{"id":61865,"date":"2020-02-10T09:38:38","date_gmt":"2020-02-10T15:38:38","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=61865"},"modified":"2020-02-13T09:21:27","modified_gmt":"2020-02-13T15:21:27","slug":"ransomware-as-a-service","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/ransomware-as-a-service\/","title":{"rendered":"Ransomware as a Service"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\">Ransomware as a Service (RaaS)  is easier to purchase than you may think<\/h3>\n\n\n\n<p>Let me start by saying that when I was asked to write this post, I didn&#8217;t think it would take me down a dark and twisted rabbit hole. And yet, here I am, having spent the better part of four hours reading about a process I thought I knew. <\/p>\n\n\n\n<p>So let&#8217;s talk about RaaS. I want to make sure you understand that PC Matic in NO WAY supports or condones the efforts of those using malicious scripting to victimize others. Ransomware is the war that we&#8217;re fighting. But, as in any war, you need to know your enemy.<\/p>\n\n\n\n<p>It should also be noted that the research done for this is not, in any way, supposed to be a guidebook for How To Buy Ransomware Without Really Trying. Don&#8217;t be that person.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Where to start<\/h4>\n\n\n\n<p>I do know the basics of how people buy ransomware. Subsequently, I know you have to go searching the dark web. I also know that you can deploy with almost zero tech ability. But I didn&#8217;t know the nuance. For that, I reached out to one of our malware researchers here at PC Matic.<\/p>\n\n\n\n<p>He gave me a step by step guide on how to access the dark web. What a magical place! (This is heavy sarcasm.) There are a decent amount of precautions you should take before browsing. These steps will keep you safe from the dredges of the internet that lurk there. They&#8217;re waiting for an unsuspecting noob to wander curiously through the dark crevices. Don&#8217;t be fooled, this isn&#8217;t a place you want to be frivolous. <\/p>\n\n\n\n<p>Once you&#8217;re (safely) in, it&#8217;s up to you to find the search tools and chat rooms to begin shopping for ransomware. <\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Weeding out the competition<\/h4>\n\n\n\n<p>As with any seedy, back alley market, a lot of what you&#8217;ll find is bogus. There&#8217;s a <a href=\"https:\/\/www.bloomberg.com\/features\/2020-dark-web-ransomware\/\">wonderful article<\/a> I read by Drake Bennett of Bloomberg Businessweek on his foray into purchasing ransomware. Even after thinking he&#8217;d purchased legitimate ransomware (that makes me laugh), he still found himself in the middle of a scam. <\/p>\n\n\n\n<p>But if you&#8217;re still determined on becoming one of the cyber criminals, there is a lot of support in the dark web chat rooms. Many of the others there will let you know who is and isn&#8217;t legit. Once you&#8217;ve purchased your program, there are even instructional guides and tech support channels to help you deploy. <\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Letting loose<\/h4>\n\n\n\n<p>Now that you&#8217;ve picked your target, it&#8217;s just a few more clicks and emails before sending out the bait. The most common form of ransomware for novices revolves around phishing techniques. If you do get a hit, the ransomware will walk you through how to collect and then send out a decryption key. And just like that, you&#8217;re a cyber criminal. <\/p>\n\n\n\n<p>Now you may be saying that this all sounds incredibly easy. That&#8217;s because, as I mentioned, I am not here to write a field guide on how to become a cyber criminal. I&#8217;m simply here to bring more knowledge to light as to how common it is. All of this could realistically be done in a day. This explains why ransomware attacks are rising in the US.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">The repercussions<\/h4>\n\n\n\n<p>If, after reading this, you think it sounds good, there are some things you should know. This is cyber crime. In the US, <a href=\"https:\/\/www.usnews.com\/news\/national-news\/articles\/2018-04-13\/can-the-law-stop-ransomware\">the punishments<\/a> for even having deployable ransomware on your device is enough to get you in plenty of hot water.  But, this is criminal activity we&#8217;re talking about, so of course there are consequences. <\/p>\n\n\n\n<p>Tor browsers, which are used by some to access the dark web, <a href=\"https:\/\/en.wikipedia.org\/wiki\/Tor_(anonymity_network)\">were built by the US Naval Research Laboratory<\/a> with the express purpose of protecting US intelligence. Additionally, most government agencies and major news outlets all have a presence on the dark web. The anonymity of access doesn&#8217;t guarantee you won&#8217;t get caught.  <\/p>\n\n\n\n<h4 class=\"wp-block-heading\">The Reality<\/h4>\n\n\n\n<p>The reality is, many of these attacks are originated overseas, by seasoned criminals who are very good at covering their tracks.  Whether that is a hacker who uses RaaS or a swift-coding cyber criminal starting the process from scratch, they are good.  <\/p>\n\n\n\n<p>Adding another layer of complexity to this, we are dealing with cyber.  The bounds are limitless, and there are additional layers of anonymity available to increase your secrecy on the dark web.  Hiding how malicious emails are delivered, covering up IP addresses, and more are now commonplace.  <\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Just scratching the surface<\/h4>\n\n\n\n<p>As I stated when we began, this post was in no way supposed to be a guide or even an endorsement to purchase ransomware. We&#8217;re here to educate. If you&#8217;re going to fight a war, you need to know who you&#8217;re fighting and the nuance of their techniques.<\/p>\n\n\n\n<p>I hope this has given you a brief insight as to how the prevalence of ransomware has grown. I also hope it makes you think twice about clicking the attachment in that email that allegedly came from your co-worker. Knowledge is power. <\/p>\n\n\n\n<p>To hear our CEO, Rob Cheng, talk about the dark web and purchasing ransomware, listen to the clip below.<\/p>\n\n\n\n<figure class=\"wp-block-audio\"><audio controls src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/Liz-Callaway-Show_020720_RaaS.mp3\"><\/audio><figcaption>Rob Cheng on Liz Calloway<\/figcaption><\/figure>\n\n\n\n<p>And to listen to the entire show, just hit play on the Vimeo link.<\/p>\n\n\n\n<figure class=\"wp-block-embed-vimeo wp-block-embed is-type-video is-provider-vimeo wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<div class=\"ast-oembed-container \" style=\"height: 100%;\"><iframe title=\"The Experian Breach, Whitelist Antivirus and Cowbells_Rob Cheng on The Liz Callaway Show_02-11-20\" src=\"https:\/\/player.vimeo.com\/video\/391041255?dnt=1&amp;app_id=122963\" width=\"500\" height=\"281\" frameborder=\"0\" allow=\"autoplay; fullscreen; picture-in-picture; clipboard-write\"><\/iframe><\/div>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Ransomware as a Service (RaaS) is easier to purchase than you may think Let me start by saying that when I was asked to write this post, I didn&#8217;t think it would take me down a dark and twisted rabbit hole. And yet, here I am, having spent the better part of four hours reading [&hellip;]<\/p>\n","protected":false},"author":71,"featured_media":61867,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[109],"tags":[4969,4363,5112,5733,5242],"class_list":["post-61865","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-pc-matic-blog","tag-dark-web","tag-ransomware","tag-ransomware-attacks","tag-ransomware-for-sale","tag-ransomware-reports"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ransomware as a Service<\/title>\n<meta name=\"description\" content=\"Ransomware as a Service (RaaS) is easier to purchase than you may think Let me start by saying that when I was asked to write this post, I didn&#039;t think it\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/ransomware-as-a-service\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ransomware as a Service\" \/>\n<meta property=\"og:description\" content=\"Ransomware as a Service (RaaS) is easier to purchase than you may think Let me start by saying that when I was asked to write this post, I didn&#039;t think it\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/ransomware-as-a-service\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-10T15:38:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-02-13T15:21:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomwareforsale_740x414-e1624893806416.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mary James\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mary James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-as-a-service\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-as-a-service\\\/\"},\"author\":{\"name\":\"Mary James\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/ca21b293b28eb0c5da5f087045b896d8\"},\"headline\":\"Ransomware as a Service\",\"datePublished\":\"2020-02-10T15:38:38+00:00\",\"dateModified\":\"2020-02-13T15:21:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-as-a-service\\\/\"},\"wordCount\":911,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-as-a-service\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/ransomwareforsale_740x414-e1624893806416.jpg\",\"keywords\":[\"dark web\",\"ransomware\",\"ransomware attacks\",\"ransomware for sale\",\"ransomware reports\"],\"articleSection\":[\"PC Matic Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-as-a-service\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-as-a-service\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-as-a-service\\\/\",\"name\":\"Ransomware as a Service\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-as-a-service\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-as-a-service\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/ransomwareforsale_740x414-e1624893806416.jpg\",\"datePublished\":\"2020-02-10T15:38:38+00:00\",\"dateModified\":\"2020-02-13T15:21:27+00:00\",\"description\":\"Ransomware as a Service (RaaS) is easier to purchase than you may think Let me start by saying that when I was asked to write this post, I didn't think it\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-as-a-service\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-as-a-service\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-as-a-service\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/ransomwareforsale_740x414-e1624893806416.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/ransomwareforsale_740x414-e1624893806416.jpg\",\"width\":500,\"height\":280,\"caption\":\"Ransomware continues to spread across the globe, but who is at fault?\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/ransomware-as-a-service\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ransomware as a Service\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/ca21b293b28eb0c5da5f087045b896d8\",\"name\":\"Mary James\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/maryjames\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ransomware as a Service","description":"Ransomware as a Service (RaaS) is easier to purchase than you may think Let me start by saying that when I was asked to write this post, I didn't think it","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/ransomware-as-a-service\/","og_locale":"en_US","og_type":"article","og_title":"Ransomware as a Service","og_description":"Ransomware as a Service (RaaS) is easier to purchase than you may think Let me start by saying that when I was asked to write this post, I didn't think it","og_url":"https:\/\/www.pcmatic.com\/blog\/ransomware-as-a-service\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2020-02-10T15:38:38+00:00","article_modified_time":"2020-02-13T15:21:27+00:00","og_image":[{"width":500,"height":280,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomwareforsale_740x414-e1624893806416.jpg","type":"image\/jpeg"}],"author":"Mary James","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Mary James","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/ransomware-as-a-service\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/ransomware-as-a-service\/"},"author":{"name":"Mary James","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/ca21b293b28eb0c5da5f087045b896d8"},"headline":"Ransomware as a Service","datePublished":"2020-02-10T15:38:38+00:00","dateModified":"2020-02-13T15:21:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/ransomware-as-a-service\/"},"wordCount":911,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/ransomware-as-a-service\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomwareforsale_740x414-e1624893806416.jpg","keywords":["dark web","ransomware","ransomware attacks","ransomware for sale","ransomware reports"],"articleSection":["PC Matic Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/ransomware-as-a-service\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/ransomware-as-a-service\/","url":"https:\/\/www.pcmatic.com\/blog\/ransomware-as-a-service\/","name":"Ransomware as a Service","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/ransomware-as-a-service\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/ransomware-as-a-service\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomwareforsale_740x414-e1624893806416.jpg","datePublished":"2020-02-10T15:38:38+00:00","dateModified":"2020-02-13T15:21:27+00:00","description":"Ransomware as a Service (RaaS) is easier to purchase than you may think Let me start by saying that when I was asked to write this post, I didn't think it","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/ransomware-as-a-service\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/ransomware-as-a-service\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/ransomware-as-a-service\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomwareforsale_740x414-e1624893806416.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/ransomwareforsale_740x414-e1624893806416.jpg","width":500,"height":280,"caption":"Ransomware continues to spread across the globe, but who is at fault?"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/ransomware-as-a-service\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Ransomware as a Service"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/ca21b293b28eb0c5da5f087045b896d8","name":"Mary James","url":"https:\/\/www.pcmatic.com\/blog\/author\/maryjames\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/61865","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/71"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=61865"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/61865\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/61867"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=61865"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=61865"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=61865"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}