Does your business need a fast and reliable way to make online transactions and accept payments from customers? SolidTrust Pay has eWallet and payment processing solutions for you. Click to apply for a SolidTrust Pay business/merchant account now!
We often work 1-on-1 through dedicated merchant support with individuals to provide a more tailored experience for business models that require special attention. We welcome new online merchants who are interested in working with a payment processor that prides itself on top-notch customer support and high security standards, and encourage entrepreneurs with new, innovative and even higher-risk business models who are turned away by other processors to apply for a merchant account with us.
We offer a number of tools to facilitate online business, including payment buttons (which allow other SolidTrust Pay members to make purchases directly through a merchant’s website), as well as direct credit card purchases for customers who do not have SolidTrust Pay accounts and our recently added Bitcoin payment buttons.
Integration with SolidTrust Pay is incredibly simple. Add a snippet of code to your website in the customer purchase area and you’re done! Clients are redirected to our secure checkout page and their transaction is completed in seconds. If you have an SSL secured website, you may choose our non-redirect “invisible API” option, giving your customers a seamless purchasing experience.
Because online accountability and security is our business, we verify all of our SolidTrust Pay merchants to maximize their account and create a secure experience. All we require is the following:
- The name of your company.
- Your business model: An overall explanation of the business you have.
- Website URL: The address of your business website. We do not allow merchants to operate through social networking sites, instant messaging applications, forums, or other media.
- Company documentation: Any corporate papers (for example, certificate of incorporation or other business registration documents), business registration number, or EIN (employer identification number).
It’s simple. It’s functional. It’s trusted worldwide. When money matters, choose SolidTrust Pay for all your merchant account, eWallet and payment processing needs.
The hackers responsible for last week’s globe-spanning ransomware attack have made a public statement for the first time since the attack.
The group responsible for #NotPetya have allegedly surfaced on the deep web with a statement offering the decryption key to all files encrypted by the ransomware they unleashed from Ukraine last week.
The post was first picked up by Motherboard after the group used the Bitcoin wallet associated with the ransomware to make a small donation to the Tor-only announcement service DeepPaste, which is where the message appeared.
The message makes a request for 100 bitcoins, which is over $250,000 in today’s market.
According to The Verge, “the message includes a file signed with Petya’s private key, which is strong evidence that the message came from the group responsible for Petya. More specifically, it proves that whoever left the message has the necessary private key to decrypt individual files infected by the virus.”
There was also a link to a chatroom included in the messages. During an interview conducted in the chatroom, someone claiming to be one of the malware authors told Motherboard that the price was so high because it’s for the key “to decrypt all computers.”
Motherboard offered the unknown group an individual file that had been decrypted by the malware and asked them to send it back decrypted as proof that they had the decryption key. The unknown individuals in the chatroom were unable or unwilling to decrypt the file.
Some are still convinced that this attack has nothing to do with money or ransomware.
“This is a fear, uncertainty and doubt case,” claimed the founder of Comae Technologies Matt Suiche in an online chat with Motherboard. “This is a clear attempt from the attackers to try to further confuse the audience by changing the wiper narrative into a ransomware one again.”