ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

When Pyramid Scheme Meets Ransomware

When Pyramid Scheme Meets Ransomware

First hackers created a formidable ransomware. Then, when word got out about how to avoid this ransomware, they began to bundle a second ransomware to create an encryption catch-22. Now, the developers of the Petya and Mischa ransomware have adopted a Ransomware-as-a-Service model and have opened their nefarious malware up to distribution.

Anyone willing to send an entry fee to the developers can begin their own ransomware franchise, of sorts, working as affiliates. These affiliates are then paid a percentage of the booty based on the amount of ill-gotten funds they weasel out of their victims.

According to the welcome screen for those looking to utilize Petya, for bounties amounting to less than 5 Bitcoin each week, the affiliate receives a commission of 25 percent, whereas larger bounties (above 125 Bitcoin) are worth a considerably larger 85 percent of the haul. Clearly, these hackers are more focused on distributing their malware as widely as possible than they are on making a profit. The ransomware developers are providing their 125 Bitcoin-affiliates with a whopping $69,880.63 for sharing their program with victims who may have been previously unreachable.

As another incentive for cybercriminals to adopt the RaaS model, the author released online the keys to Chimera, another ransomware, allowing antivirus developers to create the means of neutralizing the older threat, thereby clearing the field for Petya and Mischa to dominate.

In doing so, the developers of Petya and Mischa have created a perfect storm to distribute their ransomware. By allowing unscrupulous individuals to make a quick buck (or Bit) for contributing to the spread of this ransomware, the developers succeeded in creating a deviously simple method to propagate their malware. Ultimately, this model of ransomware distribution brings in a significant sum of cash, despite sacrificing a pretty hefty portion of the incoming funds

Now that the dastardly duo that is Petya and Mischa is up for rent (with an upgraded Petya no longer vulnerable due to weak encryption) it is more important than ever to remain diligent against threats of all kinds, not only those that come via a misleading email. This diligence needs to become a concrete feature of your security protocol. Otherwise, your company could very well crumble after a RaaS attack or other assault.

To protect your business from ransomware and all other online threats, call ClearView IT at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 05 July 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Network Security Privacy Data Cloud Business User Tips IT Support Internet Hardware Innovation Malware Email Hosted Solutions Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Business Management Phishing Cybersecurity IT Services Backup Data Backup Ransomware Smartphone communications Upgrade Smartphones Small Business Microsoft Office Mobile Devices Network Managed IT Services Communication Data Recovery Quick Tips Productivity Users Social Media VoIP Mobile Device Automation Tech Term Facebook Windows 10 Business Continuity Covid-19 Passwords Disaster Recovery Holiday IT Support Managed Service Browser Windows 10 Apps Miscellaneous Cloud Computing Outsourced IT Remote Work Managed Service Provider Internet of Things Data Management Saving Money Operating System Government Artificial Intelligence Workplace Strategy Managed IT services Gadgets Networking Windows Spam Server Information Remote WiFi Bandwidth Encryption Business Technology Mobile Device Management Blockchain App Virtualization Two-factor Authentication Information Technology Office 365 Employee/Employer Relationship Budget Gmail History Office Apple Conferencing Access Control Analytics Data Security Cybercrime Wi-Fi BDR Big Data Health Document Management Remote Computing Patch Management Hacker Vendor Save Money Remote Monitoring Compliance Voice over Internet Protocol IT Management Training Help Desk Employer-Employee Relationship Hacking Cost Management Alert Legal Hiring/Firing Outlook Data storage Password Money Applications Customer Service Unified Threat Management Project Management Firewall Vulnerabilities Augmented Reality Word Mobile Office BYOD IBM Website Computing Search... Managed Services Best Practice Vendor Management Hard Drive Data loss Retail Update Law Enforcement End of Support Laptop Printer User Data Breach Paperless Office Antivirus Chrome Social Maintenance Sports Travel SaaS DDoS Virtual Reality Windows 11 Social Engineering Cryptocurrency Monitoring Black Market iPhone Cleaning Mobile Computing Healthcare Education Websites Cortana Remote Workers Robot Content Filtering Meetings Marketing Mobility Windows 7 Running Cable Free Resource Google Maps Router Scam Storage How To The Internet of Things YouTube VPN Twitter Integration Tech Terms Images 101 How To Display Managed IT Wireless Technology Microchip Virtual Assistant eWaste HIPAA Flexibility Digital Employees Taxes Avoiding Downtime Downtime Hack Safety Identity Theft Notifications Holidays Unified Communications Processor Virtual Desktop Cooperation Experience Google Docs Video Conferencing Bluetooth Physical Security Distributed Denial of Service Virtual Machines Office Tips Computer Repair Memory PowerPoint Private Cloud Multi-factor Authentication Administration Professional Services Disaster Start Menu Computer Care Presentation Downloads Specifications Vulnerability Saving Time Politics IT Consultant Settings Lithium-ion battery Machine Learning Software as a Service Managed Services Provider Bitcoin Customer Relationship Management Data Protection Computers Virtual Private Network Co-Managed IT Solid State Drive Telephone Processors Entertainment Current Events Chromebook Drones Excel Solutions Automobile Public Speaking Displays G Suite Tip of the week Advertising Fileless Malware Relocation Tablet Smart Devices Streaming Media VoIP Gamification Remote Working Work/Life Balance Tracking Company Culture Tech Support Troubleshooting Mouse Telephone System AI Regulations Trend Micro Keyboard Be Proactive Hard Drives Web Server Transportation Directions Digital Security Cameras Backup and Disaster Recovery Electronic Health Records In Internet of Things Content Digital Payment Desktop Wasting Time intranet SharePoint Electronic Medical Records Wireless Hacks Worker Accountants eCommerce Shortcut Network Congestion Modem Workplace Strategies Heating/Cooling Writing Environment Videos Reliable Computing Access Database Surveillance Windows XP Time Management Public Cloud Managing Costs Social Networking Business Owner Health IT Equifax SSID Development Hard Drive Disposal Employer/Employee Relationships Audit Media Scalability Spyware Tactics Administrator Username Text Messaging File Sharing Virtual Machine Proactive IT Smart Technology Redundancy Reviews Bring Your Own Device Startup Optimization Freedom of Information email scam Teamwork Navigation 2FA Cache Addiction Unified Threat Management Data Storage Workers Mobile Security Hypervisor Music Inbound Marketing Medical IT User Tip Shopping Staffing Legislation News IP Address CCTV SQL Server Printing Evernote Paperless Network Management Botnet Touchscreen PCI DSS Licensing Supply Chain Emergency Proxy Server Gig Economy Rental Service Emails Humor Micrsooft Electronic Payment Computer Malfunction Fake News Internet Service Provider Flash Computing Infrastructure Azure Business Communications Vendor Mangement Service Level Agreement Management Regulations Compliance Telephone Systems Samsung Device security Managed IT Service Business Growth Workplace Phone System Recovery Uninterrupted Power Supply Wireless Headphones Memes Competition Webcam Microsoft Excel Business Mangement Going Green Net Neutrality Business Cards Tech Human Resources LiFi Error Financial Data Banking Tablets Entrepreneur Google Wallet Scams Bookmark Risk Management Documents Messenger IT Application Deep Learning Download Supercomputer Piracy Business Intelligence Google Calendar Term Google Apps Virus Telework Business Metrics HTML Hosted Solution Computer Accessories Motion Sickness Microsoft 365 Cables Browsers Smartwatch Securty Books Nanotechnology Communitications Google Drive Upload Procurement Domains Language Software License Society Comparison Google Play Social Network FinTech Monitors Point of Sale Visible Light Communication Knowledge Data Analysis CES Reading Corporate Profile Screen Reader IT Assessment Telephony Trends Supply Chain Management Employer Employee Relationship Mobile Technology Value Windows 8 Television Security Cameras Customer Resource management Organization Cabling Devices Cyber security Shortcuts

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?