A Good Inside Look At How Ransomware Operators Work


The Arts Mechanical

This is a post series on cyber crime. For more posts click here or the cybercrime tag below.

Francis Turner has some good stuff about how ransomware operators work here.

This post on Krebs sort of puts numbers to the equation.

http://krebsonsecurity.com/2012/08/inside-a-reveton-ransomware-operation/

Apparently the same people who created the CryptXXX variant of malware started with reveton.

So the operational level setup is pretty much the same. What’s changed is the software they spread.  Which they did not develop themselves.  As I point out in this post.

https://theartsmechanical.wordpress.com/2016/06/26/looking-inside-the-hood-of-malware/

In a way, being in the malware business is a red queen’s race.  You keep having to change to keep up.  After all, there are a raft of security companies keeping an eye out for your “product” and shutting the product down ASAP.  For every exploit that a malware uses the time for a return on investment is low.  the typical exploit has about…

View original post 393 more words

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s