ClearView IT Blog

ClearView IT has been serving the Phoenix area since 2005, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

When Pyramid Scheme Meets Ransomware

When Pyramid Scheme Meets Ransomware

First hackers created a formidable ransomware. Then, when word got out about how to avoid this ransomware, they began to bundle a second ransomware to create an encryption catch-22. Now, the developers of the Petya and Mischa ransomware have adopted a Ransomware-as-a-Service model and have opened their nefarious malware up to distribution.

Anyone willing to send an entry fee to the developers can begin their own ransomware franchise, of sorts, working as affiliates. These affiliates are then paid a percentage of the booty based on the amount of ill-gotten funds they weasel out of their victims.

According to the welcome screen for those looking to utilize Petya, for bounties amounting to less than 5 Bitcoin each week, the affiliate receives a commission of 25 percent, whereas larger bounties (above 125 Bitcoin) are worth a considerably larger 85 percent of the haul. Clearly, these hackers are more focused on distributing their malware as widely as possible than they are on making a profit. The ransomware developers are providing their 125 Bitcoin-affiliates with a whopping $69,880.63 for sharing their program with victims who may have been previously unreachable.

As another incentive for cybercriminals to adopt the RaaS model, the author released online the keys to Chimera, another ransomware, allowing antivirus developers to create the means of neutralizing the older threat, thereby clearing the field for Petya and Mischa to dominate.

In doing so, the developers of Petya and Mischa have created a perfect storm to distribute their ransomware. By allowing unscrupulous individuals to make a quick buck (or Bit) for contributing to the spread of this ransomware, the developers succeeded in creating a deviously simple method to propagate their malware. Ultimately, this model of ransomware distribution brings in a significant sum of cash, despite sacrificing a pretty hefty portion of the incoming funds

Now that the dastardly duo that is Petya and Mischa is up for rent (with an upgraded Petya no longer vulnerable due to weak encryption) it is more important than ever to remain diligent against threats of all kinds, not only those that come via a misleading email. This diligence needs to become a concrete feature of your security protocol. Otherwise, your company could very well crumble after a RaaS attack or other assault.

To protect your business from ransomware and all other online threats, call ClearView IT at 866-326-7214.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 06 May 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Tag Cloud

Tip of the Week Security Technology Best Practices Business Computing Hackers Productivity Software Privacy Network Security Data Cloud Business User Tips IT Support Internet Hardware Innovation Email Hosted Solutions Malware Efficiency Workplace Tips Computer Google Microsoft Collaboration Android Phishing Cybersecurity Business Management IT Services Backup Ransomware Data Backup Smartphone communications Small Business Upgrade Smartphones Microsoft Office Mobile Devices Network Data Recovery Managed IT Services Communication Quick Tips Productivity Users Social Media VoIP Mobile Device Tech Term Automation Windows 10 Business Continuity Facebook Disaster Recovery Covid-19 Passwords Holiday Apps IT Support Managed Service Browser Windows 10 Miscellaneous Cloud Computing Outsourced IT Remote Work Internet of Things Data Management Managed Service Provider Government Saving Money Operating System Artificial Intelligence Gadgets Managed IT services Networking Windows Workplace Strategy Business Technology Remote Blockchain Bandwidth Encryption Server Information App Mobile Device Management Virtualization WiFi Spam Information Technology Employee/Employer Relationship History Budget Gmail Office Two-factor Authentication Office 365 Apple Cybercrime Health Conferencing Wi-Fi Access Control Analytics Big Data Data Security BDR Hacker Document Management IT Management Training Employer-Employee Relationship Compliance Save Money Voice over Internet Protocol Help Desk Remote Computing Patch Management Hacking Vendor Cost Management Remote Monitoring Money Legal Customer Service Unified Threat Management Firewall Search... Data storage Best Practice Data loss Augmented Reality Word Retail IBM Alert Website Hiring/Firing BYOD Mobile Office Outlook Password Applications Computing Managed Services Vendor Management Hard Drive Vulnerabilities Project Management Law Enforcement Mobile Computing End of Support Websites Printer Meetings Marketing Mobility Sports Windows 11 Social Running Cable SaaS DDoS Google Maps Scam Storage iPhone Travel Education Virtual Reality Cortana Social Engineering VPN Content Filtering Cryptocurrency Black Market Cleaning Update Router User Remote Workers Robot Data Breach Windows 7 The Internet of Things YouTube Free Resource Paperless Office Antivirus Chrome How To Maintenance Laptop Monitoring Twitter Healthcare Computer Care Saving Time Microchip Presentation Downloads Flexibility Specifications IT Consultant Virtual Desktop Vulnerability Employees Computers Experience Bitcoin Software as a Service Avoiding Downtime Telephone Hack Identity Theft Customer Relationship Management Data Protection Holidays Notifications Co-Managed IT Unified Communications Entertainment Cooperation Disaster Excel Google Docs Bluetooth Video Conferencing Distributed Denial of Service Virtual Machines Office Tips Memory Computer Repair Lithium-ion battery Private Cloud Tech Terms Professional Services Virtual Assistant Managed IT HIPAA Processors Digital Politics Settings Machine Learning Taxes Managed Services Provider Processor Virtual Private Network Solid State Drive Current Events Physical Security Chromebook Wireless Technology Drones eWaste Solutions Automobile Multi-factor Authentication PowerPoint Images 101 Integration Administration Downtime How To Safety Start Menu Display Trend Micro Wireless Headphones Microsoft Excel Vendor Mangement AI Business Cards Smart Technology Digital Security Cameras Samsung Electronic Health Records Tech Transportation Going Green Error In Internet of Things Phone System Uninterrupted Power Supply Webcam Wasting Time eCommerce Bookmark Modem Hacks Network Congestion Business Mangement Piracy Writing Videos Tablets Surveillance Term Download Reliable Computing Managing Costs HTML Supercomputer Browsers SSID Nanotechnology Google Calendar Staffing Software License Supply Chain Computer Accessories Virus Media IP Address Development Google Play Employer/Employee Relationships Upload Scalability Motion Sickness Virtual Machine Social Network Administrator Text Messaging Proactive IT Google Drive Reviews Optimization Data Analysis Screen Reader Bring Your Own Device Comparison Mobile Technology Workplace 2FA Security Cameras Teamwork Trends Hypervisor Customer Resource management Devices Knowledge Music Corporate Profile Data Storage Telephony Shopping Competition Employer Employee Relationship Fileless Malware Medical IT Television Recovery Tip of the week Company Culture Scams Paperless Cabling SQL Server Gamification G Suite Licensing Telephone System Botnet LiFi Regulations Tablet PCI DSS Entrepreneur VoIP Gig Economy Application Tracking Humor Directions Backup and Disaster Recovery Rental Service Troubleshooting Mouse Documents Micrsooft Desktop Flash Cables Business Communications Internet Service Provider Business Intelligence Azure Content Web Server Managed IT Service Electronic Medical Records Accountants Telephone Systems Business Growth Regulations Compliance Digital Payment Memes Database SharePoint Securty Point of Sale Human Resources Domains Worker Net Neutrality Health IT Equifax Banking Google Wallet Access Financial Data Shortcuts Time Management Risk Management Public Cloud IT Tactics Messenger Business Owner Hard Drive Disposal Deep Learning Google Apps Username Startup Business Metrics Audit Freedom of Information Hosted Solution Spyware Telework Be Proactive Smartwatch Public Speaking File Sharing Communitications Navigation Microsoft 365 Addiction Books email scam Streaming Media Mobile Security Language Redundancy Society Procurement User Tip Legislation News Cache FinTech Keyboard Monitors Workplace Strategies Unified Threat Management CES Hard Drives Visible Light Communication Workers IT Assessment Evernote Network Management Reading Inbound Marketing Windows 8 Supply Chain Management intranet Value CCTV Cyber security Proxy Server Emails Printing Wireless Fake News Organization Shortcut Computing Infrastructure Displays Touchscreen Heating/Cooling Advertising Smart Devices Environment Service Level Agreement Relocation Management Electronic Payment Windows XP Device security Work/Life Balance Emergency Tech Support Remote Working Social Networking Computer Malfunction

Blog Archive

Recent Comments

No comments yet.

Interested In A Free Consultation?