Shutterstock
Recent observations created by cyber security scientists have led a lot of to feel that the REvil ransomware team, or a different group with ties to REvil, is working a new ransomware procedure.
Sometimes referred to as Sodinokibi, REvil was responsible for some of the most superior-profile ransomware attacks of 2021, which includes the hacks on JBS Food items and Kaseya, in advance of shutting down towards the conclusion of the 12 months.

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).
➤ Get Mullvad VPN with 12% Discount
Some scientists famous the return of REvil’s ‘happy blog’ – the put in which it declared its hacks – on 19 April, returning an Nginx 404 mistake. Other folks claimed the indications of a return started off as significantly back as December, one particular thirty day period after law enforcement created the first arrests of the gang members.
Employing the TOR onion address utilised for REvil’s primary joyful website, future people are now redirected to a new site in which there are at this time 26 pages loaded with particulars of the group’s productive hacks, largely aged hacks beforehand claimed by REvil.
Among the new additions is Oil India, which disclosed a cyber security incident past week, and Visotec Team, which has not publicly disclosed any breach but, and its web page is still online.
The website notes that Oil India will not continue a negotiation process, a conclusion that has led the team to leak internal money documents and contracts.
In addition to the old content website onion backlink redirecting to the new web-site, yet another observation made by scientists was that REvil’s old TOR payment domains are also redirecting to the new blog site also.
The URL for REvil’s old leak web page now redirects to a new just one, which lists both of those outdated and seemingly new victims. And they’re recruiting. h/t @pancak3lullz @S0ufi4n3 1/2 pic.twitter.com/cLB513qDwY
— Brett Callow (@BrettCallow) April 20, 2022
The new weblog also has a recruitment website page that information the proposed 80/20 split of the ransom payment in between the gang by itself and the hacker who breached a corporation, plus specifics on how to exhibit encounter with hacking.
Though a concrete link among the emergence of the new blog site and REvil are not able to definitively be designed, whoever placed the redirect on
Even though an formal announcement has not been designed linking the new weblog to the REvil gang, the folks responsible for positioning a redirect on REvil’s aged web page and payment hyperlink would have had access to the aged infrastructure, primary a lot of to consider the infamous ransomware operators are back.
The announcement will come months following a Russian formal claimed the US ceased negotiations with the region on matters of cyber security, suggesting the US was the aggressor in cyber area, not Russia.
The cyber security authorities of 5 Eyes alliance customers also reiterated on Wednesday that organisations need to prepare for Russian condition-sponsored cyber attacks, significantly targeted on critical infrastructure.
A short history of REvil
REvil is a ransomware team considered to be primarily based in Russia and has claimed duty for various hacks involving ransomware in modern a long time.
Days right after the massively impactful hack on Kaseya in 2021, REvil disappeared for months, several presuming they captivated too much focus from regulation enforcement provided the global disruption it caused.
REvil briefly reactivated elements of its infrastructure months later on, together with its primary pleased website and the on the net portal it utilised to negotiate ransom payments with victims.
Intercontinental legislation enforcement businesses arrested various Ukrainian and Russian alleged REvil members in November, with the Russian state also arresting much more folks in January of this calendar year, top some industry experts into believing the move could be utilized as political leverage in opposition to the US.
It’s popular for ransomware teams to go by intervals of action and inactivity, the latter of which is usually masked guiding a pretend ‘shutdown’ before the team resurfaces below a new branding and a refreshing moniker.
Some pieces of this report are sourced from:
www.itpro.co.uk