Contact us today!
(800) 588-4430

Telesys Voice and Data Blog

Telesys Voice and Data has been serving the Dallas/Fort Worth area since 1994, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Some Evil Genius Just Combined the Pyramid Scheme With Ransomware

Some Evil Genius Just Combined the Pyramid Scheme With Ransomware

The ransomware machine keeps moving forward, despite significant opposition. In particular, the ransomware tag-team duo of Petya and Mischa have steamrolled most attempts to block them from accessing critical systems, always finding ways to outsmart security professionals. Now, these ransomwares have adopted a Ransomware as a Service model, which has made significant changes to the way that this ransomware is distributed.

Basically, anyone can take advantage of the Petya/Mischa combo, as long as they pay a simple entry fee to the developers. You can think of it like an affiliates program, where they’re paid a portion of what the ransomware earns. Users are responsible for the spread of the ransomware in order to make a profit.

For bounties less than 5 Bitcoin a week, the affiliate receives a commission of 25 percent. However, large bounties (defined as above 125 Bitcoin), are worth much more--85 percent. Hackers seem to be more concerned with spreading their ransomware than actually making any money, which is a concerning development in and of itself. So far, the ransomware developers have distributed their 125-Bitcoin affiliates a significant $69,880.63, simply for sharing the ransomware with victims who may not have been reachable before.

One other incentive for cybercriminals to adopt the Ransomware as a Service model is that the author of the Petya/Mischa double-threat has released the keys to Chimera, a rival ransomware, online. This allows antivirus developers to focus their efforts on eliminating the older threat, and forces potential criminals to consider newer threats like Petya and Mischa as a more viable option. In other words, Petya and Mischa have been mercilessly eliminating their competition--a Russian specialty.

Thus, the developers of Petya and Mischa have put together perhaps the most devastating storm of ransomware to be seen in recent times. Allowing for the spread of malware through ruthless individuals who want to make a quick buck, the developers have crafted a simple, yet devious method of spreading their malware. This model allows the users and developers to bring in a significant profit, even if it’s throwing a hefty portion at their affiliates.

Now that this gruesome twosome is available as a service, and including the fact that Petya is no longer vulnerable due to weak encryption, it’s more important than ever to ensure that you keep your system and its users safe and aware of all types of threats. The threat of ransomware could come through more than just a misleading email. Just clicking on the wrong link could initiate an unexpected download of a virus or malware, so it’s important to spread best practices around the office. By taking this proactive approach to network security, you can do no wrong.

To ensure that your business doesn’t fall victim to ransomware and other online threats, reach out to Telesys Voice and Data at (800) 588-4430.

Comments

 
No comments yet
Already Registered? Login Here
Guest
Wednesday, 20 November 2019
If you'd like to register, please fill in the username, password and name fields.

Captcha Image

Free Consultation

Sign up today for a
FREE Network Consultation

How secure is your IT infrastructure?
Let us evaluate it for free!

Sign up Now!

Free Consultation
 

Tag Cloud

Security Tip of the Week Technology Cloud Best Practices Business Computing Hackers Malware Privacy Email Business Productivity Hosted Solutions Microsoft Network Security Software Internet IT Services Windows 10 Computer Data Backup Productivity Managed Service Provider Innovation Backup Ransomware Outsourced IT Mobile Devices Business Continuity Android Hardware Smartphone Google Disaster Recovery Social Media Data Recovery Managed IT services Efficiency Upgrade User Tips Communication Data IT Support Workplace Tips Browser Small Business Business Management Cloud Computing IT Support Managed IT Services Data Management App Smartphones Holiday Microsoft Office Internet of Things Office Phishing Remote Monitoring Miscellaneous Server Office 365 Windows Network Password Facebook communications Paperless Office WiFi Artificial Intelligence Gmail Big Data Apps Tech Term VoIP Encryption Cybersecurity Save Money Spam Passwords Risk Management Collaboration Apple Bandwidth Firewall Unified Threat Management Windows 10 Saving Money Document Management Hosted Solution Recovery Robot Customer Relationship Management Employer-Employee Relationship Analytics Avoiding Downtime Word Vendor Management Hacker Managed IT Infrastructure Customer Service Mobile Device Management Content Filtering Operating System Remote Computing Tip of the week How To Compliance Downtime Government Wi-Fi Office Tips Money Work/Life Balance Chrome Windows 7 IT Management The Internet of Things File Sharing Computers Health Mobile Device Antivirus Redundancy Hacking Automation Mobile Computing Project Management Data loss Going Green BDR Tech Support Alert Education Business Technology Printing Data storage Cybercrime Computing Telephone Systems Healthcare Social Presentation Business Growth Virtual Reality Managed Service Training Website Vulnerability SaaS Help Desk BYOD Outlook Data Security Applications Two-factor Authentication Settings Software as a Service Retail Remote Monitoring and Management HIPAA Router Maintenance Best Practice Mobile Security Legal Lithium-ion battery Display Augmented Reality Business Owner Twitter Running Cable Monitors IBM Politics Travel Marketing Tablet Google Drive Websites Search Physical Security Bring Your Own Device Sports Taxes Access Control Competition IT service Botnet Cortana Information Technology Virtualization Samsung Administration Laptops Meetings Humor Storage IT solutions Safety Analyitcs Computer Care Wireless Technology Patch Management Solid State Drive Wireless Scam Identity Theft Regulations Specifications YouTube Automobile VPN Upgrades Unified Communications Net Neutrality Assessment Budget Server Management User End of Support Licensing Proactive Virtual Private Network Smart Technology LiFi Digital Payment Consultation Mouse Statistics iPhone Network Congestion Software Tips Favorites Law Enforcement Mail Merge Distributed Denial of Service Unsupported Software Laptop Enterprise Resource Planning File Management CCTV Disaster Resistance Hard Drives Emoji data services Bluetooth Technology Tips Virtual Desktop WPA3 IT Technicians Conferencing Gadget Modem Manufacturing Address Managed IT Service Mobile Data Corporate Profile Hacks Halloween Mobile Telephone Proactive IT Refrigeration Hotspot Quick Tips User Error Comparison History Fleet Tracking Mirgation Employees Fun Cookies Gadgets Break Fix WannaCry Current Events Deep Learning PowerPoint Scary Stories Company Culture Mobile VoIP G Suite IT Consulting Language Processors Time Management Printer Mobility Black Friday Cabling Asset Tracking Migration Zero-Day Threat Nanotechnology Proactive Maintenance Motion Sickness Dark Web Consumers Staffing Vulnerabilities Data Breach Undo Computing Infrastructure Network Management Google Docs Cyber Monday Writing Remote Workers IP Address Chatbots Backup and Disaster Recovery IoT Processor Data Warehousing Personal Information VoIP GPS Alt Codes Google Maps Geography IT Consultant Technology Laws Alerts Touchscreen SharePoint eWaste Machine Learning flu season Social Engineering Disaster IT Sevices Information Mobile Office Identity RMM Utility Computing Lenovo Microsoft Excel Computer Repair Digital Tracking Typing Buisness Cables Cleaning Unified Threat Management Cooperation Notifications Downloads Environment Relocation Shortcut Fort Worth Uninterrupted Power Supply Monitoring Procurement Knowledge Active Directory Webcam Superfish Blockchain Electronic Medical Records Spyware Google Wallet Cryptocurrency Dark Data Wires business communications systems Staff Crowdsourcing Multi-Factor Security Troubleshooting Remote Worker Private Cloud flu shot Electronic Health Records Bitcoin Experience Cost Management Windows Server Point of Sale Permissions How To Drones Phone System Internet Protocol Flexibility Heating/Cooling Google Calendar Professional Services Error Fort Worth IT Hard Disk Drive Windows 8 Hard Drive User Management Networking Fraud Firefox Supercomputer Legislation MSP VoIP streamlines Domains Operations Cyberattacks Servers 5G Social Networking Virtual Assistant Entrepreneur DFW IT Service Recycling Batteries Web Server Application Update IT Budget Users business network infrastructure Public Speaking Wearable Technology Bookmarks Motherboard Voice over Internet Protocol Administrator 3D Printing Management Remote Work Cameras Techology Internet Exlporer Chromebook

Top Blog

Don't be Afraid to Replace Got an older PC that's causing you a lot of issues? Older technology is typically more expensive to run, and after a while, it's cheaper to simply buy a new desktop than it is to continue pouring money into something that always seems broken. It's a great time to buy wo...
QR-Code