Author

Topic: [2017-05-15]Hackers who infected 200,000 machines have only made $50,000 worth (Read 13189 times)

legendary
Activity: 3276
Merit: 2442
Maybe most people have figured out that there is no use in paying because the program doesn't know who has paid.

Paying a bunch of criminals is no solution. If you pay them once, you will give them incentive to continue doing so. Plus you don't know if your files will really be decrypted after paying. Only solution is to either professionally have the systems 'cleaned', or they need to be wiped out and a back up being installed. I am quite happy that the number of paid ransom is severely lacking if you take the size of this attack into consideration.

You do not trust the criminal? There is a solution - In the future, malware will have smart contracts. You can be sure that your files will be decrypted once you pay the ransom. The only way to transact with an untrustworthy person.

I have no confidence in criminals. And I will not pay money in this situation. I believe that this virus can bypass or protect your computer from it. You need to be careful and always install an antivirus

This virus was able to bypass any antivirus protection. (not now probably, because antivirus companies sent updates) You don't need to download something to get infected. That virus can just find your computer because you are connected to the internet, because microsoft itself put that exploit there for NSA.

I would like you to see saying those after you lose your 100k$ btc wallet or something as valuable as this amount to those hackers. 300$ would look like a candy money to you then.
full member
Activity: 280
Merit: 100
Maybe most people have figured out that there is no use in paying because the program doesn't know who has paid.

Paying a bunch of criminals is no solution. If you pay them once, you will give them incentive to continue doing so. Plus you don't know if your files will really be decrypted after paying. Only solution is to either professionally have the systems 'cleaned', or they need to be wiped out and a back up being installed. I am quite happy that the number of paid ransom is severely lacking if you take the size of this attack into consideration.

You do not trust the criminal? There is a solution - In the future, malware will have smart contracts. You can be sure that your files will be decrypted once you pay the ransom. The only way to transact with an untrustworthy person.

I have no confidence in criminals. And I will not pay money in this situation. I believe that this virus can bypass or protect your computer from it. You need to be careful and always install an antivirus
legendary
Activity: 2016
Merit: 1107
Maybe most people have figured out that there is no use in paying because the program doesn't know who has paid.

Paying a bunch of criminals is no solution. If you pay them once, you will give them incentive to continue doing so. Plus you don't know if your files will really be decrypted after paying. Only solution is to either professionally have the systems 'cleaned', or they need to be wiped out and a back up being installed. I am quite happy that the number of paid ransom is severely lacking if you take the size of this attack into consideration.

You do not trust the criminal? There is a solution - In the future, malware will have smart contracts. You can be sure that your files will be decrypted once you pay the ransom. The only way to transact with an untrustworthy person.

Seriously, even if I know my files will get decrypted I will never pay. I want to avoid one thing -- giving them incentive to continue extorting others. And that happens exactly by not paying. If no one pays, eventually these attacks will dry out. I make backups of everything important every day (if things needs to be backed up), and store it at external drives. If my system gets locked, I will secure erase my hdd and do a fresh install -- no problem.

the problem is no files have been decrypted so far,they are not only dirty extorters but liars as well
and I agree-do not pay any of the scum who attempt to blackmail you,backup your documents,have your installation disks handy
and if shit hits the fan-spend a couple of hours reinstalling your system after a full format
legendary
Activity: 1232
Merit: 1091
Maybe most people have figured out that there is no use in paying because the program doesn't know who has paid.

Paying a bunch of criminals is no solution. If you pay them once, you will give them incentive to continue doing so. Plus you don't know if your files will really be decrypted after paying. Only solution is to either professionally have the systems 'cleaned', or they need to be wiped out and a back up being installed. I am quite happy that the number of paid ransom is severely lacking if you take the size of this attack into consideration.

You do not trust the criminal? There is a solution - In the future, malware will have smart contracts. You can be sure that your files will be decrypted once you pay the ransom. The only way to transact with an untrustworthy person.

Seriously, even if I know my files will get decrypted I will never pay. I want to avoid one thing -- giving them incentive to continue extorting others. And that happens exactly by not paying. If no one pays, eventually these attacks will dry out. I make backups of everything important every day (if things needs to be backed up), and store it at external drives. If my system gets locked, I will secure erase my hdd and do a fresh install -- no problem.
legendary
Activity: 2408
Merit: 1121
This is, and has, spawned a whole bunch of copycats.

Its like lighting a single tree in a forest on fire, and letting it all catch and burn. There are no real costs to distributing it, you just need to infect a few well-connected machines and you're golden. One variant was even infecting people and mining Monero, lol.

This is just like anything else on the internet, once it is released the technique will be used over and over until it has effectively been patched out of existence.
legendary
Activity: 1918
Merit: 1012
★Nitrogensports.eu★
Maybe most people have figured out that there is no use in paying because the program doesn't know who has paid.

Paying a bunch of criminals is no solution. If you pay them once, you will give them incentive to continue doing so. Plus you don't know if your files will really be decrypted after paying. Only solution is to either professionally have the systems 'cleaned', or they need to be wiped out and a back up being installed. I am quite happy that the number of paid ransom is severely lacking if you take the size of this attack into consideration.

You do not trust the criminal? There is a solution - In the future, malware will have smart contracts. You can be sure that your files will be decrypted once you pay the ransom. The only way to transact with an untrustworthy person.
legendary
Activity: 1372
Merit: 1027
Dump it!!!
Wow I don't know if 50k$ was worth taking that risk.
In which ever scenario you look at it the did get away with it so it was a low risk job unless the culprits were found
Quote
Now those btc addresses will be blacklisted forever and on the top that, he is going to be tailed forever by CIA & FBI & Mossad & KGB & SIS & BND & Interpol and any other secret sevice there is.
Is blacklisting an address even possible.... because i know its easy to track the transaction on the  blockchain
unless if they do use a mixing service to cover their tracks.

Quote
He (or that group) made himself a public enemy only for 50k$. fckd.
The magnitude of the attack could only be carried out by a group of people looking at how much resources we needed
legendary
Activity: 2016
Merit: 1107
Maybe most people have figured out that there is no use in paying because the program doesn't know who has paid.

Paying a bunch of criminals is no solution. If you pay them once, you will give them incentive to continue doing so. Plus you don't know if your files will really be decrypted after paying. Only solution is to either professionally have the systems 'cleaned', or they need to be wiped out and a back up being installed. I am quite happy that the number of paid ransom is severely lacking if you take the size of this attack into consideration.

I also believe that just by paying the Ransome the problem will not be solved we to find another solution or else we should all be in a big mess


press reports that no data has been decrypted successfully,so there is no reason to pay at all
another solution is to find who is behind the attack,I'm sure it would be connected to the US agencies
but I would not be surprised if they blame Russia yet again,find a "secret hacker group" with "wink.wink" connections to russians
even if it is just the name of the group and nothing else
legendary
Activity: 1284
Merit: 1001
Some have no other way - they have to pay. Special. If the computer on which all information for work is stored is infected. The guide will not understand your explanations that the computer is infected. They need the result
I'm not sure if you understand what I'm writing, because what you write doesn't make much sense. Sure some people are paying (we can see that from the three bitcoin addresses the program uses), but there is no use in doing so. The files won't be decrypted no matter what they do because this particular ransomware is too badly written to understand that they have paid.
hero member
Activity: 546
Merit: 500
Some have no other way - they have to pay. Special. If the computer on which all information for work is stored is infected. The guide will not understand your explanations that the computer is infected. They need the result

Paying is not a solution as mentioned before. I understand that it might feel like you have no other option, but look at it from this point -> If you have been willing to pay once, why wouldn't you pay for a second time? Perhaps for a third time? Those that are desperate enough and end up paying, have important files to safe, and exactly that puts them in a very easy to extort position.
Well hackers do tend to actually decrypt your files after you've paid the ransom, simply because if they didn't do it then no one would pay in the future. 

So think of it this way.  If I hack someone's computer and they have no recent backups, they will pay the ransom.  After they've paid the ransom, what's the first thing that they're going to do?  Backup their files, obviously.  Lessons can be learned and then they don't have to deal with paying ransoms in the future.

All that matters is that they learn from the experience, so they wouldn't pay it a second time, or a third time, or a fourth time.
legendary
Activity: 2170
Merit: 1427
Some have no other way - they have to pay. Special. If the computer on which all information for work is stored is infected. The guide will not understand your explanations that the computer is infected. They need the result

Paying is not a solution as mentioned before. I understand that it might feel like you have no other option, but look at it from this point -> If you have been willing to pay once, why wouldn't you pay for a second time? Perhaps for a third time? Those that are desperate enough and end up paying, have important files to safe, and exactly that puts them in a very easy to extort position.
full member
Activity: 448
Merit: 100
Paying a bunch of criminals is no solution. If you pay them once, you will give them incentive to continue doing so. Plus you don't know if your files will really be decrypted after paying.
As I said, in this case we know that the files won't be decrypted even if you pay. Infections created by more professional criminals will frequently release the files if you pay.

Some have no other way - they have to pay. Special. If the computer on which all information for work is stored is infected. The guide will not understand your explanations that the computer is infected. They need the result
legendary
Activity: 1284
Merit: 1001
Paying a bunch of criminals is no solution. If you pay them once, you will give them incentive to continue doing so. Plus you don't know if your files will really be decrypted after paying.
As I said, in this case we know that the files won't be decrypted even if you pay. Infections created by more professional criminals will frequently release the files if you pay.
legendary
Activity: 1302
Merit: 1027
Maybe most people have figured out that there is no use in paying because the program doesn't know who has paid.

Paying a bunch of criminals is no solution. If you pay them once, you will give them incentive to continue doing so. Plus you don't know if your files will really be decrypted after paying. Only solution is to either professionally have the systems 'cleaned', or they need to be wiped out and a back up being installed. I am quite happy that the number of paid ransom is severely lacking if you take the size of this attack into consideration.

I also believe that just by paying the Ransome the problem will not be solved we to find another solution or else we should all be in a big mess
hero member
Activity: 546
Merit: 500
They also found the backdoor on the virus so maybe not all of the infected individuals or institution paid any ransom to the hacker. Or maybe they just totally do a full re-install of the infected pc's because they don't want to pay ransom money. I think with this kind of malicious intent, the general public now will be very vigilant and will not click on any link they see on the internet.
They don't need to click on suspicious links to be susceptible to the virus.  The virus can infect basically any computer that hasn't downloaded the Windows patch MS17-010 from a couple of months ago.  The lesson is, update and back up often.
legendary
Activity: 1232
Merit: 1091
Maybe most people have figured out that there is no use in paying because the program doesn't know who has paid.

Paying a bunch of criminals is no solution. If you pay them once, you will give them incentive to continue doing so. Plus you don't know if your files will really be decrypted after paying. Only solution is to either professionally have the systems 'cleaned', or they need to be wiped out and a back up being installed. I am quite happy that the number of paid ransom is severely lacking if you take the size of this attack into consideration.
hero member
Activity: 1792
Merit: 534
Leading Crypto Sports Betting & Casino Platform
Does anyone know the btc address this money is being collected in? I'd like to take a look.
There are three known addresses, which are coded into the software so they're mostly likely the only ones that they have.

Address 1: 12t9YDPgwueZ9NyMgw519p7AA8isjr6SMw
Address 2: 13AM4VW2dhxYgXeQepoHkHSQuy6NgaEb94
Address 3: 115p7UMMngoj1pMvkpHijcRdfJNXj6LrLn

Fortunately, it seems like most institutions and even individuals will have regular backups.
member
Activity: 62
Merit: 10
Does anyone know the btc address this money is being collected in? I'd like to take a look.
legendary
Activity: 1284
Merit: 1001
Maybe most people have figured out that there is no use in paying because the program doesn't know who has paid.
legendary
Activity: 3276
Merit: 2442
Wow I don't know if 50k$ was worth taking that risk. Now those btc addresses will be blacklisted forever and on the top that, he is going to be tailed forever by CIA & FBI & Mossad & KGB & SIS & BND & Interpol and any other secret sevice there is.

He (or that group) made himself a public enemy only for 50k$. fckd.
legendary
Activity: 1162
Merit: 1000
The WannaCry ransomware hackers have received around $50,000 worth of bitcoin so far.
The amount the hackers will demand is expected to double from $300 to $600 on Monday.


http://www.cnbc.com/2017/05/15/wannacry-ransomware-hackers-have-only-made-50000-worth-of-bitcoin.html


42.000$ to be exact,at the time of publishing of this article:
https://www.thetimes.co.uk/article/bitcoin-accounts-are-under-surveillance-6lb3kglsz
backup your sensitive data like spreadshits,txt files,word documents,photos etc.
a 60$ USB 1 tb hard drive can save you a lot of headache and coins

For coins a hard wallet or a paper wallet is a must. Papers with random numbers are easy to hide around no one would search.

Hard drives can have hardware failures too, so even them are not totally safe, specially when there are physical solutions, like paper wallets
legendary
Activity: 2016
Merit: 1107
The WannaCry ransomware hackers have received around $50,000 worth of bitcoin so far.
The amount the hackers will demand is expected to double from $300 to $600 on Monday.


http://www.cnbc.com/2017/05/15/wannacry-ransomware-hackers-have-only-made-50000-worth-of-bitcoin.html


42.000$ to be exact,at the time of publishing of this article:
https://www.thetimes.co.uk/article/bitcoin-accounts-are-under-surveillance-6lb3kglsz
backup your sensitive data like spreadshits,txt files,word documents,photos etc.
a 60$ USB 1 tb hard drive can save you a lot of headache and coins
hero member
Activity: 2660
Merit: 551
They also found the backdoor on the virus so maybe not all of the infected individuals or institution paid any ransom to the hacker. Or maybe they just totally do a full re-install of the infected pc's because they don't want to pay ransom money. I think with this kind of malicious intent, the general public now will be very vigilant and will not click on any link they see on the internet.
legendary
Activity: 1073
Merit: 1000
The WannaCry ransomware hackers have received around $50,000 worth of bitcoin so far.
The amount the hackers will demand is expected to double from $300 to $600 on Monday.


http://www.cnbc.com/2017/05/15/wannacry-ransomware-hackers-have-only-made-50000-worth-of-bitcoin.html
Jump to: