Cybercriminals Robbed Other Crooks but Ordinary People Suffered the Most

Extortion viruses create a lot of problems and cost huge amounts of money to both home users and businesses. This is a form of malicious software that encrypts files on a computer or sometimes locks computers. Victims can only restore access to their data or system if they pay a ransom to criminals.

Distributors of extortion viruses have recently suffered from other similar quick-money-lovers who manipulated the system used by the first group of hackers and stole ransom payments provided by virus victims.

For some of us, this may seem like a small problem – crooks robbed other crooks. But this case did not allow ransomware victims to unblock their encrypted files, as distributors of malicious software did not receive their ransom payments. This case is considered the first of its kind.

How did it happen?

Cybercriminals do not trust VPN and use the Tor browser that they believe provides decent online anonymity. While almost all ransom notes instruct victims to download and install the Tor browser, others only provide links to Tor proxies that translate Tor traffic into normal web traffic.

The latter method is very important for hackers who seek to simplify the payment process for their victims as much as possible. For the average victim, it is much easier to follow the link than download an additional program.

Operators of the Tor proxy service called Onion.top at some point realized that their Tor gateway could be used to change the addresses of cryptocurrency wallets. They scanned their service in search of Bitcoin addresses and secretly substituted them with their own addresses.

Security researchers found that victims and operators of several ransomware strains, including notorious GlobeImposter, Sigma, and other suffered from Onion.top manipulations.

Ransomware authors detected the rogue activity of Onion.top and started to instruct their victims to avoid it and use only Tor browser instead.

As noted above, recent victims, such as, for example, the state of Alabama, are the only losers in this scenario. They paid thousands of dollars in Bitcoins, but did not get their files back as distributors of crypto-viruses did not receive their ransoms.

Views: 136

Comment

You need to be a member of 12160 Social Network to add comments!

Join 12160 Social Network

Comment by david james on February 23, 2018 at 5:21pm

  Considering CYBERCRIME is now Job #1 of the NSA, as well as Job #2 for CIA-we can aptly attribute 99% of Cybercrime in the US to them.

Furthermore they are executing 96% of Cybercrimes Worldwide. 

(2/2018)

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

Ray99kibz left a comment for Less Prone
"Thanks I am glad to be here."
1 hour ago
alux junes posted a status
"??"
3 hours ago
Elementisfire left a comment for Less Prone
"Sorry for the long wait"
12 hours ago
Elementisfire and Less Prone are now friends
12 hours ago
tjdavis posted photos
yesterday
tjdavis posted a video

Stink full movie

documentary on dangerous chemical ingredients found in everyday products
yesterday
Douglas Gordon is now a member of 12160 Social Network
yesterday
tjdavis posted a video

Revolution (1968) scenes featuring Today Louise Malone

Some clips from Jack O'Connell's Revolution (1968), featuring the one and only Today Louise Malone.
Friday
cheeki kea replied to cheeki kea's discussion Tartaria
"This screenshot is from a book found by a blogger in his research and gives an eye witnessed…"
Thursday
cheeki kea commented on Doc Vega's blog post To Each and every One of you here Happy Thanksgiving
Thursday
Doc Vega posted blog posts
Wednesday
Doc Vega commented on tjdavis's video
Thumbnail

The Hunt - Official Trailer [HD]

"A former ANTIFA member was interviewed here recently and this would not be far from actual reality…"
Nov 24
Doc Vega posted blog posts
Nov 24
tjdavis posted videos
Nov 24
tjdavis posted a blog post
Nov 24
tjdavis posted a photo
Nov 24
Doc Vega posted a blog post

Legacy of Supposedly Inferior Aircraft Outmatching Their Enemies

 We think of the Korean War aerial combat as the classic dogfights between the American F-86 Sabre…See More
Nov 22
Doc Vega commented on tjdavis's blog post Cities,States Without Limits
"This is just another form of a feudal globalism dictated by corporate technocrats bragging about…"
Nov 22
Doc Vega favorited tjdavis's blog post Cities,States Without Limits
Nov 22
Doc Vega posted a blog post

What is Area 2 and What Goes on There?

 We have all heard of Area 51 and S-4, along with such terms as Water Town, Papoose Lake,…See More
Nov 21

© 2025   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted