Contact us today!
(518) 203-2110

Evolve IT

Evolve IT has been serving the Saratoga Springs area since 1995, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

When Pyramid Scheme Meets Ransomware

When Pyramid Scheme Meets Ransomware

First hackers created a formidable ransomware. Then, when word got out about how to avoid this ransomware, they began to bundle a second ransomware to create an encryption catch-22. Now, the developers of the Petya and Mischa ransomware have adopted a Ransomware-as-a-Service model and have opened their nefarious malware up to distribution.

Anyone willing to send an entry fee to the developers can begin their own ransomware franchise, of sorts, working as affiliates. These affiliates are then paid a percentage of the booty based on the amount of ill-gotten funds they weasel out of their victims.

According to the welcome screen for those looking to utilize Petya, for bounties amounting to less than 5 Bitcoin each week, the affiliate receives a commission of 25 percent, whereas larger bounties (above 125 Bitcoin) are worth a considerably larger 85 percent of the haul. Clearly, these hackers are more focused on distributing their malware as widely as possible than they are on making a profit. The ransomware developers are providing their 125 Bitcoin-affiliates with a whopping $69,880.63 for sharing their program with victims who may have been previously unreachable.

As another incentive for cybercriminals to adopt the RaaS model, the author released online the keys to Chimera, another ransomware, allowing antivirus developers to create the means of neutralizing the older threat, thereby clearing the field for Petya and Mischa to dominate.

In doing so, the developers of Petya and Mischa have created a perfect storm to distribute their ransomware. By allowing unscrupulous individuals to make a quick buck (or Bit) for contributing to the spread of this ransomware, the developers succeeded in creating a deviously simple method to propagate their malware. Ultimately, this model of ransomware distribution brings in a significant sum of cash, despite sacrificing a pretty hefty portion of the incoming funds

Now that the dastardly duo that is Petya and Mischa is up for rent (with an upgraded Petya no longer vulnerable due to weak encryption) it is more important than ever to remain diligent against threats of all kinds, not only those that come via a misleading email. This diligence needs to become a concrete feature of your security protocol. Otherwise, your company could very well crumble after a RaaS attack or other assault.

To protect your business from ransomware and all other online threats, call Evolve IT at (518) 203-2110.

Comments

 
No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, 06 December 2025
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Blog Archive

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up!

Free Consultation
 

Tag Cloud

Tip of the Week Security Technology Internet Best Practices Cloud Hackers Privacy Email Productivity Malware Business Business Computing Software User Tips Google Computer Hosted Solutions Microsoft Upgrade Efficiency Workplace Tips Innovation Smartphone Windows 10 IT Support Mobile Devices Gmail Network Security Ransomware Hardware Business Continuity Operating System Disaster Recovery Communication Hacking The Internet of Things WiFi Social Media Facebook Bandwidth Microsoft Office Office Backup Apps Website Wireless Technology Android Apple Employer-Employee Relationship Best Practice History Two-factor Authentication Alert Small Business Networking Phishing App Data storage Data Windows Mobile Computing Experience Big Data communications Safety Unified Threat Management Quick Tips Mobile Device Management Money Network Smartphones Firewall Managed Service Provider Outlook Content Filtering Cybercrime Tech Support Compliance Managed IT services Competition Drones Social Presentation Entrepreneur Printer Domains Browser Bluetooth Wireless Virtual Desktop Unified Communications Hacker Securty Automation Document Management Encryption Memory Application VoIP Law Enforcement SaaS Customer Service Deep Learning Proactive IT BDR Cortana Network Congestion Save Money Vendor Management Router Music Office 365 Cryptocurrency Analytics Laptop Monitors Saving Money intranet Lithium-ion battery IBM Google Docs Education Cleaning Holiday Displays Social Networking Black Market YouTube Processors LiFi Public Speaking Staffing Office Tips BYOD IP Address Downtime End of Support Virtualization Help Desk Passwords Streaming Media Visible Light Communication Disaster Government Micrsooft Augmented Reality Writing Keyboard User Business Growth Search Data Management Advertising Hard Drives Recovery Robot Society Remote Computing Sports Shortcut Google Wallet DDoS Spam Information Technology Heating/Cooling Running Cable Word Windows 8 Internet of Things Retail IT Services Hosted Solution Windows XP Artificial Intelligence Documents Business Management
QR-Code