Skip to main content
  1. Home
  2. Computing
  3. News

Ransomware shifts focus from holding passwords hostage to hijacking your PC

Add as a preferred source on Google
online Bitcoin courses
Image used with permission by copyright holder

A malicious website initially set up to extort visitors to pay a cryptocurrency ransom has changed its course. Instead of demanding payment via Bitcoin, Ethereum, Bitcoin Cash or Litecoin in exchange for not leaking your password on the internet, the site now hijacks your computer’s processing power to mine cryptocurrency in the background.

Designed as a copy of the Have I Been Pwned attack, the site began by asking users to enter their emails to see if their password has been compromised. Unfortunately, if your password was breached, the site demanded a “donation” of $10 by cryptocurrency to not publish your password in plain text on the web.

Recommended Videos

Up to 1.4 billion passwords may have been breached, but it’s unclear how accurate that figure is. However, because it may be easier — and safer — to change your password than pay the ransom, as The Next Web noted, the site shifted its focus from demanding ransomware payments to taking over your PC’s processing power to mine for cryptocurrency in the background. The publication also confirmed that the malicious site did “have a database with legitimate passwords,” but that not all compromised passwords were stored in plain text.

The Next Web did not reveal the site’s address in its report, citing security reasons, but noted that it doesn’t appear that any user had made payment.

This is the latest ransomware in recent months that demand cryptocurrency as a form of payment. Prior to this incident, Thanatos encrypted files on a user’s PC by hijacking it using a brute force method. If you want to regain access to those files, you had to send payment via cryptocurrency to get a key to decrypt your files. However, at the time, there didn’t appear to be a proper decryption key even if you paid.

According to a recent Google report, extortionists made out with $25 million in just two years, and cryptocurrency was the preferred way to get paid. In fact, 95 percent of extortionists used BTC-e to cash out their earnings. The report cites that the European Union’s anti-money laundering directive and counter-terrorist financing legal frameworks can help to prevent the misuse of cryptocurrency.

Hackers are also changing the game when it comes to data theft. Rather than leaking the information to the dark markets, an IBM X-Force Intelligence Index report revealed that hackers prefer to hold files hostage in exchange for a ransom payment. This meant that in 2017, 25 percent fewer records were leaked than the previous year.

In the business world, ransomware cost corporations $8 billion worldwide in 2017, and many companies keep cryptocurrency on hand to reduce downtime.

Chuong Nguyen
Silicon Valley-based technology reporter and Giants baseball fan who splits his time between Northern California and Southern…
The Mac Pro is dead at Apple, and I’ll miss the cheese-grater powerhouse
RIP Mac Pro. The Mac Studio is taking the throne, and we're okay with that.
Electronics, Computer, Pc

Apple has officially discontinued the Mac Pro. It’s been removed from Apple’s website, and Apple has confirmed to 9to5Mac that there are no plans to release a future version. The buy page now redirects to Apple’s Mac homepage, where the Mac Pro no longer exists.

Why did Apple kill the Mac Pro?

Read more
March Madness, Revisited: The AI Model Did Well. But Mad Things Still Happen
Stills from NCAA games.

(NOTE: This article is part of an ongoing series documenting an experiment with using AI to fill the NCAA brackets and see how it fares against years of human experience. The original article is as follows.)

A week ago, I wrote about entering an NCAA tournament pool with a more disciplined process than I usually use.

Read more
A simple coding mistake is exposing API keys across thousands of websites
Security gaps that are easier to miss than you think
Computer, Electronics, Laptop

After analyzing 10 million webpages, researchers have found thousands of websites accidentally exposing sensitive API credentials, including keys linked to major services like Amazon Web Services, Stripe, and OpenAI.

This is a serious issue because APIs act as the backbone of the apps we use today. They allow websites to connect to services like payments, cloud storage, and AI tools, but they rely on digital keys to stay secure. Once exposed, API keys can allow anyone to interact with those services with malicious intent.

Read more