The notorious ransomware gang "REvil" (aka Sodinokibi) has vanished from the Internet without any explanation. The disappearance of REvil occurred around the same time that its representatives were banned from Russian-speaking cybercriminal forums and a group of REvil’s, “Prometheus”, removed all mentions of REvil from its site. The disappearance also came shortly after REvil took responsibility for a large-scale supply-chain attack via the software supplier Kaseya, which allegedly resulted in one million systems being encrypted. It is likely that this attack may have resulted in pressure from law enforcement and possibly arrests of affiliates. It is also possible that REvil may have received a substantial profit from recent campaigns and deliberately shut down operations. Whatever the reason for the group’s disappearance, this event is likely to impact the ransomware threat landscape. REvil was one of the first groups to utilize “double extortion” techniques and set the path many other ransomware groups followed.
Most Recent Flipbooks
The well-established “Mozi” peer-to-peer (P2P) botnet has developed new persistence capabilities.
A configurable, malicious Traffic Direction System (TDS) has been enabling widespread malware attacks.
A years-long reconnaissance campaign against an employee of a US aerospace defense company was discovered and attributed to “TA456”, an Iranian state-backed advanced persistent threat (APT) group.
The new “BlackMatter”, “Haron”, and “El_Cometa” ransomware groups, which surfaced in the past three weeks, bear significant similarities to ransomware groups that disappeared last month
A vulnerability in Kaseya’s virtual system/server administrator (VSA) software has been exploited to deliver the “REvil” ransomware to multiple managed service providers.
The 14th Five Year Plan (FYP) adopted by the People’s Republic of China (PRC) in March 2021 has laid out key areas of focus for the country that are likely to prompt nation-state cyber espionage.
Several Clop members were arrested in association with money laundering, and the officials seized infrastructure the group has used in ransomware attacks globally.
The notorious Russia-based ransomware group “REvil” (aka Sodinokibi) has been blamed for the latest high-profile ransomware attack, on the world’s largest meat supplier.
The latest work of the notorious Russian state-associated “NOBELIUM” threat group is an email phishing campaign against multiple countries and sectors.
US President Joe Biden recently signed an executive order (EO) aimed at strengthening network security for US federal government departments, and agencies and contractors working with them.
A “Conti” ransomware attack on Ireland’s healthcare system, the Health Service Executive (HSE), significantly delayed the delivery of medical laboratory results and affected many outpatient services.
Colonial Pipeline Company fell victim to a cyber attack that resulted in 5,500 miles of its US fuel pipelines being shut down, causing public distress and fears of fuel shortages.
Security researchers discovered two unrelated cyber-threat campaigns targeting Microsoft SharePoint.
The FBI made digital copies of malicious web-shells before removing them from hundreds of vulnerable servers in the US, without any warning to affected organizations.
A cyber-espionage campaign was found targeting the Vietnamese military and government, as well as other sectors and some entities in Thailand and Central Asia.