Web

Ransomware Popcorn Time removes itself once you infect your friends with it

popcorn time ransomware affiliate ransomwareattack
MalwareThunterTeam/Twitter
Like a digital version of The Ring, a nefarious piece of ransomware malware is offering those affected the chance to avoid having to pay to decrypt their files. The only catch is they have to infect two other people to get them back.

Ransomware has been a growing problem in recent years, becoming one of the most common forms of malware attack in 2016. It’s proved effective and lucrative for criminals, which is why we have seen so many different forms of it. The idea of using infected users to spread it further, however, is rare, though we did see one form with its own affiliate network at the close of 2015.

This latest iteration though is a little more immediate. Known as Popcorn Time (not to be confused with the video streaming software of the same name), the ransomware locks an infected user’s files with a strong AES-256 encryption, making them nigh on impossible to recover without the decryption key, according to Bleeping. As with typical ransomware infections, you can (purportedly) recover those files if you pay up. The current price is one bitcoin or just under $780 at the time of writing.

However, much less common is the linking system. Offered to those affected as the “nasty way,” to get the files back, the malware claims that if you send a link to the ransomware to two unsuspecting people and they become infected with it and ultimately pay to decrypt their files, you will get a free key to do the same.

To try and sweeten a pretty foul tasting deal, the malware makers also look to appeal to people’s better sides. Within the malware documentation is another line about “why [they] do it.” It states that the malware makers are Syrian and that the money being sent as a digital ransom will be used to pay for food, medicine and shelter.

While we cannot confirm such claims, the language used does suggest that the malware makers are not native English speakers. If it’s a falsehood, this would not be the first time malware makers have attempted to appeal to people’s better nature, either.

It’s worth pointing out, beyond the moral implications of sending ransomware to other potential victims, willfully distributing malware is illegal and in breach of the Computer Fraud and Abuse Act of 1986.

Emerging Tech

Awesome Tech You Can’t Buy Yet: Robo sidekicks, AC for your bed, and more

Check out our roundup of the best new crowdfunding projects and product announcements that hit the Web this week. You can't buy this stuff yet, but it sure is fun to gawk!
Home Theater

Want to save your favorite film? Here's how to fix a scratched DVD or CD

A scratched edition of your favorite DVD is no good, but our guide will show you how to fix a scratched DVD, whether you prefer to repair it using a smattering of peanut butter or Mr. Clean's Magic Eraser.
Home Theater

Any night can be a night at the movies with the best home theater projectors

Are you sick and tired of those cumbersome big screen TVs? Don’t want to spend big for a huge TV? These home theater projectors will bring you that big screen experience without breaking the bank.
Home Theater

Amazon update for older Fire TV devices helps keep you safe from malware

In June, some users of older models of Amazon Fire TV and Fire TV Stick devices found themselves targeted by malware, but new security measures rolling out as part of the latest software update will help keep you safer.
Computing

Network routers with roaming enabled are likely susceptible to a new attack

Jens Steube discovered a new method to break into network routers while researching new ways to attack the WPA3 security standard. He stumbled onto an attack technique capable of cracking hashed WPA-PSK passwords.
Computing

Saving your favorite YouTube videos for posterity is quick, easy with these tools

Learning how to download YouTube videos is easier than you might think. There are plenty of great tools you can use, both online and offline. These are our favorites and a step by step guide on how to use them.
Computing

Hacker plays ‘Doom’ on John McAfee’s ‘unhackable’ BitFi Bitcoin wallet

The BitFi hardware cryptocurrency wallet isn't as unhackable as John McAfee claims. A 15-year-old bedroom hacker has managed to get Doom running on the device, suggesting its days may soon be numbered.
Computing

Having issues with Microsoft Edge? Here's how to fix the most common problems

If you're feeling frustrated with Microsoft Edge, or have run into a serious problem with Windows 10's built-in browser, take a look at these common issues and the solutions that can help you get back on track.
Music

Spotify vs. Pandora: Which music streaming service is better for you?

Which music streaming platform is best for you? We pit Spotify versus Pandora, two mighty streaming services with on-demand music and massive catalogs, comparing every facet of the two services to help you decide which is best.
Photography

The best place to print photos online: Seven top photo labs

Have you been looking around for the best place to print out your favorite photos online? Don't fret, we've pored through dozens of options and narrowed it down to the seven best.
Computing

The browser-based Monero miner Coinhive generates around $250,000 each month

Despite a fall in cryptocurrency mining, the Coinhive Monero miner is still highly active, generating around $250,000 each month. Coinhive also contributes 1.18 percent of the total mining power behind the Monero blockchain.
Computing

The Andromeda botnet still lingers as nations struggle to clean infected PCs

A report by Fortinet suggests that although the FBI and Europe ended the Andromeda botnet’s reign in late 2017, there are still infected PCs. Cleaning up these PCs isn’t progressing at the same pace across various regions.
Web

FatCam: Museum of London’s livestream of a rancid hunk of sewage proves popular

A London museum put part of a fatberg on display earlier this year and the putrid muck proved to be a surprise hit with visitors. Keen to share it with a wider audience, the fatberg is now starring in its very own livestream.
Computing

Australian student hacks into Apple, steals 90GB of data because he’s a ‘fan’

A 16-year-old student in Australia broke into Apple’s network multiple times for an entire year to download 90GB of “secure” data and access customer accounts. He did this because he was a "fan."