Hackers who knocked out critical services in Ukraine are now demanding an absurd ransom!$

in bitcoin •  7 years ago  (edited)

After making just $10,000 from a global ransomware attack last week, the hackers behind the scheme are trying to make up for the paltry returns by selling a master decryption key that will unlock any computer that was infected. For a quarter of a million US dollars apiece.
“Send me 100 Bitcoins,” the hackers wrote in a message posted online on July 4, “and you will get my private key to decrypt any harddisk (except boot disks).”
The Petya/NotPetya computer attack shut down critical services in Ukraine last week, then spread throughout Europe and the United States, locking users out of their files and demanding they pay $300 in bitcoin to get them back. A message appeared in red text over a black background on the infected computers, providing a bitcoin address where ransom payments should be sent. Once they paid, the message said, the victims were to send an email to [email protected]. The hackers would then verify their payment and send them a decryption key to unlock their files.
But a few hours after the virus started spreading, the Berlin-based email provider Posteo learned that the hackers were using its service and shut down their account. It meant that infected users had no way of contacting the hackers to regain access to their files, and in turn victims had no incentive to pay the ransom. The payments stopped in less than 24 hours, and the hackers had received only $10,000.
A week later, on July 4, money began moving out of the bitcoin account the hackers used to receive ransom payments. The transactions were first reported by a bot Quartz setup, @petya_payments, which sends tweets any time it sees activity on the Petya/NotPetya account. In the first transaction, at 5:32 p.m. ET, the hackers sent about $340 to a bitcoin address owned by DeepPost, a service on the dark web that allows users to anonymously post public messages.

petya_payments @petya_payments
🚨 0.13 BTC ($339.36 USD) has just been withdrawn from a bitcoin wallet tied to #Petya ransomware https://blockchain.info/address/1Mz7153HMuxXTuR2R1t78mGSdzaAtNbBWX
5:35 PM - 4 Jul 2017
Two minutes later, they sent $316 to an address owned by PasteBin, which also allows users to post messages anonymously and is accessible on the normal internet.

petya_payments @petya_payments
🚨 0.1214 BTC ($316.91 USD) has just been withdrawn from a bitcoin wallet tied to #Petya ransomware https://blockchain.info/address/1Mz7153HMuxXTuR2R1t78mGSdzaAtNbBWX
5:35 PM - 4 Jul 2017
Shortly before those transactions occurred, the hackers had posted the aforementioned message on both of those sites, offering to sell a master decryption key for 100 bitcoins, or roughly $260,000 USD. The hackers presumably sent the payments to prove the messages were genuine.
About 35 minutes later, the remaining bitcoins were moved to another account, and have stayed there since:

petya_payments @petya_payments
🚨 3.96983955 BTC ($10,381.86 USD) has just been withdrawn from a bitcoin wallet tied to #Petya ransomware https://blockchain.info/address/1Mz7153HMuxXTuR2R1t78mGSdzaAtNbBWX
6:15 PM - 4 Jul 2017
pixlr_20170628233618865.jpg
Thank you for Reading Up vote Resteem

Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE STEEM!
Sort Order:  

Hi! I am a robot. I just upvoted you! I found similar content that readers might be interested in:
https://qz.com/1021885/the-hackers-who-knocked-out-critical-services-in-ukraine-are-now-demanding-an-absurd-ransom/

interesting story

Congratulations @getpayed777! You have completed some achievement on Steemit and have been rewarded with new badge(s) :

Award for the number of comments

Click on any badge to view your own Board of Honor on SteemitBoard.
For more information about SteemitBoard, click here

If you no longer want to receive notifications, reply to this comment with the word STOP

By upvoting this notification, you can help all Steemit users. Learn how here!