Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Some Evil Genius Just Combined the Pyramid Scheme With Ransomware

Some Evil Genius Just Combined the Pyramid Scheme With Ransomware

The ransomware machine keeps moving forward, despite significant opposition. In particular, the ransomware tag-team duo of Petya and Mischa have steamrolled most attempts to block them from accessing critical systems, always finding ways to outsmart security professionals. Now, these ransomwares have adopted a Ransomware as a Service model, which has made significant changes to the way that this ransomware is distributed.

Basically, anyone can take advantage of the Petya/Mischa combo, as long as they pay a simple entry fee to the developers. You can think of it like an affiliates program, where they’re paid a portion of what the ransomware earns. Users are responsible for the spread of the ransomware in order to make a profit.

For bounties less than 5 Bitcoin a week, the affiliate receives a commission of 25 percent. However, large bounties (defined as above 125 Bitcoin), are worth much more--85 percent. Hackers seem to be more concerned with spreading their ransomware than actually making any money, which is a concerning development in and of itself. So far, the ransomware developers have distributed their 125-Bitcoin affiliates a significant $69,880.63, simply for sharing the ransomware with victims who may not have been reachable before.

One other incentive for cybercriminals to adopt the Ransomware as a Service model is that the author of the Petya/Mischa double-threat has released the keys to Chimera, a rival ransomware, online. This allows antivirus developers to focus their efforts on eliminating the older threat, and forces potential criminals to consider newer threats like Petya and Mischa as a more viable option. In other words, Petya and Mischa have been mercilessly eliminating their competition--a Russian specialty.

Thus, the developers of Petya and Mischa have put together perhaps the most devastating storm of ransomware to be seen in recent times. Allowing for the spread of malware through ruthless individuals who want to make a quick buck, the developers have crafted a simple, yet devious method of spreading their malware. This model allows the users and developers to bring in a significant profit, even if it’s throwing a hefty portion at their affiliates.

Now that this gruesome twosome is available as a service, and including the fact that Petya is no longer vulnerable due to weak encryption, it’s more important than ever to ensure that you keep your system and its users safe and aware of all types of threats. The threat of ransomware could come through more than just a misleading email. Just clicking on the wrong link could initiate an unexpected download of a virus or malware, so it’s important to spread best practices around the office. By taking this proactive approach to network security, you can do no wrong.

To ensure that your business doesn’t fall victim to ransomware and other online threats, reach out to Voyage Technology at 800.618.9844.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Monday, 30 March 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Privacy Workplace Tips Google Email Computer Phishing Workplace Strategy Collaboration Hosted Solutions Small Business Backup Users Ransomware Managed Service Mobile Device Productivity Microsoft Passwords Quick Tips Saving Money AI Communication Cybersecurity Data Backup Smartphone Disaster Recovery Data Recovery Android Upgrade VoIP Business Management Smartphones Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Information Automation Artificial Intelligence Facebook Miscellaneous Holiday Compliance Covid-19 Gadgets Cloud Computing Training Server Managed Service Provider Outsourced IT Remote Work IT Support Encryption Spam Employee/Employer Relationship Windows 10 Office Business Continuity Data Management Government Business Technology Bandwidth Windows 10 Blockchain Virtualization Wi-Fi Managed Services Two-factor Authentication Mobile Office Vendor Data Security Apps Voice over Internet Protocol Tip of the week Chrome Mobile Device Management Budget Gmail Apple Networking WiFi App Employer-Employee Relationship BYOD Avoiding Downtime Conferencing Access Control Office 365 Marketing Managed IT Services How To HIPAA BDR Applications Computing Physical Security Hacker Information Technology Health Website Healthcare Analytics Office Tips Augmented Reality Retail Storage Password Bring Your Own Device Big Data Router Operating System 2FA Help Desk Computers Risk Management Virtual Private Network Paperless Office Remote Workers Infrastructure Managed IT Service Telephone Document Management Firewall Cooperation Free Resource Project Management Windows 7 Scam Data loss Microsoft 365 The Internet of Things Solutions Social Going Green Patch Management Save Money Remote Monitoring End of Support Vulnerability Windows 11 Vendor Management Cybercrime Customer Service Monitoring Excel Display Printer Virtual Desktop Data storage LiFi Downloads Outlook iPhone Machine Learning Word Licensing Money Entertainment Humor Vulnerabilities Data Privacy Images 101 Maintenance Sports Antivirus Telephone System Mouse Multi-Factor Authentication Safety Mobility Cost Management Administration Employees Integration Robot User Tip Modem Processor Mobile Security Settings Customer Relationship Management Wireless Printing Holidays Content Filtering IT Management YouTube Meetings Data Storage VPN Smart Technology Supply Chain Hacking Presentation Video Conferencing Cryptocurrency Managed Services Provider Saving Time Virtual Machines Professional Services Computer Repair Wireless Technology Identity IP Address Evernote Paperless Monitors Regulations Compliance Google Wallet Bookmark Smart Tech Memes Co-managed IT Download Net Neutrality Windows 8 Alerts SQL Server Technology Care Laptop Websites Drones History Business Communications Recovery Financial Data Browsers Smartwatch SharePoint Connectivity IT Break Fix Scams Electronic Medical Records Hard Drives Halloween Domains Upload Procurement Azure Hybrid Work Lenovo Cyber security Multi-Factor Security Tech Human Resources Writing Social Network Telework CES IoT Communitications Dark Web Cables Virtual Reality Refrigeration Scary Stories Private Cloud Public Speaking Trends Supply Chain Management Hacks Server Management Customer Resource management FinTech Superfish Regulations Identity Theft Lithium-ion battery Google Calendar Term Google Apps Fun Entrepreneur Data Analysis Star Wars IT Assessment Deep Learning Microsoft Excel IT Maintenance Twitter Staff Value Business Intelligence Error Gamification Flexibility Organization Social Networking Education Legislation Shortcuts Social Engineering Fileless Malware Digital Security Cameras Smart Devices Ransmoware Remote Computing Undo Wearable Technology Memory Vendors Content Remote Working Mobile Computing Health IT Motherboard Data Breach Tablet Comparison Google Play Be Proactive Search Directions Videos Assessment Electronic Health Records Best Practice Permissions Workforce Alert Wasting Time Threats Buisness File Sharing Dark Data Managed IT Legal Trend Micro IT solutions Specifications Security Cameras Workplace Strategies How To Application Microchip Internet Exlporer Software as a Service Business Growth Fraud Meta Notifications Managing Costs Amazon Travel IBM Username Techology eCommerce Google Maps Black Friday SSID Cortana Database Surveillance Alt Codes Virtual Assistant Outsource IT IT Technicians Virtual Machine Environment Downtime Unified Threat Management Media Proxy Server Reviews Unified Threat Management Cookies Hosted Solution Cyber Monday Medical IT Tactics Development Typing Hotspot Transportation Small Businesses Competition Mirgation Hypervisor Displays Network Congestion Shopping Google Drive User Error Nanotechnology Optimization PowerPoint Knowledge Addiction Language Employer/Employee Relationships Outsourcing Chatbots Point of Sale Navigation 5G User Management PCI DSS Gig Economy Google Docs Screen Reader Unified Communications Distributed Denial of Service Workplace Experience Service Level Agreement Internet Service Provider Bitcoin Network Management Computing Infrastructure Teamwork Hiring/Firing Running Cable Tech Support

Blog Archive