{"id":53316,"date":"2016-05-10T23:28:16","date_gmt":"2016-05-10T23:28:16","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=53316"},"modified":"2016-05-16T21:17:25","modified_gmt":"2016-05-16T21:17:25","slug":"enhancements-made-to-ransomware","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/enhancements-made-to-ransomware\/","title":{"rendered":"Enhancements Made to Ransomware"},"content":{"rendered":"<p>Three variations of ransomware have recent undergone some surprising changes&#8230;<!--more--><\/p>\n<p>&nbsp;<\/p>\n<p>Once a ransomware is exposed, it can be blocked by traditional security software; therefore, in order to remain lucrative ransomware hackers have to make changes to remain undetectable.\u00a0 One surprising change that the ransomware 7ev3n made was actually decreasing their bitcoin demand from 13 \u00a0to .5 or 1 bitcoin.\u00a0 They call this latest version of 7ev3n, <a href=\"http:\/\/www.scmagazine.com\/bad-guys-update-7ev3n-and-cryptxxx-ransomware\/article\/495253\/\">7ev3n-Hone$t<\/a>.\u00a0 No only did the makers of 7ev3n-Hone$t demand a lower ransom, but also enhanced their systems to take alternative methods of payment as well as offering discounts for those who pay the ransom in full.<\/p>\n<p>Another ransomware, <a href=\"http:\/\/www.scmagazine.com\/bad-guys-update-7ev3n-and-cryptxxx-ransomware\/article\/495253\/\">Cryptoxxx<\/a>, experienced changes as their original version released was rather easily decrypted.\u00a0 They&#8217;ve made enhancements to the backend of their codes to decrease the ease of decryption.<\/p>\n<p>Lastly, the ransomware Bucbi is making quite the comeback after making some serious changes to their codes.\u00a0 Bucbi originated two years ago as a simple malware, but has since evolved into a tool to identify sensitive data, find a network and encrypt files.\u00a0 <a href=\"https:\/\/threatpost.com\/bucbi-ransomware-gets-a-big-makeover\/117938\/\">Bucbi <\/a>targets corporate networks using what is called a &#8220;<a href=\"https:\/\/threatpost.com\/bucbi-ransomware-gets-a-big-makeover\/117938\/\">brute force technique<\/a>&#8220;.<\/p>\n<p>So how does this affect you?\u00a0 It&#8217;s a simple reminder.\u00a0 Ransomware is not going away anytime soon.\u00a0 It has been proven to be a lucrative business, and as technology evolves ransomware will continue to do the same.<\/p>\n<p>Who remembered to backup their data today?<\/p>\n<p>UPDATE: Kaspersky labs has found\u00a0a decryption tool for Cryptoxxx 2.0.\u00a0 Click <a href=\"http:\/\/www.pcworld.com\/article\/3070481\/researchers-crack-new-version-of-cryptxxx-ransomware.html\">here <\/a>for more details.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Three variations of ransomware have recent undergone some surprising changes&#8230;<\/p>\n","protected":false},"author":54,"featured_media":53168,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[4949,12],"tags":[4956],"class_list":["post-53316","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ransomware","category-the-pit-blog","tag-enhancements-to-ransomware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Enhancements Made to Ransomware<\/title>\n<meta name=\"description\" content=\"Enhancements made to ransomware will continue, as it has been proven to be a lucrative business for hackers...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/enhancements-made-to-ransomware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Enhancements Made to Ransomware\" \/>\n<meta property=\"og:description\" content=\"Enhancements made to ransomware will continue, as it has been proven to be a lucrative business for hackers...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/enhancements-made-to-ransomware\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2016-05-10T23:28:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-05-16T21:17:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/use-cases-ransomware.png\" \/>\n\t<meta property=\"og:image:width\" content=\"200\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/enhancements-made-to-ransomware\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/enhancements-made-to-ransomware\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"Enhancements Made to Ransomware\",\"datePublished\":\"2016-05-10T23:28:16+00:00\",\"dateModified\":\"2016-05-16T21:17:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/enhancements-made-to-ransomware\\\/\"},\"wordCount\":256,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/enhancements-made-to-ransomware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/use-cases-ransomware.png\",\"keywords\":[\"enhancements to ransomware\"],\"articleSection\":[\"Ransomware\",\"The Pit Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/enhancements-made-to-ransomware\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/enhancements-made-to-ransomware\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/enhancements-made-to-ransomware\\\/\",\"name\":\"Enhancements Made to Ransomware\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/enhancements-made-to-ransomware\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/enhancements-made-to-ransomware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/use-cases-ransomware.png\",\"datePublished\":\"2016-05-10T23:28:16+00:00\",\"dateModified\":\"2016-05-16T21:17:25+00:00\",\"description\":\"Enhancements made to ransomware will continue, as it has been proven to be a lucrative business for hackers...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/enhancements-made-to-ransomware\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/enhancements-made-to-ransomware\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/enhancements-made-to-ransomware\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/use-cases-ransomware.png\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/use-cases-ransomware.png\",\"width\":200,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/enhancements-made-to-ransomware\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Enhancements Made to Ransomware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Enhancements Made to Ransomware","description":"Enhancements made to ransomware will continue, as it has been proven to be a lucrative business for hackers...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/enhancements-made-to-ransomware\/","og_locale":"en_US","og_type":"article","og_title":"Enhancements Made to Ransomware","og_description":"Enhancements made to ransomware will continue, as it has been proven to be a lucrative business for hackers...","og_url":"https:\/\/www.pcmatic.com\/blog\/enhancements-made-to-ransomware\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2016-05-10T23:28:16+00:00","article_modified_time":"2016-05-16T21:17:25+00:00","og_image":[{"width":200,"height":200,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/use-cases-ransomware.png","type":"image\/png"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/enhancements-made-to-ransomware\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/enhancements-made-to-ransomware\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"Enhancements Made to Ransomware","datePublished":"2016-05-10T23:28:16+00:00","dateModified":"2016-05-16T21:17:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/enhancements-made-to-ransomware\/"},"wordCount":256,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/enhancements-made-to-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/use-cases-ransomware.png","keywords":["enhancements to ransomware"],"articleSection":["Ransomware","The Pit Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/enhancements-made-to-ransomware\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/enhancements-made-to-ransomware\/","url":"https:\/\/www.pcmatic.com\/blog\/enhancements-made-to-ransomware\/","name":"Enhancements Made to Ransomware","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/enhancements-made-to-ransomware\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/enhancements-made-to-ransomware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/use-cases-ransomware.png","datePublished":"2016-05-10T23:28:16+00:00","dateModified":"2016-05-16T21:17:25+00:00","description":"Enhancements made to ransomware will continue, as it has been proven to be a lucrative business for hackers...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/enhancements-made-to-ransomware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/enhancements-made-to-ransomware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/enhancements-made-to-ransomware\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/use-cases-ransomware.png","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/use-cases-ransomware.png","width":200,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/enhancements-made-to-ransomware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Enhancements Made to Ransomware"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/53316","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=53316"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/53316\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/53168"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=53316"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=53316"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=53316"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}