Posted by / 05-Feb-2019 08:52

Extrapolating from this, they would have earned more than 4,000 in a month.And this was based on data from just one command server and two Bitcoin addresses; the attackers were likely using multiple servers and Bitcoin addresses for their operation.Many of these early schemes had a big drawback for perpetrators, though: a reliable way to collect money from victims.In the early days, online payment methods weren’t popular the way they are today, so some victims in Europe and the US were instructed to pay ransoms via SMS messages or with pre-paid cards.A popular and more insidious variation of this is ransom cryptware, which encrypts your files using a private key that only the attacker possesses, instead of simply locking your keyboard or computer.And these days ransomware doesn’t just affect desktop machines or laptops; it also targets mobile phones.According to Symantec, some of the first versions of ransomware that struck Russia displayed a pornographic image on the victim's machine and demanded payment to remove it.The victim was instructed to make payments either through an SMS text message or by calling a premium rate phone number that would earn the attacker revenue.

Apparently the fine for committing a federal offense involving child porn is cheap, however, because Reveton ransoms are just 0 or less.Victims are given 72 hours to pay up and an email address, [email protected], if they have any questions.In some cases they are threatened with arrest if they don't pay.Later versions of Crypto Locker spread via an email purporting to come from UPS or Fed Ex.Victims were warned that if they didn’t pay within four days—a digital doomsday clock in the pop-up message from the attackers counted down the hours—the decryption key would be destroyed and no one would be able to help unlock their files.