Cybercriminals Robbed Other Crooks but Ordinary People Suffered the Most

Extortion viruses create a lot of problems and cost huge amounts of money to both home users and businesses. This is a form of malicious software that encrypts files on a computer or sometimes locks computers. Victims can only restore access to their data or system if they pay a ransom to criminals.

Distributors of extortion viruses have recently suffered from other similar quick-money-lovers who manipulated the system used by the first group of hackers and stole ransom payments provided by virus victims.

For some of us, this may seem like a small problem – crooks robbed other crooks. But this case did not allow ransomware victims to unblock their encrypted files, as distributors of malicious software did not receive their ransom payments. This case is considered the first of its kind.

How did it happen?

Cybercriminals do not trust VPN and use the Tor browser that they believe provides decent online anonymity. While almost all ransom notes instruct victims to download and install the Tor browser, others only provide links to Tor proxies that translate Tor traffic into normal web traffic.

The latter method is very important for hackers who seek to simplify the payment process for their victims as much as possible. For the average victim, it is much easier to follow the link than download an additional program.

Operators of the Tor proxy service called Onion.top at some point realized that their Tor gateway could be used to change the addresses of cryptocurrency wallets. They scanned their service in search of Bitcoin addresses and secretly substituted them with their own addresses.

Security researchers found that victims and operators of several ransomware strains, including notorious GlobeImposter, Sigma, and other suffered from Onion.top manipulations.

Ransomware authors detected the rogue activity of Onion.top and started to instruct their victims to avoid it and use only Tor browser instead.

As noted above, recent victims, such as, for example, the state of Alabama, are the only losers in this scenario. They paid thousands of dollars in Bitcoins, but did not get their files back as distributors of crypto-viruses did not receive their ransoms.

Views: 136

Comment

You need to be a member of 12160 Social Network to add comments!

Join 12160 Social Network

Comment by david james on February 23, 2018 at 5:21pm

  Considering CYBERCRIME is now Job #1 of the NSA, as well as Job #2 for CIA-we can aptly attribute 99% of Cybercrime in the US to them.

Furthermore they are executing 96% of Cybercrimes Worldwide. 

(2/2018)

"Destroying the New World Order"

TOP CONTENT THIS WEEK

THANK YOU FOR SUPPORTING THE SITE!

mobile page

12160.info/m

12160 Administrators

 

Latest Activity

tjdavis posted a video

Dare to Dream/Dare to Build

As we enter the month of Av we intensify our traditional mourning for the Holy Temple, but are we really in touch with what we are mourning for? Are we ready...
yesterday
Gordon Freeman is now a member of 12160 Social Network
Tuesday
Burbia posted a photo
Tuesday
Doc Vega commented on Doc Vega's blog post How Many Clues Did You Need To Figure out the Covid scare was Bogus? Revisiting Stupidity
"The Chinese sent more than 100 thousand visitors to the US after the failure of the Wuhan lab to…"
Monday
Sandy posted photos
Monday
Doc Vega commented on Doc Vega's blog post This is What Pisses Me Off-How About You?
"Burbia! Thank you for the video, yes Texas aint puttin up with this shit! "
Sunday
Burbia commented on Doc Vega's blog post This is What Pisses Me Off-How About You?
"This is encouraging."
Saturday
Burbia commented on Doc Vega's blog post How Many Clues Did You Need To Figure out the Covid scare was Bogus? Revisiting Stupidity
"There was no trail of death from the first case in the US landing in Seattle and brought north of…"
Saturday
Doc Vega posted blog posts
Saturday
Sandy posted photos
Saturday
Sandy posted videos
Mar 27
Sandy commented on Sandy's photo
Thumbnail

Screenshot_20260327-101250~2

"One data center uses 45 megawatts per day. How is this sustainable?"
Mar 27
tjdavis posted a video

[OFFICIAL TRAILER] The Grand Deception

Enjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube.
Mar 27
Doc Vega posted a blog post
Mar 26
Роман posted a blog post

Архітектурне планування двоповерхового будинку: ключові рішення для комфортного простору

Проєктування двоповерхового будинку — це складний, але захоплюючий процес, що поєднує…See More
Mar 26
Sandy posted videos
Mar 25
Doc Vega's 5 blog posts were featured
Mar 25
tjdavis's blog post was featured
Mar 25
cheeki kea's blog post was featured
Mar 25
Less Prone favorited Sandy's photo
Mar 25

© 2026   Created by truth.   Powered by

Badges  |  Report an Issue  |  Terms of Service

content and site copyright 12160.info 2007-2019 - all rights reserved. unless otherwise noted