I'd imagine you could probably set up a honeypot situation and just have a bunch of important sounding files for idiots to encrypt with ransomware. Eventually they would probably try to use your machine as a VPN or Tor endpoint if they didn't notice immediate activity, and you could strike and see if you could brick their machines with one of those insane viruses that exists in firmware so wiping the machine cant remove it. I'd pay to see that.