Cybercriminals Robbed Other Crooks but Ordinary People Suffered the Most

Extortion viruses create a lot of problems and cost huge amounts of money to both home users and businesses. This is a form of malicious software that encrypts files on a computer or sometimes locks computers. Victims can only restore access to their data or system if they pay a ransom to criminals.

Distributors of extortion viruses have recently suffered from other similar quick-money-lovers who manipulated the system used by the first group of hackers and stole ransom payments provided by virus victims.

For some of us, this may seem like a small problem – crooks robbed other crooks. But this case did not allow ransomware victims to unblock their encrypted files, as distributors of malicious software did not receive their ransom payments. This case is considered the first of its kind.

How did it happen?

Cybercriminals do not trust VPN and use the Tor browser that they believe provides decent online anonymity. While almost all ransom notes instruct victims to download and install the Tor browser, others only provide links to Tor proxies that translate Tor traffic into normal web traffic.

The latter method is very important for hackers who seek to simplify the payment process for their victims as much as possible. For the average victim, it is much easier to follow the link than download an additional program.

Operators of the Tor proxy service called Onion.top at some point realized that their Tor gateway could be used to change the addresses of cryptocurrency wallets. They scanned their service in search of Bitcoin addresses and secretly substituted them with their own addresses.

Security researchers found that victims and operators of several ransomware strains, including notorious GlobeImposter, Sigma, and other suffered from Onion.top manipulations.

Ransomware authors detected the rogue activity of Onion.top and started to instruct their victims to avoid it and use only Tor browser instead.

As noted above, recent victims, such as, for example, the state of Alabama, are the only losers in this scenario. They paid thousands of dollars in Bitcoins, but did not get their files back as distributors of crypto-viruses did not receive their ransoms.

Views: 136

Comment

You need to be a member of 12160 Social Network to add comments!

Join 12160 Social Network

Comment by david james on February 23, 2018 at 5:21pm

  Considering CYBERCRIME is now Job #1 of the NSA, as well as Job #2 for CIA-we can aptly attribute 99% of Cybercrime in the US to them.

Furthermore they are executing 96% of Cybercrimes Worldwide. 

(2/2018)

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

Doc Vega posted blog posts
56 minutes ago
kacang99 commented on tjdavis's photo
Thumbnail

The Name Game

"very nice, main di kacang99 demo situs slot kasih akun demo gratis"
3 hours ago
Doc Vega commented on Doc Vega's blog post Plausible Explanation Behind Recent Cryptid Sightings in the Wild!
"cheeki kea I was wrong Emperor Penguins are big and powerful but still alive but this,  A size…"
3 hours ago
Doc Vega commented on Doc Vega's blog post Plausible Explanation Behind Recent Cryptid Sightings in the Wild!
"Cheeki kea here's another that they say there have been modern sightings of!  The name of…"
3 hours ago
Doc Vega commented on Doc Vega's blog post Plausible Explanation Behind Recent Cryptid Sightings in the Wild!
"cheeki kea, did you ever hear of the giant Imperial Penguins? They were about 6 feet tall and could…"
4 hours ago
Doc Vega commented on Doc Vega's blog post Plausible Explanation Behind Recent Cryptid Sightings in the Wild!
"cheeki kea I do not think these giant two legged birds would need to have a bad attitude as long as…"
4 hours ago
Olivia Brooks updated their profile
10 hours ago
kacang99 updated their profile
11 hours ago
John Miller was featured
12 hours ago
tjdavis's 2 blog posts were featured
12 hours ago
Zfort Group's blog post was featured
12 hours ago
Doc Vega's 6 blog posts were featured
12 hours ago
Burbia commented on tjdavis's video
Thumbnail

“What’s His Motive?” - Inside The Mind of George Soros

"Trump calls for George Soros and son to face federal…"
18 hours ago
Burbia commented on tjdavis's photo
18 hours ago
Profile Iconkacang99, Seeta Sathe and Olivia Brooks joined 12160 Social Network
18 hours ago
tjdavis posted a video

Mossad, Terrifying CIA Technology, Blackwater & The Most Secret CIA Unit | John Kiriakou

John Kiriakou served 15 years in the CIA as a Case Officer (Spy) and as CIA's Head of Counterterrorism Operations in Pakistan where he lead the raid that cap...
yesterday
tjdavis posted a photo
yesterday
tjdavis posted a video

A Critique of the Tavistock Institute - The Mother Of All Conspiracy Theories

An examination of the Tavistock Institute, a theory which seeks to explain how Western societies have been brainwashed by a cabal of social scientists and th...
Sunday
tjdavis posted a video

“What’s His Motive?” - Inside The Mind of George Soros

In this short clip, Patrick Bet-David, Sebastian Gorka Adam Sosnick, and Tom Ellsworth George Soros and what motivates him to do the things he does. FaceTime...
Thursday
Doc Vega posted blog posts
Aug 27

© 2025   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted