WanaDecrypt0r Ransomware Earns Just $26,000 In Ransom Payments (krebsonsecurity.com) 222
An anonymous reader quotes Krebs On Security:
As thousands of organizations work to contain and clean up the mess from this week's devastating Wana ransomware attack, the fraudsters responsible for releasing the digital contagion are no doubt counting their earnings and congratulating themselves on a job well done. But according to a review of the Bitcoin addresses hard-coded into Wana, it appears the perpetrators of what's being called the worst ransomware outbreak ever have made little more than USD $26,000 so far from the scam...
It's worth noting that the ransom note Wana popped up on victim screens (see screenshot above) included a "Contact Us" feature that may have been used by some victims to communicate directly with the fraudsters... I find it depressing to think of the massive financial damage likely wrought by this ransom campaign in exchange for such a comparatively small reward.
It's worth noting that the ransom note Wana popped up on victim screens (see screenshot above) included a "Contact Us" feature that may have been used by some victims to communicate directly with the fraudsters... I find it depressing to think of the massive financial damage likely wrought by this ransom campaign in exchange for such a comparatively small reward.
Good. (Score:2)
Hopefully if it becomes the norm that people don't make any money from these things, it won't be worth the effort to do....
Re: Good. (Score:5, Insightful)
Has that stopped bank robbers?
Criminals are not known for having the world's best impulse control or understanding of expected itchiness.
Re: (Score:2)
Its not the average thief putting something together like this.... What this has proven is that the reward for getting on the WANTED list on just about every country in the world is somewhat small.
Re: Good. (Score:5, Insightful)
Bank robbers are not in it to make a load of money unless they are planning to break the vault. Normally they are just trying to get some cash to pay for drugs or a loan shark.
But compared to deploying a wide scale attack, a normal bank robbery doesn't require a lot of planning, unlike the a technical attack where there is days of planning.
Re: (Score:2)
Re: (Score:2)
At the lower end you have the guys who hit ATMs, which have been protected to the point where the criminals use heavy explosives to get at the safe.
Which is why here they prefer to stick a gun in your face and get you to withdraw as much cash as you can from the ATM. Rinse/repeat.
Re: (Score:2)
Re: (Score:2)
Which is why here they prefer to stick a gun in your face and get you to withdraw as much cash as you can from the ATM. Rinse/repeat.
So basically you're saying there should be a limit on ATM withdrawal amounts?
Yeah. If you need loads of cash go into the branch.
Re: (Score:2)
Bank robbers are the most stupid of the stupid, because everyone at least a little bit smart knows that a) they get little money out of it and b) basically all get caught.
So yes, for most practical purposes it has eliminated the threat from bank-robbers. They are a nuisance today at best and all of them are morons.
I would also like to point out that bank robbers never ever did anywhere near the damage that these people just did.
Re: (Score:2)
I agree. Being that there are so many randomware attacts which even after you pay you don't get your data back. It really doesn't make any sence to pay it. And either you restore or just consider your data loss.
The problem with criminal money making, is that there will be someone willing to mess up your "business plan" with no legal recourse. What is this guy going to do sue the malware makers who don't decrypt people's data after paying for it?
Re: (Score:2)
Hopefully if it becomes the norm that people don't make any money from these things, it won't be worth the effort to do....
I highly doubt it. Sadly, people do this kind of malicious shit just for the fun of it.
Before the concept of anonymous e-cash and ransomware came along, they often did.
Re: (Score:2)
Re: (Score:2)
It appears these guys (Is that sexist?) have mispriced their product. They have several options:
1. Increase their rates in hopes of generating more revenue from the same number of clients
2. Decrease their rates in hopes of generating more revenue from many more clients
3. Increase the number of computers they infect (i.e. broaden their customer base)
4. Improve their targeting in order to do a better job of reaching clients who will pay up.
They clearly need help from Ivy League MBAs
Re: Good. (Score:2)
Who said they had to convert it to cash?
Re: (Score:2)
Yes, in the last month or so Bitcoin has plunged from $1200 all the way... up to $1800 and higher. It's only worth just over 10 times last year's low point. The end is nigh!
Here's a hypothetical: Imagine some governments think about the role of bitcoin and decide that it is mostly used to aid in criminal activities, and there is no need to use bitcoin for anything non-criminal. And they decide that exchanging bitcoin for money or the other way round is now criminal and gets you jail time.
There is no reason why a government couldn't do that. With the British NHS under attack on the weekend, very few people in the UK would complain if that was made a law. So what happens to t
Re: (Score:3)
In most cases the financial damage is too small to expend the resources. When the attack is in one jurisdiction, like Europe, with suspected perpetrators out of Russia and Iran, and the BTC account then has funds transferred to Kazakhstan banks and Philippine casinos...
Just think of the work needed to get all those jurisdictions to cooperate, much less allocate resources, etc. Assuming the cooperate at all.
Add to that funds can be transferred and withdrawn in literally minutes, and you have a real problem.
T
Re: (Score:2)
Re: (Score:2)
Income $26K, cost to scammer ... probably not a lot, maybe a $few K. Cost to those scammed: huge, potentially millions and maybe a few lives lost or harmed — it hit quite a few hospitals; not that the scammers really care what it cost other people.
What is surprising is that something like this has not happened before now.... and when, oh when, are people going to stop using MS Windows for mission critical systems?
Re:What was the ROI? (Score:5, Insightful)
Cost to those scammed: huge, potentially millions and maybe a few lives lost or harmed â" it hit quite a few hospitals; not that the scammers really care what it cost other people.
There are also some benefits to society, like boosting emergency preparedness. This has clearly shown how NHS in particular are overly dependent on computer systems, to a point that hospitals can't operate when systems go down. How would they be able to handle a real emergency, like a war?
Nobody knew, or those who did didn't say anything. Now everybody knows, and there's a chance of vulnerabilities being scrutinized and contingency plans made and tested.
Re: (Score:2)
Re: (Score:2)
It might damage the Tories, which I'd consider a public service.
The Tories will just blame it on Labour for not spending enough money on the NHS's IT systems while they were in power, and leaving them a coalition of computer chaos which only they can put right through strong and stable leadership and low taxes.
Re: (Score:2)
these awful cutbacks
The ones that include continually rising NHS spending, even in real terms?
https://www.kingsfund.org.uk/p... [kingsfund.org.uk]
Comparably up in Scotland where I am, the NHS isn't even nearly as bad.
Strange, a political party in Scotland thinks the English NHS is better.
http://labourhame.com/a-long-h... [labourhame.com]
I honestly believe if I had been born in England, I wouldn't be typing this, or anything, because of sudden death from a trivial infection.
You're a fuckwit then. Come to England, be amazed how you can still stay alive.
died from a trivial throat infection when being treated for cancer
Person with cancer dies, news at 11.
That's a tax I would happily pay for! I think most of England would agree.
Most of England would love Scotland to fucking pay its taxes and stop leaching off taxpayers south of the border. You go for it.
Re: (Score:2)
these awful cutbacks
The ones that include continually rising NHS spending, even in real terms? https://www.kingsfund.org.uk/p... [kingsfund.org.uk]
Is that why wards, services and even hospitals are being cut to ribbons all over?
These are the 19 hospitals, including five major acute hospitals, that are marked for closure as the NHS faces its biggest shake up in a generation to plug a £22bn black hole in funding, according to an investigation by i.
:: South West London – one of five sites proposed to close – St Helier, St George’s, Epsom, Croydon, Kingston
:: Alston, Cumbria ** :: Westhaven, Dorset
Acute hospitals closing or at risk of closure:
:: North West London – future of Ealing Hospital in doubt
:: Leicestershire – one of three acute hospital sites proposed to close
:: Black Country – merger of two general hospitals to a single site
:: Dorset – merger of Royal Bournemouth and Poole Hospital Community hospitals facing closure or redesignation:
:: Maryport, Cumbria **
:: Wigton, Cumbria **
:: Hinkley and District Hospital, Leicestershire
:: Rutland Memorial Hospital, Leicestershire
:: Bolsover Local Hospital, Derbyshire
:: Newholme Hospital, Derbyshire
:: St Leonards, Dorset
:: Alderney, Dorset
:: Ashburton, Devon *
:: Bovey Tracey, Devon *
:: Dartmouth, Devon *
:: Paignton, Devon *
(* To be replaced by health and well-being centres) (** Closure of all beds under consideration)
Read more at: https://inews.co.uk/essentials... [inews.co.uk]
And that's just the tip of it. The fact is the tories want it privatised, like they want everything privatised. They are dealing death by 1000 cuts (quite literally this time) by degrading services slowly and often enough that pretty soon health insurance will look like a good idea, then more and more people will get it to cover the short fall of the nhs, pretty soon gov can mandate everyone needs it to access nhs then the nhs
Re: (Score:2)
Yeah, something's going wrong with the budget. I lack the inputs to properly understand what; it's not going to be as straightforward as simple mismanagement, but it's not due to reduced funding.
You only need to look at brexit, one of the big claims was the £350m a week for the nhs
Who made that claim? Please quote someone representing one of the Leave campaigns because I can't find it anywhere. Just a shitload of fake news from across the media pushing the remain agenda.
The fact is the tories want it privatised, like they want everything privatised.
I recall Labour introducing the private finance initiatives that started NHS privatisation.
If you want to vote tory fine
Fuck no, I'm not voting for fasci
Re: (Score:2)
Re: (Score:2)
fuck off, they were all saying it
Then why is nobody able to source a quote?
did you see the goddam bus they were driving around in?
The one that didn't say what you're saying was said?
You do realise this government has borrowed more than every previous labour gov combined.
I do. Would you rather we cut the armed forces budget, the NHS budget, the education budget or local council funding to zero to better square the books?
Re: (Score:2)
http://www.independent.co.uk/n... [independent.co.uk]
What did the bus say then?
https://www.google.co.uk/searc... [google.co.uk]
I would rather they cut corporate welfare. I would rather they didn't spend boat loads subsidising supposedly private companies. I would rather they didn't spend billions on trident. I would rather a lot of things really.
As you bring up the Army though did you catch Fallon straight up lying on TV the other day when denying they had broken their manifesto pledge of not cutt
Re: (Score:2)
http://www.gettyimages.co.uk/e... [gettyimages.co.uk]
You can deny it some more though if you'd like.
Re: (Score:2)
Video of Farage giving the line.
No. Video of Farage saying £10bn/year should be spent in the UK.
Shit, he even mentioned schools explicitly. Remind me which part of the NHS budget pays for schools?
What did the bus say then?
Lets fund our NHS instead. It didn't say, "Lets put £350m/week extra into the NHS" no matter how much you want it to. Remain voters appear to suffer from poor reading comprehension.
As you bring up the Army though did you catch Fallon straight up lying on TV
Nope, missed that. I don't watch much TV. I am very aware of the challenges facing the armed forces though, yes.
Why is it seem you think Armed Forces, Education and NHS should be cut to ribbons just to square the books?
What are you asking me for? You
Re: (Score:2)
Re: (Score:2)
"when, oh when, are people going to stop using MS Windows for mission critical systems?"
As soon as companies decide they need more than click and drool bodies doing their compute infrastructure. In a word, never. The problem is that the sort of person who can make the correct hiring decisions has been hired by people who have the least understanding of what it takes to secure systems, so they hire someone just like them who in turn hires the least expensive "talent", thus being able to report back that he's
Re: (Score:2)
"What is surprising is that something like this has not happened before now.... and when, oh when, are people going to stop using MS Windows for mission critical systems?"
Not any time soon. Think for a while about the actual costs of moving a business, school, or government department off Windows. Acquiring new software, Developing new procedures. Training people. Rewriting the CFO's Excel spreadsheets and macros to work on something other than MS Office, etc.etc.etc.
Yes, Windows has evolved into a fair
Re: (Score:2)
The tech consultants on the UK newschannels say that it is possible to buy randomware kits off the black market.
https://nakedsecurity.sophos.c... [sophos.com]
Given that shareware file system explorers and encryption routines are standard library functions, and it's easy enough to create a webpage with paypal and bitcoin pay buttons, just tacking on some network system exploits will allow the implementation of instant randomware.
Re: (Score:2)
WTF is randomware?
It's like when you say Pron or Frist psot in order to avoid bot scrutiny.
Re: (Score:2)
WTF is randomware?
You know, all those weekly updates to Adobe Reader and Flash.
Re: (Score:2)
Not really. You can make this little money with conventional fraud in a few months at most, with nowhere near the risk of getting caught.
Re:What was the ROI? (Score:5, Insightful)
There is the cost of getting caught. A multi-national attack hugging big organization will have a lot of people out for blood. Just hitting one or two areas you may get some jail time, but if this guy gets caught he is in serious trouble.
Too many people with nothing to lose (Score:4, Insightful)
I know, I know, I'm politicizing. But the thing is like it or not politics affects everything we do. It's scary how far it's embedded in our lives and nobody likes to acknowledge it...
Re: (Score:2)
Not to mention that $26k, in many parts of the world, is a king's ransom.
So they should have kidnapped multiple kings instead, then.
I normally like Krebs, but... (Score:5, Insightful)
"However, I find it depressing to think of the massive financial damage likely wrought by this ransom campaign in exchange for such a comparatively small reward. "
This is the most idiotic statement I've ever seen him make. It is a good thing if there was little reward, and his implication that he is disappointed that they didn't get more is just mind boggling.
Re:I normally like Krebs, but... (Score:4, Insightful)
Re:I normally like Krebs, but... (Score:5, Insightful)
Agreed.
I think Krebs means "if they're willing to cause this much grief for so little return, we don't have much hope of economics ever stopping these attacks".
The ROI on this is probably insignificantly low, so we're stuck with this sort of shit.
Re: (Score:2)
I don't think you are using the term "ROI" correctly.
Setting up the whole ransomware attack could have been set up with a few hours work. $26K for a few hours work is a pretty good ROI, especially if you are not in a first-world country.
The issue is the damage caused to make $26k, but perhaps the ransomer doesn't care about that. It's an externalized cost.
Re: (Score:2)
Yes, and at the same time, it could hardly have been worse.
That would be the honest thing to write after a weekend movie binge including The Wolf of Wall Street, Fear and Loathing in Las Vegas, Brewster's Millions, 21, The Starbucks scene in Austin Powers, and t
Re: (Score:3)
Re: (Score:2)
You see examples of this all the time. Perpetrators cause thousands of dollars in damage to a vehicle to steal tens of dollars worth of loot. Air conditioning equipment worth thousands is rendered worthless for a few dollars in scrap copper.
You might say the give-a-shitter is broken in these folks.
Re: (Score:2)
This is the most idiotic statement I've ever seen him make. It is a good thing if there was little reward, and his implication that he is disappointed that they didn't get more is just mind boggling.
I agree completely! I mean, with such an awful payment interface they shouldn't be rewarded! What they should have done is made a nice form where people can type in their credit card number which then purchases and sends the bitcoin where it's needed without any additional user interaction. I'm just say, streamlined ransomware interfaces are what we really need. ;)
Re: (Score:2)
Indeed. Even amateur criminals stop high-risk crime if it turns out to not pay. Professional criminals would never do such a thing in the first place. Far too high profile, far too high damage and hence far too high change to piss off some people that can actually do something about it.
Re: (Score:3)
This is the most idiotic statement I've ever seen him make. It is a good thing if there was little reward, and his implication that he is disappointed that they didn't get more is just mind boggling.
Your brain doesn't seem to work right. What Krebs dislikes is someone creating tremendous damage for very little gain. What would you prefer: Some pickpocket pulling $20 from your wallet, or some idiot smashing your car windows to steal $20 from the glove compartment, then setting the car on fire to destroy any fingerprints?
Re: (Score:2)
Bullshit. I'm sure he just chose the wrong words but what he wrote was akin to 'The bankrobbers killed several people and I'm depressed that they did that but didn't get away with a ton of money in the process.' Look to your own brain.
Read it again and think (Score:2)
I think your shoot the messenger attitude is from not considering the context.
Rewarding bad behavior (Score:5, Insightful)
This is why we should ever pay ransomware.
1) There is a big chance they are not going to unlock your data, anyway.
2) You don't know if they have also stolen all the data and can then do other things to harm you in other ways. Or left residuals in your computer.
3) By paying, you are a "mark" so they might go after you again.
4) Paying absolutely encourages them to continue this behavior and incentivizes others to joint them.
We need to educate everyone: Backup your data redundantly and check it regularly, and don't pay ransomware.
Re: (Score:2)
Then find them and smash the goddamn heads in with a baseball hat live on YouTube, just to make sure.
Re: (Score:2)
Yep, all we need to do is ask the perps whether they did it. Then we can pop them if they say yes. They'll be real forthcoming when they see the baseball bats.
Re: (Score:2)
1) There is a big chance they are not going to unlock your data, anyway.
"They" aren't going to unlock your data. You are. But with their pricing, they will almost certainly tell you how. If they don't, their revenue stream will become nonexistent once the word gets out that paying doesn't get the data back.
Re: (Score:2)
"Sorry we didn't receive your payment, could you try again?"
Re: (Score:2)
Scammers work on the assumption that "there's a sucker born every minute".
Word gets out, but then they just move onto someone that hasn't listened to the word or thinks "others got stung but I'll be ok".
Re: (Score:2)
Actually, I think this is one problem which does have a (partial) technical solution. Right now files on computer storage are treated as unique discrete objects with a single state. We're unnecessarily treating a virtual object as if it were a physical object. Newer filesystems have the ability to retain the previous states of a file (snapshots). NTFS has it [wikipedia.org], but it has to be turned on manually. I
A bit odd calling NTFS "modern" (Score:2)
ZFS is a much better and more user friendly example in the way it handles snapshots.
Re: (Score:2)
Re: (Score:2)
Wrong. You should always pay the ransom. It should be a law to do so.
Okay, now tell us how much you hate space since that time you caught Jack Parsons in flagrante with your ex-wife.
Re: (Score:2)
>"This ransomware here will encrypt attached devices - such as external usb drives - and any network share you may have access to. So even if you have backups, you can still get burned."
That's not a real backup. That is just a online copy. A real backup is made to a device which is then stored separate from the computer. It protects from malware, from theft, fire, disaster, etc.
The *RIGHT WAY* to back up data (Score:2)
> This ransomware here will encrypt attached devices - such as
> external usb drives - and any network share you may have access to.
>
> So even if you have backups, you can still get burned.
That's *NOT* how to backup. Three principles of successful backups...
1) Do *NOT* let the PC have write access to the backup system. Do not trust it to not f*** up external backups. Instead have the desktop PC share out directories (read-only access) so they can be copied by an external machine running linux/bsd
$26k seems like a good ROI (Score:5, Insightful)
Until you factor in trying to hide from the FBI/Interpol for the rest of your life. Are you sure those transactions are completely untraceable? Yeah, sure, keep telling your self that. Sleep well...
Re:$26k seems like a good ROI (Score:5, Informative)
Re: (Score:2)
BTC transactions are utterly and completely traceable, that's kind of the point. They are anonymous, though. So what these criminals will do is pay some poor sap to set up a BTC wallet, send the bitcoins to him, let him convert them to currency on his bank account, after which the criminals will simply withdraw the money from an ATM using his card. As long as you have no relationship to the middleman and if he keeps his mouth shut (or better yet: has no clue as to who you are), you're safe. Criminals use this method all the time.
One challenge may be the volume of cash being transferred. For small amounts over time a few accounts might suffice; but for tens of thousands of dollars over a short period limits on ATM withdrawals limit access to cash and either require more time or a lot of accounts; either of which increases the chances of getting caught or in the former of the funds being cutoff before you can get the bulk of them. Alternatively you could leave them as Bitcoin and dole them out over time; but I can see where at some p
Re: (Score:3)
Until you factor in trying to hide from the FBI/Interpol for the rest of your life. Are you sure those transactions are completely untraceable? Yeah, sure, keep telling your self that. Sleep well...
Not only that, but they've pissed off a number of countries as well; some of whom may not worry as much about some of the niceties of the law.
In addition, the use of Bitcoin as payment will no doubt result in increased pressure on exchanges to make both parties of a transaction identifiable so that the recipients of ransom payments can be identified and apprehended and payments stopped; so even if they are mules the source of cash is cutoff. At some point exchanges depend on the banking system to convert Bi
Fuck the money, what about the DEATHS? (Score:5, Insightful)
Re: (Score:2)
This is a prime example of our over-reliance on technology. For years, since I was a teen in the '80s, I always asked 'what happens if this stuff fails.' I recall events with the phone company, where the land lines wend down for almost 20 hours, due to a failure that cascaded down their redundancy plans. I remember the $#i7storm that arose out of that, both civil and political (this was a gov't crown corporation In Canada).
We see difficulties when the power goes out in retail stores, that staff is unable to
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
And how is data entry into an electronic system not subject to the same errors that a paper system would be subject to? Yes, electronic systems have the ability to do certain checks that have been established to a set of rules, but paper would not inherently create more errors.
I'll bite on the generation gap comment.....We have and old saying, "Don't put all your eggs in one basket" - there is nothing wrong with a hybrid system (as mentioned below in another comment) that would provide critical access to re
Re: (Score:2, Insightful)
I don't agree with this.
My guess is why they get caught with this sort of thing so often is their systems are probably frequently using outdated operating systems where they simply can't get patches any more as they're no longer supported. When a piece of equipment costs a million to buy, you're going to use it as long as possible. And when you bought it in 2005 when Windows XP was the latest and greatest, and the manufacturer never released a version of their software for new versions (maybe they went ou
Re: (Score:2)
And if you think they should be held responsible for not having good IT, well, assuming you're specialty is IT, should you be held responsible for your inability to provide quality medical care?
I was with you right up until your second paragraph which, to be kind, is utter Phonus Bolognus.
Healthcare providers who own and use specialised equipment *absolutely* are responsible for its care and maintenance. If they can't maintain the equipment themselves then they pay someone else to do it for them.
Frankly,
Re: (Score:2)
Re: (Score:2)
What? (Score:2)
I find it depressing to think of the massive financial damage likely wrought by this ransom campaign in exchange for such a comparatively small reward
Yeah, as clever as they were they deserved more money?!
Just think, because it made so little money, this may be the last time we see such a wide scale attack, how sad... /sarcasm
Re: (Score:2)
It's not the best wording, but Krebs is clearly bemoaning the relative levels of collateral damage here, not the relatively meagre payoff for the perpetrators.
Where are those vaunted spy agencies on this? (Score:2)
"Contact Us" feature that may have been used by some victims to communicate directly with the fraudsters...
So the agencies that supposedly can backdoor any electronics and trace all movements of data can't penetrate thise fragile Bitcoin exchanges or trace phone calls to the perps?
Re: (Score:2)
Re: (Score:2)
I'm assuming the "Contact Us" feature goes over Tor, so you can already forget any CSI-style phonetapping or IP tracing.
The FBI could probably try to infect the perps with some 0-day malware to uncover their real identities but I'm guessing the elect not to try it because the chances of them actually falling for a cheap trick like that is miniscule compared to them grabbing the malware, reverse engineering it, then using it to infect more people.
Seems people are getting a bit smarter (Score:3)
The good thing here is that people have apparently gotten the message to not ever pay these people. Given that they will be completely destroyed if ever caught and that there is a lot of incentive to catch them, I hope this problem will just vanish over time.
Re: (Score:2)
Re: (Score:2)
Probably not. Nor do I think they will ever, because unless these criminals are utterly dumb, they will stay away from those BC wallets and any communication with victims like the plague. The global reaction and "success" of their campaign is just too much, they are now targets themselves.
50 Years later we'll learn the NSA was behind this (Score:5, Interesting)
Re: (Score:2)
I hate to extinguish your fantasy but script-kiddie shit is invariably shit so it's quite likely that the first person with a clue to take a really good look at the malware could find a hole.
If your fantasy was correct somebody "connected" would be the one tipped off to claim the glory.
I think it's been invaluable (Score:2)
It shows the bean counters the cost of not keeping systems up to date.
Copper thieves (Score:2)
Re: (Score:2)
I think you've described at least 20% of the population. Half of those will be stealing your copper, the other half will be stealing your pension.
tracking bitcoins (Score:2)
Re: (Score:2)
The real question is... (Score:5, Insightful)
The real question is why isn't the NSA getting its feet nailed to the floor for this? They discovered (or engineered) a critical weakness in a major operating system, and rather than report it to make sure we are actually safe from this threat, they used it to make malicious software which then got released into the wild and is being used against the world.
This is the largest breach of trust of any US government agency that I know of, and yet people are just ignoring that aspect of it.
Re: (Score:2)
Yeah, those nice Russians and Chinese would never think to do such a thing as those naughty NSA Guys.
Re: (Score:2)
All the more reason to make sure that the flaw is patched instead of weaponizing it with the naive idea that nobody else will discover it.
Re: (Score:2)
This issue was patched in the march security rollup. If you don't apply patches within 2 months, I can't help you.
See also why xp needs to be gone.
That would be the Windows XP that Microsoft released a patch for, right?
Re: (Score:3)
the ransom was around 300$ and more than 75000 computers infected.. ... That's a total fiasco lol,
That's mean less than 0.1% paid for description
Not if this was hacked up by someone without a job or on spare time, using existing resources. Any non-zero profit would then be a win.
Re: (Score:2)
Re: (Score:2)
Criminal enterprises of some sophistication that have been around for a while want one thing most: To stay in the shadows and quietly do their thing. It is good criminal practice to stay under the radar by being not more than an annoyance. This attack has none of the characteristics attractive to such an enterprise or rational single criminals. When the evil scum that did this (definition of evil used: accept huge damage to somebody else for a moderate personal gain) get caught, we will see this is one or a
Re: (Score:2)
A rough estimation would be between $100M and $1B at this time. That should be plenty of incentive to catch these people.
But that so few payed is actually a good thing, because it means this type of crime does not pay in comparison to the risk the perpetrators take. Hence it kind of _is_ the point.
Re: (Score:2)
Not if you did about 10'000 ... 100'000 of that in damage and have a lot of angry people after you. And they have not even got that money yet, because one point where they could get caught is when they try to get that money out of the BC valet. BC is not really anonymous, despite what the press likes to claim.