{"id":44455,"date":"2015-07-15T00:57:58","date_gmt":"2015-07-15T07:57:58","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=44455"},"modified":"2025-05-29T21:02:37","modified_gmt":"2025-05-30T04:02:37","slug":"ease-buying-ransomware-fuels-affiliate-program","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ease-buying-ransomware-fuels-affiliate-program\/","title":{"rendered":"Ease of Buying Ransomware Fuels Affiliate Program"},"content":{"rendered":"<p>For several weeks after we released the <em>McAfee Labs Threats Report, May 2015,<\/em> in which we discussed the topic of ransomware in depth, we frequently saw the same questions: \u201cWhy is ransomware increasing, and why is it so successful?<\/p>\n<h2>McAfee Labs Threats Report, May 2015<\/h2>\n<p>In our report we offered a few answers to this question. We\u2019d like to zoom in a bit more on one of them: the ease of getting ransomware and how the affiliate program works.<\/p>\n<p>A ransomware author starts an affiliate program to earn money with as little risk as possible. How does that work? An affiliate buys an interest in a ransomware campaign. Usually we see a maximum of 8 to 10 affiliates because more would likely overlap their campaigns and target the same countries. The revenue split is discussed upfront and embedded in affiliate or distribution servers. These are the hidden servers that an affiliate logs into to track campaigns and much more.<\/p>\n<p>The revenue-split model differs, but we have seen 80\/20 and 75\/25 models in which the larger percentage goes to the affiliate and the smaller to the author\/owner of the ransomware infrastructure. Why such a low percentage for the author\/owner? They bear the least risk. The affiliate, on the contrary, has to create or buy a custom packer\/crypter to make the sample less detectable by antimalware solutions, rent a botnet or exploit kit to spread the samples, buy lists of email addresses, detect ways to bypass security solutions, etc.<\/p>\n<p>Besides the spreading the threat, the affiliate needs to track the campaigns, monitor the Bitcoin wallets for payments, and redistribute these amounts over several wallets before cashing out. The telemetry options in the affiliate\/distribution server give an affiliate information on how successful a campaign is and which countries pay the best. In some cases we have even seen the exact amount of files and total file size encrypted on a victim\u2019s machine. This telemetry data is very useful to determine, for example, which language to support in the next release (because country X pays well). In the past after payment of the ransom, the private key was not always received. This hardly happens today; ransomware authors want to keep their reputations healthy.<\/p>\n<p>Here\u2019s an anecdote about language support. In a recent underground market, one author announced support for Russian in his ransomware. Shortly thereafter, the author received a few nasty comments asking why he would target Russian-speaking countries with his ransomware.<\/p>\n<p>Whenever the big guys make money, there are always others who want to make a few dollars. However, they don\u2019t see the (personal) damage, disruption, and financial loss they cause with their actions. A few hours of research on forums and market places on the Deep Web reveal a lot of people offering their services or code to create ransomware. Here are a few:<\/p>\n<p>A group of Russian hackers offering their services:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/ease-buying-ransomware-fuels-affiliate-program\/attachment\/ransomware-beek-20150715-1\" rel=\"attachment wp-att-44458\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-44458\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Ransomware-Beek-20150715-1.png\" alt=\"Ransomware Beek 20150715-1\" width=\"1496\" height=\"142\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Ransomware-Beek-20150715-1.png 1496w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Ransomware-Beek-20150715-1-300x28.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Ransomware-Beek-20150715-1-1024x97.png 1024w\" sizes=\"auto, (max-width: 1496px) 100vw, 1496px\" \/><\/a><\/p>\n<p>Another author offered ransomware:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/ease-buying-ransomware-fuels-affiliate-program\/attachment\/ransomware-beek-20150715-2\" rel=\"attachment wp-att-44459\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-44459\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Ransomware-Beek-20150715-2.png\" alt=\"Ransomware Beek 20150715-2\" width=\"958\" height=\"172\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Ransomware-Beek-20150715-2.png 958w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Ransomware-Beek-20150715-2-300x54.png 300w\" sizes=\"auto, (max-width: 958px) 100vw, 958px\" \/><\/a><\/p>\n<p>The marketplace data of this advertisement revealed that this particular package had already sold 16 times since April, and the average price was around US$34.<\/p>\n<p>An example of Multilocker:<\/p>\n<p><a href=\"https:\/\/securingtomorrow.mcafee.com\/mcafee-labs\/ease-buying-ransomware-fuels-affiliate-program\/attachment\/ransomware-beek-20150715-3\" rel=\"attachment wp-att-44460\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-44460\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Ransomware-Beek-20150715-3.png\" alt=\"Ransomware Beek 20150715-3\" width=\"984\" height=\"174\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Ransomware-Beek-20150715-3.png 984w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Ransomware-Beek-20150715-3-300x53.png 300w\" sizes=\"auto, (max-width: 984px) 100vw, 984px\" \/><\/a><\/p>\n<p>One advertisement demonstrates the ambition of the author: \u201cLet\u2019s kidnap the planet!\u201d<\/p>\n<p>We are just scratching the surface of the possibilities of today\u2019s ransomware. We have seen attempts on mobile devices, but restoring files from a phone backup or the cloud is easy and is enabled by default once you connect your phone to your computer or the Internet. In the McAfee Malware Operations Labs we are working with different scenarios and possible ransomware variants that we expect to surface in a short time. Our goal is to protect our customers from those threats. McAfeenot only operates on the detection and prevention of ransomware, but we are also heavily involved in working with law enforcement and other organizations to combine our forces and battle against ransomware.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>For several weeks after we released the McAfee Labs Threats Report, May 2015, in which we discussed the topic of&#8230;<\/p>\n","protected":false},"author":653,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[1814,76,338,180,4140],"coauthors":[3576],"class_list":["post-44455","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-computer-security","tag-cybercrime","tag-endpoint-protection","tag-malware","tag-quarterly-threats-report"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ease of Buying Ransomware Fuels Affiliate Program | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Ransomware&#039;s success is fueled by the ease of getting ransomware and how how well the affiliate program works.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ease of Buying Ransomware Fuels Affiliate Program | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Ransomware&#039;s success is fueled by the ease of getting ransomware and how how well the affiliate program works.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ease-buying-ransomware-fuels-affiliate-program\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2015-07-15T07:57:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-30T04:02:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Ransomware-Beek-20150715-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1496\" \/>\n\t<meta property=\"og:image:height\" content=\"142\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Christiaan Beek\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ChristiaanBeek\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Christiaan Beek\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ease-buying-ransomware-fuels-affiliate-program\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ease-buying-ransomware-fuels-affiliate-program\/\"},\"author\":{\"name\":\"Christiaan Beek\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/b5594548f9e30297ea54990aff356e79\"},\"headline\":\"Ease of Buying Ransomware Fuels Affiliate Program\",\"datePublished\":\"2015-07-15T07:57:58+00:00\",\"dateModified\":\"2025-05-30T04:02:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ease-buying-ransomware-fuels-affiliate-program\/\"},\"wordCount\":649,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ease-buying-ransomware-fuels-affiliate-program\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Ransomware-Beek-20150715-1.png\",\"keywords\":[\"computer security\",\"cybercrime\",\"endpoint protection\",\"malware\",\"Quarterly Threats Report\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ease-buying-ransomware-fuels-affiliate-program\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ease-buying-ransomware-fuels-affiliate-program\/\",\"name\":\"Ease of Buying Ransomware Fuels Affiliate Program | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ease-buying-ransomware-fuels-affiliate-program\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ease-buying-ransomware-fuels-affiliate-program\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Ransomware-Beek-20150715-1.png\",\"datePublished\":\"2015-07-15T07:57:58+00:00\",\"dateModified\":\"2025-05-30T04:02:37+00:00\",\"description\":\"Ransomware's success is fueled by the ease of getting ransomware and how how well the affiliate program works.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ease-buying-ransomware-fuels-affiliate-program\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ease-buying-ransomware-fuels-affiliate-program\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ease-buying-ransomware-fuels-affiliate-program\/#primaryimage\",\"url\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Ransomware-Beek-20150715-1.png\",\"contentUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Ransomware-Beek-20150715-1.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ease-buying-ransomware-fuels-affiliate-program\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Ease of Buying Ransomware Fuels Affiliate Program\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/b5594548f9e30297ea54990aff356e79\",\"name\":\"Christiaan Beek\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/09179574bcf76b6304ed08e621f59379\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/2-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/2-96x96.png\",\"caption\":\"Christiaan Beek\"},\"description\":\"Christiaan Beek is the Lead Scientist &amp; Sr. Principal Engineer of the Enterprise Office of the CTO. He is leading the strategic threat intelligence research with a focus on inventing new technology, research techniques and models. Visionary and serving leadership is at the core of his day-to-day job, getting the best out of people and collaborate to make the (cyber) world safer and a better place. In previous roles, Beek was Director of Threat Intelligence in McAfee Labs and Director of Incident Response and Forensics at Foundstone, McAfee\u2019s forensic services arm. At Foundstone, he led a team of forensic specialists in Europe, the Middle East, and Africa during major breaches. Beek develops threat intelligence strategy, designs and envision threat intelligence systems and new research techniques. Christiaan speaks regularly at conferences, including BlackHat, RSA, BlueHat and Botconf. Besides contributed to the best-selling security book \\\"Hacking Exposed\\\", he wrote a comic book about Ransomware, is a contributor to the MITRE ATT&amp;CK framework and holds multiple patents.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/christiaanbeek\/\",\"https:\/\/x.com\/ChristiaanBeek\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/christiaan-beek\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ease of Buying Ransomware Fuels Affiliate Program | McAfee Blog","description":"Ransomware's success is fueled by the ease of getting ransomware and how how well the affiliate program works.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Ease of Buying Ransomware Fuels Affiliate Program | McAfee Blog","og_description":"Ransomware's success is fueled by the ease of getting ransomware and how how well the affiliate program works.","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ease-buying-ransomware-fuels-affiliate-program\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2015-07-15T07:57:58+00:00","article_modified_time":"2025-05-30T04:02:37+00:00","og_image":[{"width":1496,"height":142,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Ransomware-Beek-20150715-1.png","type":"image\/png"}],"author":"Christiaan Beek","twitter_card":"summary_large_image","twitter_creator":"@ChristiaanBeek","twitter_site":"@McAfee","twitter_misc":{"Written by":"Christiaan Beek","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ease-buying-ransomware-fuels-affiliate-program\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ease-buying-ransomware-fuels-affiliate-program\/"},"author":{"name":"Christiaan Beek","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/b5594548f9e30297ea54990aff356e79"},"headline":"Ease of Buying Ransomware Fuels Affiliate Program","datePublished":"2015-07-15T07:57:58+00:00","dateModified":"2025-05-30T04:02:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ease-buying-ransomware-fuels-affiliate-program\/"},"wordCount":649,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ease-buying-ransomware-fuels-affiliate-program\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Ransomware-Beek-20150715-1.png","keywords":["computer security","cybercrime","endpoint protection","malware","Quarterly Threats Report"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ease-buying-ransomware-fuels-affiliate-program\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ease-buying-ransomware-fuels-affiliate-program\/","name":"Ease of Buying Ransomware Fuels Affiliate Program | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ease-buying-ransomware-fuels-affiliate-program\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ease-buying-ransomware-fuels-affiliate-program\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Ransomware-Beek-20150715-1.png","datePublished":"2015-07-15T07:57:58+00:00","dateModified":"2025-05-30T04:02:37+00:00","description":"Ransomware's success is fueled by the ease of getting ransomware and how how well the affiliate program works.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ease-buying-ransomware-fuels-affiliate-program\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ease-buying-ransomware-fuels-affiliate-program\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ease-buying-ransomware-fuels-affiliate-program\/#primaryimage","url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Ransomware-Beek-20150715-1.png","contentUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Ransomware-Beek-20150715-1.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/ease-buying-ransomware-fuels-affiliate-program\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Ease of Buying Ransomware Fuels Affiliate Program"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/b5594548f9e30297ea54990aff356e79","name":"Christiaan Beek","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/09179574bcf76b6304ed08e621f59379","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/2-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/2-96x96.png","caption":"Christiaan Beek"},"description":"Christiaan Beek is the Lead Scientist &amp; Sr. Principal Engineer of the Enterprise Office of the CTO. He is leading the strategic threat intelligence research with a focus on inventing new technology, research techniques and models. Visionary and serving leadership is at the core of his day-to-day job, getting the best out of people and collaborate to make the (cyber) world safer and a better place. In previous roles, Beek was Director of Threat Intelligence in McAfee Labs and Director of Incident Response and Forensics at Foundstone, McAfee\u2019s forensic services arm. At Foundstone, he led a team of forensic specialists in Europe, the Middle East, and Africa during major breaches. Beek develops threat intelligence strategy, designs and envision threat intelligence systems and new research techniques. Christiaan speaks regularly at conferences, including BlackHat, RSA, BlueHat and Botconf. Besides contributed to the best-selling security book \"Hacking Exposed\", he wrote a comic book about Ransomware, is a contributor to the MITRE ATT&amp;CK framework and holds multiple patents.","sameAs":["https:\/\/www.linkedin.com\/in\/christiaanbeek\/","https:\/\/x.com\/ChristiaanBeek"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/christiaan-beek\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/44455","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/653"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=44455"}],"version-history":[{"count":2,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/44455\/revisions"}],"predecessor-version":[{"id":214725,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/44455\/revisions\/214725"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=44455"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=44455"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=44455"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=44455"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}