul. Clearly, these hackers are more focused on distributing their malware as widely as possible than they are on making a profit. The ransomware developers are providing their 125 Bitcoin-affiliates with a whopping $69,880.63 for sharing their program with victims who may have been previously unreachable.

As another incentive for cybercriminals to adopt the RaaS model, the author released online the keys to Chimera, another ransomware, allowing antivirus developers to create the means of neutralizing the older threat, thereby clearing the field for Petya and Mischa to dominate.

In doing so, the developers of Petya and Mischa have created a perfect storm to distribute their ransomware. By allowing unscrupulous individuals to make a quick buck (or Bit) for contributing to the spread of this ransomware, the developers succeeded in creating a deviously simple method to propagate their malware. Ultimately, this model of ransomware distribution brings in a significant sum of cash, despite sacrificing a pretty hefty portion of the incoming funds

Now that the dastardly duo that is Petya and Mischa is up for rent (with an upgraded Petya no longer vulnerable due to weak encryption) it is more important than ever to remain diligent against threats of all kinds, not only those that come via a misleading email. This diligence needs to become a concrete feature of your security protocol. Otherwise, your company could very well crumble after a RaaS attack or other assault.

To protect your business from ransomware and all other online threats, call Evolve IT at (518) 203-2110.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, 14 November 2024
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Best Practices Technology Internet Hackers Cloud Privacy Email Productivity Malware Business Software Business Computing User Tips Hosted Solutions Microsoft Upgrade Efficiency Computer Workplace Tips Google Windows 10 IT Support Mobile Devices Innovation Smartphone Hardware Network Security Ransomware Gmail Facebook Operating System The Internet of Things Social Media Bandwidth Microsoft Office Office Backup Apps Business Continuity Disaster Recovery Communication Hacking WiFi Phishing App Wireless Technology Android Mobile Computing Apple Big Data communications Safety Unified Threat Management Best Practice Quick Tips Alert Smartphones Networking Data storage Data Windows Firewall Experience Content Filtering Cybercrime Website Mobile Device Management Money Network Managed Service Provider Employer-Employee Relationship Outlook History Two-factor Authentication Small Business Monitors Tech Support Office 365 Compliance Drones Social Analytics Saving Money Displays intranet Printer Lithium-ion battery Browser Virtual Desktop Wireless Unified Communications Securty End of Support Social Networking Document Management Encryption SaaS Public Speaking VoIP Law Enforcement IP Address Virtualization Cortana Writing Proactive IT Government Network Congestion Save Money Augmented Reality Keyboard Music Search User Hard Drives Cryptocurrency Remote Computing Laptop Shortcut IBM Retail DDoS Education Heating/Cooling Word Google Docs Cleaning Holiday Processors Managed IT services Black Market YouTube LiFi Staffing Business Management Office Tips BYOD Downtime Help Desk Bluetooth Passwords Streaming Media Competition Visible Light Communication Presentation Disaster Entrepreneur Micrsooft Domains Automation Memory Business Growth Data Management Robot Advertising Hacker Recovery Society Sports Deep Learning Spam Application BDR Google Wallet Information Technology Customer Service Running Cable Vendor Management Windows 8 Internet of Things Windows XP IT Services Hosted Solution Artificial Intelligence Documents Router
QR-Code