REvil Takes Credit for Kaseya Attack and Asks for $70 Million

Illustration for article titled REvil Gang Takes Credit for Massive Kaseya Attack and Asks for $70 Million Ransom

Photo: Nicolas Asfouri / AFP (Getty Photos)

The REvil ransomware gang has taken credit for the Kaseya attack that has affected more than 1,000 companies worldwide and led to an investigation by U.S. intelligence companies. The criminals are inquiring for a $70 million ransom in bitcoin to publish a public popular decryptor that can release all affected computers.

As reported by the Story, REvil posted a message accepting duty for the attack on its sad internet blog. The ransomware gang, which had been suspected of being the culprit sooner than it went public, furthermore shed additional light on the purported scale of the attack, claiming that more than a million methods had been contaminated. Kaseya reported the attack closing Friday.

REvil, continuously called Sodinokibi, is a notorious cybercriminal gang that has outdated ransomware to head after righteous name companies, together with Apple and Acer. Most recently, it targeted JBS, the enviornment’s biggest meat processing firm, which paid it $11 million in bitcoin to mitigate fallout from the attack and give protection to its records.

“On Friday (02.07.2021) we launched an attack on MSP suppliers. Bigger than a million methods had been contaminated,” the REvil gang said, based totally on the Story. “If someone wants to negotiate about popular decryptor–our tag is 70 000 000$ in BTC and we can publish publicly decryptor that decrypts recordsdata of all victims, so each person will seemingly be ready to procure effectively from attack in less than an hour. Once you is seemingly to be drawn to such deal–contact us the utilization of victims ‘readme’ file directions.”

Dana Liedholm, a Kaseya spokesperson, told Gizmodo on Monday that the FBI and other just groups cling said with confidence that REvil had applied the attack and that the firm became once trusting these experts.

G/O Media would possibly possibly procure a rate

“Concerning ransom we’re no longer commenting on this as it’s a criminal investigation and we are able to’t at the present,” Liedholm said.

The Kaseya attack is what’s called a tool present chain ransomware attack, whereby a cyber threat actor infiltrates a tool supplier’s community and sends malicious code to compromise the intention sooner than the supplier sends it out to its customers. The contaminated intention then impacts the customers’ records or methods. The hackers that targeted SolarWinds’ intention outdated this kind of attack to infiltrate essential U.S. federal companies and companies.

Kaseya, meanwhile, sells its merchandise to managed carrier suppliers, or MSPs, that are companies that offer a ways flung IT services and products to tons of of smaller companies that don’t cling the assets to have interaction those capabilities themselves. MSPs employ Kaseya’s VSA cloud platform to administer and ship intention updates to these companies moreover to resolve other components.

In Kaseya’s case, preliminary experiences inform that REvil won procure entry to to the firm’s backend infrastructure and outdated it ship an replace with malware to VSA servers running on client premises. The malicious replace then effect in the ransomware from the VSA server on all connected computers, the Story states. This, in turn, spread the ransomware to other companies that had been connected to the VSA methods. Nonetheless, specifics on the attack are peaceable unsure, and records is evolving continuously.

In its Monday replace at 1 p.m. ET relating to the inform of affairs, Kaseya said that everyone on-premises VSA servers would possibly possibly peaceable continue to dwell offline until customers receive directions from Kaseya about when it’s powerful to restore operations. On Sunday, Kaseya CEO Fred Voccola said the firm knew how the attack had took space and that it became once remediating it.

If Kaseya, or any of the opposite companies affected, pay REvil’s $70 million ransom, it is miles also the most effective ransomware price ever made.

0 0 vote
Article Rating
Notify of
Inline Feedbacks
View all comments
Would love your thoughts, please comment.x