{"id":181678,"date":"2017-03-06T14:51:10","date_gmt":"2017-03-06T19:51:10","guid":{"rendered":"http:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/new-dark-web-scheme-lets-wannabe-cybercriminals-get-in-on-ransomware-for-free-zdnet\/"},"modified":"2017-03-06T14:51:10","modified_gmt":"2017-03-06T19:51:10","slug":"new-dark-web-scheme-lets-wannabe-cybercriminals-get-in-on-ransomware-for-free-zdnet","status":"publish","type":"post","link":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/new-dark-web-scheme-lets-wannabe-cybercriminals-get-in-on-ransomware-for-free-zdnet\/","title":{"rendered":"New dark web scheme lets wannabe cybercriminals get in on ransomware &#8211; for free &#8211; ZDNet"},"content":{"rendered":"<p><p>    The service offers step-by-step    instructions on building ransomware.  <\/p>\n<p>    A new dark web scheme could allow any wannabe cybercriminal to    grab a piece of the ransomware pie for free -- on the condition    that any ill-gotten profits are split 50\/50.  <\/p>\n<p>    Ransomware -- a form of malware which encrypts a victim's files    and demands a ransom to restore them -- has boomed in the last    18 months. A     number of ransomware-as-a-service affiliate schemes allow    even the most technically illiterate cyber thief to cash in on    a form of crime which cost businesses over a billion dollars    last year.  <\/p>\n<p>    But while these schemes are sold to users for a fee -- be it a    one-off payment,     or as part of a subscription based service -- this new    ransomware operation is providing malicious software to    affiliates for free in exchange for a big slice of any    successful scores.  <\/p>\n<p>    The move represents another evolution in ransomware which could    make it an even more dangerous threat, because criminals may be    tempted to download it and launch a ransomware campaign as they    don't need to part with their cash to do so.  <\/p>\n<p>    \"The simplistic and straight-forward design of Dot ransomware    enables just about anyone to conduct cybercrime,\" warn Fortinet    researchers, who predict Dot will soon become a big threat to    businsesses.  <\/p>\n<p>    \"Although we haven't seen this ransomware in the wild, with the    advertisements being made accessible on hacking forums, it's    only a matter of time until people start taking the bait.\"  <\/p>\n<p>    This particular scheme appeared during mid-February and offers    users Dot ransomware. All the user needs to get started is to    access to the download via the Tor browser and to register a    Bitcoin address --     Bitcoin being the number one method of extorting ransoms.  <\/p>\n<p>    Once this is done, the authors of Dot provide a guide to    getting started, including recommendations of which file types    to use to distribute ransomware, as well as recommendations for    what ransoms to charge in which countries in order to maximise    returns.  <\/p>\n<p>    The authors even go so far as to provide a dashboard for users    to keep track of the number and status of infections. The core    of the malicious software service appears to be designed to    look as if it's like any other form of legitimate    set of software tools.  <\/p>\n<p>    Dot's authors attempt to position the    ransomware as like any other software service.  <\/p>\n<p>    Offering Dot as a free, commissioned-based service has    advantages for both the authors and their affiliates; the    ransomware writers have an easy way of spreading their    malicious software -- complete with with ongoing significant    returns from successful infections -- while the would-be    criminals get their hands on ransomware without having to pay.  <\/p>\n<p>    However, the author has coded Dot to ensure that a technically    literate user can't rewire the program to take all the payment    for themselves.  <\/p>\n<p>    Victims are infected with Dot via malicious attachments, which    will encrypt their files when run and open a ReadMe HTML,    informing them they need to pay a Bitcoin ransom in order to    regain access to their data.  <\/p>\n<p><!-- Auto Generated --><\/p>\n<p>See the article here:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.zdnet.com\/article\/new-dark-web-scheme-lets-wannabe-cybercriminals-get-in-on-ransomware-for-free\/\" title=\"New dark web scheme lets wannabe cybercriminals get in on ransomware - for free - ZDNet\">New dark web scheme lets wannabe cybercriminals get in on ransomware - for free - ZDNet<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> The service offers step-by-step instructions on building ransomware. A new dark web scheme could allow any wannabe cybercriminal to grab a piece of the ransomware pie for free -- on the condition that any ill-gotten profits are split 50\/50 <a href=\"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/tor-browser\/new-dark-web-scheme-lets-wannabe-cybercriminals-get-in-on-ransomware-for-free-zdnet\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[94875],"tags":[],"class_list":["post-181678","post","type-post","status-publish","format-standard","hentry","category-tor-browser"],"_links":{"self":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/181678"}],"collection":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/comments?post=181678"}],"version-history":[{"count":0,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/posts\/181678\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/media?parent=181678"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/categories?post=181678"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.euvolution.com\/prometheism-transhumanism-posthumanism\/wp-json\/wp\/v2\/tags?post=181678"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}