(770) 424-3393 Facebook logo Twitter logo Linkedin logo YouTube 001 gplus RSS feed

Carceron Blog

Carceron has been serving the Atlanta area since 2002, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

When Pyramid Scheme Meets Ransomware

When Pyramid Scheme Meets Ransomware

First hackers created a formidable ransomware. Then, when word got out about how to avoid this ransomware, they began to bundle a second ransomware to create an encryption catch-22. Now, the developers of the Petya and Mischa ransomware have adopted a Ransomware-as-a-Service model and have opened their nefarious malware up to distribution.

Anyone willing to send an entry fee to the developers can begin their own ransomware franchise, of sorts, working as affiliates. These affiliates are then paid a percentage of the booty based on the amount of ill-gotten funds they weasel out of their victims.

According to the welcome screen for those looking to utilize Petya, for bounties amounting to less than 5 Bitcoin each week, the affiliate receives a commission of 25 percent, whereas larger bounties (above 125 Bitcoin) are worth a considerably larger 85 percent of the haul. Clearly, these hackers are more focused on distributing their malware as widely as possible than they are on making a profit. The ransomware developers are providing their 125 Bitcoin-affiliates with a whopping $69,880.63 for sharing their program with victims who may have been previously unreachable.

As another incentive for cybercriminals to adopt the RaaS model, the author released online the keys to Chimera, another ransomware, allowing antivirus developers to create the means of neutralizing the older threat, thereby clearing the field for Petya and Mischa to dominate.

In doing so, the developers of Petya and Mischa have created a perfect storm to distribute their ransomware. By allowing unscrupulous individuals to make a quick buck (or Bit) for contributing to the spread of this ransomware, the developers succeeded in creating a deviously simple method to propagate their malware. Ultimately, this model of ransomware distribution brings in a significant sum of cash, despite sacrificing a pretty hefty portion of the incoming funds

Now that the dastardly duo that is Petya and Mischa is up for rent (with an upgraded Petya no longer vulnerable due to weak encryption) it is more important than ever to remain diligent against threats of all kinds, not only those that come via a misleading email. This diligence needs to become a concrete feature of your security protocol. Otherwise, your company could very well crumble after a RaaS attack or other assault.

To protect your business from ransomware and all other online threats, call Carceron at (770) 424-3393.

Comments

 
No comments yet
Already Registered? Login Here
Guest
Saturday, 01 October 2016
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Security Technology Best Practices Privacy Internet Tip of the Week Microsoft Business Management Managed Service Provider Software Workplace Tips Cloud Backup Saving Money Data Small Business Hardware Productivity Gadgets Hackers Mobile Office Business Computing Business Email Hosted Solutions IT Services Quick Tips Google Malware Social Media IT Support Virtualization Upgrade Mobile Devices Business Continuity Passwords Users Smartphones Disaster Recovery Microsoft Office Network Windows WiFi Server VoIP Innovation Miscellaneous Computer User Tips Communication Mobile Device Management Efficiency Windows 10 Mobile Computing Vendor Management Operating System Unified Threat Management Smartphone The Internet of Things Marketing BYOD Apps Remote Computing Holiday Android Health Analytics IT Consultant Facebook History Ransomware Windows 8 Bring Your Own Device Going Green Wireless Technology Apple Alert Content Filtering Outlook Information Technology Big data Saving Time Network Security Hard Drives Printer Lithium-ion Battery Tech Support Office Hiring/Firing Remote Monitoring Data Management Spam Save Money Firewall Phishing Employer-Employee Relationship Gmail Collaboration Antivirus Best Practice Automation Search Computer Repair Proactive IT Browser Humor Bandwidth Computers Smart Phones Save Time Maintenance Tutorials Two-factor Authentication Money Sports Wireless App Current Events Running Cable Intranet Mobile Device Managed IT services Business Intelligence Hacking iPhone User User Error Document Management Phone System Avoiding Downtime Router Internet of Things Fax Server Education Administration Budget PowerPoint Help Desk Excel Artificial Intelligence Text Messaging Retail VPN Website Legal Data storage Virus Virtual Desktop Network Congestion Chrome Experience Heating/Cooling Flexibility Office Tips IBM Computing Inbound Marketing Safety Hosted Solution Thin Client Company Culture Statistics Social Cost Management SaaS Streaming Media Customer Service Downtime Comanaged IT USB Net Neutrality Government Recovery Cybercrime Black Market Password Programming Pain Points Compliance Printer Server Cortana Business Growth Gaming Console Social Networking Digital Payment Encryption Customer Relationship Management Presentation Risk Management Bluetooth Laptop Processors Computer Accessories Comparison communications Networking Augmented Reality Documents End of Support Work/Life Balance Microserver Twitter Law Enforcement PDF 3D Adroid Writing Shortcut Outsourced IT Unified Communications Ebay Troubleshooting Display Turn Key Download Staffing switches Efeciency Content Management Domains Permissions Pirating Information Business Owner Paperless Office Microchip Google Docs Recycling eWaste Disaster Co-Managed IT Regulations Identity Theft Archive Solid State Drive Specifications Adminstration Update Environment Securty Harddrive IT consulting Competition Virtual Reality Office 365 Society Video Surveillance Entertainment Analytic Online currency Micrsooft Trending Riske Management Windows XP Digital Signature IT service Point of Sale Application Computing Infrastructure Debate Robot CIO Memory Wi-Fi DDoS Music Lifestyle Upgrades Leadership Tablet Flash Telephone Systems External Harddrive BDR Deep Learning Word Public Speaking LiFi HIPAA Skype Settings File Sharing organize Banking Touchscreen Electronic Payment Teamwork Monitors Entrepreneur Hacker Visible Light Communication Webinar Language Business Metrics Google Wallet Best Available LinkedIn Displays IP Address Advertising Storage Managed IT Wearable Technology Chromebook Human Resources Drones Mouse Read GPS Value Operating Systerm Keyboard YouTube

Mobile? Grab this Article!

QR-Code

Recent Comments

No comments yet.

Blog Archive