• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

JBS Admits Paying REvil Ransomware Group $11 Million

You are here: Home / General Cyber Security News / JBS Admits Paying REvil Ransomware Group $11 Million
June 10, 2021

A meat processing huge recently strike by ransomware has verified it compensated its extorters $11 million, reigniting the debate about the ethics of performing so.

A statement posted by Sao Paolo-headquartered JBS, whose US and Australia companies were hit in the incident past week, claimed that at the time of payment, the “vast majority” of its facilities were being operational.

“In consultation with inner IT professionals and third-party cybersecurity industry experts, the organization made the conclusion to mitigate any unforeseen issues similar to the attack and make sure no info was exfiltrated,” it included.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Commonly, the attackers have presently exfiltrated sensitive data in these attacks, and payment is built to protect against them from publishing it.

Having said that, there is no warranty that the attackers will not test to monetize the information in any case.

Previous November, a Coveware report claimed that info exfiltration is now a tactic in in excess of 50 % of ransomware attacks.

It warned that teams these as REvil (Sodinokibi), which was blamed for the JBS attack, sometimes even now publish data following payment, and, in some instances, demand from customers a second payment.

It’s unclear regardless of whether JBS paid out the ransom with the expectation its insurance plan supplier would go over it. The issue is progressively controversial, with AXA just lately stating that it would quit reimbursing clients in France for ransom payments.

“This was a incredibly complicated conclusion to make for our corporation and for me personally,” mentioned Andre Nogueira, CEO of JBS United states. “However, we felt this selection experienced to be made to prevent any likely risk for our clients.”

The firm’s assertion goes on to boast a $200 million yearly IT budget and state that its skill to bounce back again swiftly from the attack was owing to “its cybersecurity protocols, redundant techniques and encrypted backup servers.”

Edgard Capdevielle, CEO of Nozomi Networks, argued that enterprises need to now be geared up for the unavoidable ransomware attack.

“That’s why in addition to strengthening cybersecurity defenses, it’s equally vital to invest in enterprise resilience in the encounter of an attack,” he extra.

“This post-breach mindset establishes a potent cybersecurity lifestyle that asks the hard queries, anticipates worst-scenario eventualities and establishes a restoration and containment approach aimed at maximizing your organization’s resiliency, very long right before an attack happens.”

It’s typically suggested that victims do not pay out ransomware groups as it only encourages more of the identical malicious activity. Having said that, when critical supply chains are included, it is not very so basic.

“Naive statements like ‘never pay out the ransom’ only overlook the truth of the circumstance and do not have any likelihood in essentially modifying anything,” argued John Bambenek, Menace Intelligence Advisor at Netenrich.

“President Biden’s assembly with Vladimir Putin future 7 days is critical in making an attempt to transform the trajectory of this danger to carry the rogue point out dependable for harboring this menace to heel.”


Some elements of this write-up are sourced from:
www.infosecurity-journal.com

Previous Post: «using breached password detection services to prevent cyberattack Using Breached Password Detection Services to Prevent Cyberattack
Next Post: Emerging Ransomware Targets Dozens of Businesses Worldwide emerging ransomware targets dozens of businesses worldwide»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • OpenAI Unveils Aardvark: GPT-5 Agent That Finds and Fixes Code Flaws Automatically
  • Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack
  • China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats
  • China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems
  • The MSP Cybersecurity Readiness Guide: Turning Security into Growth
  • CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers
  • Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery
  • CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks
  • A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do
  • Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month

Copyright © TheCyberSecurity.News, All Rights Reserved.