Why can't malware be more aligned to destroy a user's PC like it was in the 90's rather than an attempt to make money...

Why can't malware be more aligned to destroy a user's PC like it was in the 90's rather than an attempt to make money from the end user? I honestly want to see another CIH outbreak instead of "Oops, your files are encrypted and you have to pay x amount in Bitcoin to get them decrypted".

There is malware that was doing this to iot devices

Money is all that matters, goy. The pleasure of hurting people you've never met is nothing compared to putting your erect penis inside a cute girl whilst she cries softly and begs you to stop, or that of being able to afford healthcare.

Yeah, but malware like that are very few and far between nowadays. Now every pajeet online can just shit out a new variant of Wannacry.

I could just get the same satisfaction from ruining a $600+ PC by overwritting the MBR.

There was the virus back in early 90's that would burn out your monitor like in physically destroying hardware by sending it out of the sync.

>he thinks this ruins a PC of any price
Back to plebbit please

>Why can't malware be more aligned to destroy a user's PC like it was in the 90's
there's physical failsafes for things like that now

thats ransomeware

Malware doesn't last long if it makes itself too obvious. A math miner is elegant enough to get past the best of people, but anything like what you suggest is aggressively targeted and eliminated.

Assuming the user is tech illiterate.

Examples?

Infected Classic Shell would like to have a word with you.

Why beat people sensless when you can point a knife at them and take their wallet?

>he thinks any computer bought within the last 6-7 years still uses MBR
>he thinks overwriting it would brick the computer and not just require repartitioning, or a repair of the MBR with a Windows installation flash drive or a live GNU/Linux session
I want summer to end already.

BIOS Antivirus, Read only BIOS, Dual BIOS, Reflashable BIOS, Swap BIOS.
And UEFI takes it on a whole other level including secured boot and mbr protection.
If it was on a Samsung phone it will blow a e-fuse and lock down the whole SYSTEM rendering the containers useless.

> infected classic shell
Enough said. There are people still doing this. Just small scale because money.

/thread

Is that you Nef?

Fun.

Why not just make some badass computer worm/rootkit that does absolutely nothing until the author presses the big red button? Infect like 2,000,000 computers then activate the payload remotely after people start to notice (or on some fixed date a year in the future.)

source: anyone who's played the flash game pandemic.

In order to actually fuck with raw hardware devices you need to get in to the kernel.
In order to get in to the kernel you need to have root/NT_SYSTEM privileges. To get those you need to find a viable exploit in the kernel api.
Even if you get in to the kernel you still need flawed hardware that can blow a fuse or something if you send proper signals in to the device which is quite rare on its own.

Basically if you want to be a cyber jamal ransom for files is the most cost effective way of doing it, when it comes to ransomware style attacks

This is not a concern and irrelevant

>reinstalls OS
wow, that was hard

Just make iot devices that require a unique password be set to activate.
¯\_(ツ)_/¯