Cybercriminals Robbed Other Crooks but Ordinary People Suffered the Most

Extortion viruses create a lot of problems and cost huge amounts of money to both home users and businesses. This is a form of malicious software that encrypts files on a computer or sometimes locks computers. Victims can only restore access to their data or system if they pay a ransom to criminals.

Distributors of extortion viruses have recently suffered from other similar quick-money-lovers who manipulated the system used by the first group of hackers and stole ransom payments provided by virus victims.

For some of us, this may seem like a small problem – crooks robbed other crooks. But this case did not allow ransomware victims to unblock their encrypted files, as distributors of malicious software did not receive their ransom payments. This case is considered the first of its kind.

How did it happen?

Cybercriminals do not trust VPN and use the Tor browser that they believe provides decent online anonymity. While almost all ransom notes instruct victims to download and install the Tor browser, others only provide links to Tor proxies that translate Tor traffic into normal web traffic.

The latter method is very important for hackers who seek to simplify the payment process for their victims as much as possible. For the average victim, it is much easier to follow the link than download an additional program.

Operators of the Tor proxy service called Onion.top at some point realized that their Tor gateway could be used to change the addresses of cryptocurrency wallets. They scanned their service in search of Bitcoin addresses and secretly substituted them with their own addresses.

Security researchers found that victims and operators of several ransomware strains, including notorious GlobeImposter, Sigma, and other suffered from Onion.top manipulations.

Ransomware authors detected the rogue activity of Onion.top and started to instruct their victims to avoid it and use only Tor browser instead.

As noted above, recent victims, such as, for example, the state of Alabama, are the only losers in this scenario. They paid thousands of dollars in Bitcoins, but did not get their files back as distributors of crypto-viruses did not receive their ransoms.

Views: 136

Comment

You need to be a member of 12160 Social Network to add comments!

Join 12160 Social Network

Comment by david james on February 23, 2018 at 5:21pm

  Considering CYBERCRIME is now Job #1 of the NSA, as well as Job #2 for CIA-we can aptly attribute 99% of Cybercrime in the US to them.

Furthermore they are executing 96% of Cybercrimes Worldwide. 

(2/2018)

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

Less Prone left a comment for Tammy
"Welcome"
2 hours ago
tjdavis posted a video

Mike Benz: DARPA & USAID are Weaponizing Music to Control Human Behavior

Watch every episode ad-free & uncensored on Patreon: https://patreon.com/dannyjonesMike Benz is a former State Department official and current Executive Dire...
13 hours ago
Tammy is now a member of 12160 Social Network
yesterday
Less Prone commented on cheeki kea's photo
Thumbnail

The Cartel

"In his 1995 book; Bloodlines of the illuminati, Frits Sringmaier listed the following 13…"
yesterday
tjdavis posted a photo
yesterday
tjdavis posted a blog post
Tuesday
Less Prone commented on Doc Vega's blog post What Four UFO Whistle Blowers All Suffered in Common?
"This falls in the category of political assassination, a very shameful policy of eliminating people…"
Tuesday
Doc Vega posted blog posts
Tuesday
Doc Vega commented on Doc Vega's blog post The Forest Devil
"cheeki kea Thank you, just one thing. The Choctaw Indian who came to the rescue was a war veteran…"
Monday
cheeki kea commented on Doc Vega's blog post The Forest Devil
"Well that is one fine story you've got going there Doc V. with a very interesting roll up. I…"
Monday
Doc Vega commented on Doc Vega's blog post “Night of Horror” Finland WWII 1939 and a Russian Massacre
"Just another bizarre chapter in WWII that seems more suspect as paranormal."
Sunday
Doc Vega's 7 blog posts were featured
Sunday
Burbia's blog post was featured

Former President Trump?

When was this article written? It is attributed to Victor Davis Hanson. He is a Fellow at Hoover…See More
Sunday
Less Prone commented on Burbia's blog post Former President Trump?
"It must be an unintended mistake "former". But that Trump demanded to keep Khan away is a…"
Sunday
Less Prone favorited Doc Vega's blog post The Mistake We Made in America
Sunday
Less Prone favorited Doc Vega's blog post “Night of Horror” Finland WWII 1939 and a Russian Massacre
Sunday
Less Prone commented on Doc Vega's blog post “Night of Horror” Finland WWII 1939 and a Russian Massacre
"Quite an uplifting story of the winter war. Finland was overpowered by ten to one and could still…"
Sunday
Doc Vega posted a blog post

Elon Weighs in on Charlie Kirk's Assassination and How it is an Instrument of Social Control

For a very long time now there has been in place mass population behavioral control operations that…See More
Saturday
Doc Vega commented on Doc Vega's blog post The Forest Devil
"Less Prone Thanks Buddy I worked on it for 3 days! "
Friday
Less Prone favorited Doc Vega's blog post The Forest Devil
Friday

© 2025   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted