Ransomware Gang REvil Is Cancelled

A number of websites for a Russian-linked ransomware gang that has been accused of attacks on hundreds of businesses worldwide has now gone offline. The cyber crime group has collected tens of millions of dollars in ransom payments in return for restoring computer systems it has hacked. 

A payment website and REvil ‘s group blog now do not work and this may perhaps be a result the group being focused upon by various Russian government authorities. This coincides with growing pressure by the US on Russia over cyber crime. 

Ransomware sites can be unreliable, and it was unclear whether the site's disappearance was a momentary fluke or whether the hackers had downed tools or been removed from the internet by someone else. Both the group's payment portal and its blog, which named and shamed their victims who refused to pay the ransoms they demanded, were unreachable.
 

US President Joe Biden said he raised the issue with Vladimir Putin during a phone call after discussing the subject during a summit with the Russian president in Geneva last month. Mr Biden told reporters that he had spoken with President Putin and "made it very clear to him...we expect them to act" on information before the US would potentially attack the operators.
The news comes just days after White House press secretary Jen Psaki made it clear during a news conference that the US would take action against the groups if Russia did not.

The timing of has sparked speculation that either the US or Russian officials may have taken action against REvil, although officials have so far declined to comment and cyber experts say sudden disappearances of groups are not necessarily uncommon.

The development comes after a series of high-profile ransomware attacks which have hit major US businesses this year for which the FBI hold REvil - also known as Sodinokibi - of being behind.

The group is considered prolific and recently  targeted IT firm Kaseya and hundreds more businesses worldwide. It is not clear what led to the websites of the ransomware-as-service group going down. Visitors to the sites, which had recently been active, were greeted with messages saying, “A server with the specified hostname could not be found.”  

Reuters:      BBC:       CNBC:       Yahoo:       NDTV:    

You Might Also Read:

Minimising The Impact Of Ransomware:

 

 

« Autonomous Ships And Cyber Security
Scientists Say Social Media Is A Risk To Humanity »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

KPMG

KPMG

KPMG s a leading provider of professional services including information technology and cyber security consulting.

CERT.br

CERT.br

The Brazilian national Computer Emergency Response Team

ASU Online - Information Technology Program

ASU Online - Information Technology Program

The Information Technology program at ASU Online provides you with the expertise to design, select, implement and administer computer-based information solutions.

NAVEX Global

NAVEX Global

NAVEX Global’s compliance management system consolidates your entire GRC program onto a scalable cloud-based platform.

Brighter AI

Brighter AI

Brighter AI empowers companies to use publicly-recorded camera data for analytics & AI while being compliant with increasing data privacy regulations worldwide.

Razorpoint Cybersecurity

Razorpoint Cybersecurity

Razorpoint’s world-class security experts have provided advanced, effective cybersecurity expertise to corporate and public-sector organizations around the world.

Network Utilities (NetUtils)

Network Utilities (NetUtils)

Network Utilities provide identity centric network and security solutions to organisations from Telecoms and ISPs to SMEs and large corporates.

AdEPT Technology Group

AdEPT Technology Group

AdEPT are a managed services and telecommunications provider offering award-winning, proven and uncomplicated technical solutions for over 12,000 organisations across the UK.

Cybots

Cybots

Cybots is a multinational cyber defence brand founded in Singapore in 2018 to help organizations stay ahead of increasingly sophisticated threats from cyber criminals.

FiVerity

FiVerity

FiVerity provides financial institutions with cyber fraud defense to combat a dangerous and growing threat - the convergence of fraud-related theft with sophisticated, high-volume cyber attacks.

Cyberfort Group

Cyberfort Group

Cyberfort exists to provide our clients with the peace-of-mind about the security of their data and the compliance of their business.

Fortify 24/7

Fortify 24/7

Fortify 24×7 provides a robust portfolio of managed cybersecurity solutions to help you identify and prevent attacks.

BlueCat Networks

BlueCat Networks

BlueCat is the Adaptive DNS company. Our mission is to help the world’s largest organizations thrive on network complexity, from the edge to the core.

Exium

Exium

At Exium we’ve integrated networking and security in a cloud-delivered Zero Trust platform powered by 5G and open source.

WeVerify

WeVerify

WeVerify is a platform for collaborative, decentralised content verification, tracking, and debunking.

Digital Encode

Digital Encode

Digital Encode is a leading consulting and integration firm that specializes in the design, management, and security of business-critical networks, telecommunications, and IT infrastructures.