Tag: Ransomware

The cybercrime business model and its value chain

The security landscape has evolved to a point where most IT threats occur with the intention of generating financial gain for their creators and financiers. Based on this premise, various attack or threat types have proliferated and evolved to affect a greater number of users and organizations. The cybercrime “business model” is based on creating a value chain that offers new methods, for example cybercrime as a service, that is, the practice of facilitating illegal activities via services. In other words, anyone could acquire everything they need to organize frauds or cyberattacks, whatever their skills or technical knowledge.

Read more on We Live Security

Want Your Ransomed Files Back? Just Infect Someone Else!

Larry Abrams just reported: “Yesterday a new in-development ransomware was discovered by MalwareHunterTeam called Popcorn Time that intends to give victims a very unusual, and criminal, way of getting a free decryption key for their files. With Popcorn Time, not only can a victim pay a ransom to get their files back, but they can also try to infect two other people and have them pay the ransom in order to get a free key.

Read more on Know Be4

Ransomware hits San Francisco transport system. Free rides for all as $73,000 demanded

San Francisco’s transport system, known as Muni, was hit hard by a ransomware attack this weekend that forced the network to offer free rides to passengers. More than 2000 systems at the public transport agency are believed to have been hit, including Windows workstations, servers and ticketing machines.

Read the full article on Tripwire

Master Decryption Keys and Decryptor for the Crysis Ransomware Released

In a surprise move, the master decryption keys for the CrySiS Ransomware have been released early this morning [November 14, 2016] in a post on the BleepingComputer.com forums. At approximately 1 AM EST, a member named crss7777 created a post in the CrySiS support topic at BleepingComputer with a Pastebin link to a C header file containing the actual master decryption keys and information on how to utilize them.

These keys have already been used by Kaspersky Labs to update their RakhniDecryptor program so that it can be used to decrypt victim’s files.

Read more on Bleeping Computer