{"id":18950,"date":"2022-05-05T04:10:05","date_gmt":"2022-05-05T12:10:05","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2022\/05\/05\/news-12683\/"},"modified":"2022-05-05T04:10:05","modified_gmt":"2022-05-05T12:10:05","slug":"news-12683","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/05\/05\/news-12683\/","title":{"rendered":"It&#8217;s business as usual for REvil ransomware"},"content":{"rendered":"<p><strong>Credit to Author: Jovi Umawing| Date: Thu, 05 May 2022 11:24:03 +0000<\/strong><\/p>\n<p>After <a href=\"https:\/\/blog.malwarebytes.com\/ransomware\/2022\/01\/revil-ransomware-gang-busted-by-russian-federal-security-service\/\">the FBS arrested 14 of its members<\/a> in January, and a subsequent lull in action, the <a href=\"https:\/\/blog.malwarebytes.com\/threat-spotlight\/2019\/07\/threat-spotlight-sodinokibi-ransomware-attempts-to-fill-gandcrab-void\/\">REvil ransomware<\/a> gang appears to be back. We say &#8220;appears&#8221; because it&#8217;s still unclear whether the group&#8217;s operations have indeed restarted.<\/p>\n<p>To the trained eye, REvil&#8217;s movements seem out of sorts. When <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/revils-tor-sites-come-alive-to-redirect-to-new-ransomware-operation\/\" target=\"_blank\" rel=\"noreferrer noopener\">REvil&#8217;s old Tor infrastructure came back to life<\/a> in April, it was modified to redirect visitors to URLs owned by a new ransomware group. The sites the nodes point to looked nothing like REvil&#8217;s. And its data leak blog is prepopulated with new ransomware victims and old REvil victims.<\/p>\n<p>&#8220;And they are recruiting,&#8221; <a href=\"https:\/\/twitter.com\/MarceloRivero\/status\/1516845220293496833\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">added<\/a> Malwarebytes Threat Intelligence Analyst Marcelo Rivero.<\/p>\n<h2>REvil ransomware: a brief look back<\/h2>\n<p>When the REvil ransomware gang began its operations in 2019, it started strong. REvil, also known as Sodinokibi or Sodin, was <em>the<\/em> new <a href=\"https:\/\/blog.malwarebytes.com\/glossary\/ransomware-as-a-service\/\">RaaS (ransomware as a service)<\/a> of the criminal underground, filling the hole GandCrab left behind.<\/p>\n<p>Like any &#8220;<a href=\"https:\/\/blog.malwarebytes.com\/glossary\/big-game-hunting-bgh\/\">big-game hunting<\/a>&#8221; operator, REvil only targets high-earning organizations. The logic behind this is that such targets are presumed to pay up, even a high ransom. They presumed correct.<\/p>\n<p>2021 was the ransomware gang&#8217;s last year of activity. <a href=\"https:\/\/blog.malwarebytes.com\/ransomware\/2021\/06\/jbs-says-it-is-recovering-quickly-from-a-ransomware-attack\/\">REvil attacked JBS<\/a>, one of America&#8217;s largest meat and poultry processors, in June. JBS underwent recovery proceedings immediately after the attack, unlike other ransomware victims. It was revealed months after that the company <a href=\"https:\/\/www.bbc.co.uk\/news\/business-57423008\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">paid REvil<\/a> to the tune of $11M (\u00a37.8M).<\/p>\n<p>In July, <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2021\/07\/shutdown-kaseya-vsa-servers-now-amidst-cascading-revil-attack-against-msps-clients\/\">REvil attacked Kaseya<\/a>, the company behind Kaseya VSA, a popular remote monitoring and management software. The ransomware gang asked for a whopping $70M ransom, but the company didn&#8217;t pay. Instead, it used a decryption key &#8220;from a third party&#8221; to decrypt all its encrypted files.<\/p>\n<p>Many suspected that something was up. Kaseya could not give any more details, as it was bound by an NDA (non-disclosure agreement), but the ransomware gang claimed that <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/revil-ransomware-is-back-in-full-attack-mode-and-leaking-data\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">the decryptor was leaked by one of its operators<\/a>.<\/p>\n<h2>Is REvil really back?<\/h2>\n<p>A ransomware sample is needed to dispel speculations on whether REvil has re-emerged or not. Sure enough, cybersecurity researcher Jakub Kroustek (<a href=\"https:\/\/twitter.com\/JakubKroustek\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">@JakubKroustek<\/a>) discovered one recently.<\/p>\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\">\n<div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">A few hours ago, we blocked a <a href=\"https:\/\/twitter.com\/hashtag\/ransomware?src=hash&amp;ref_src=twsrc%5Etfw\">#ransomware<\/a> sample in-the-wild that looks like a new <a href=\"https:\/\/twitter.com\/hashtag\/Sodinokibi?src=hash&amp;ref_src=twsrc%5Etfw\">#Sodinokibi<\/a> \/ <a href=\"https:\/\/twitter.com\/hashtag\/REvil?src=hash&amp;ref_src=twsrc%5Etfw\">#REvil<\/a> variant. Timestamp 2022-04-27, new config, new mutex, campaign ID, etc. Funny thing&#8230; it does not encrypt files; only adds a random extension <img decoding=\"async\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/13.1.0\/72x72\/1f914.png\" alt=\"\ud83e\udd14\" class=\"wp-smiley\" style=\"height: 1em; max-height: 1em;\" \/> 42 BTC <a href=\"https:\/\/t.co\/UL1ECGLpmg\">https:\/\/t.co\/UL1ECGLpmg<\/a> <a href=\"https:\/\/t.co\/A8p5SLjcZr\">pic.twitter.com\/A8p5SLjcZr<\/a><\/p>\n<p>&mdash; Jakub Kroustek (@JakubKroustek) <a href=\"https:\/\/twitter.com\/JakubKroustek\/status\/1520135975262957568?ref_src=twsrc%5Etfw\">April 29, 2022<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script> <\/div>\n<\/figure>\n<p>Multiple security researchers who looked into the sample said they noticed a few changes to the code based on old REvil ransomware code. The most notable changes in the encryptor are the version, the new <code>accs<\/code> configuration option, and the campaign and affiliate identifiers. <\/p>\n<p>In an interview with BleepingComputer, Advanced Intel CEO Vitali Kremez <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/revil-ransomware-returns-new-malware-sample-confirms-gang-is-back\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">said<\/a> he believes this option &#8220;is used to prevent encryption on other devices that do not contain the specified accounts and Windows domains, allowing for highly targeted attacks.&#8221;<\/p>\n<p>When asked about his thoughts, Rivero said, &#8220;I think this REvil sample is just a test file because it doesn&#8217;t encrypt.&#8221;<\/p>\n<p>On top of this, the sample also adds a random extension name to affected files and creates a ransom note\u2014both as text and HTML files\u2014identical to old REvil&#8217;s. The web version of the ransom note links users back to new paid Tor sites and the new data leak blog.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"56347\" data-permalink=\"https:\/\/blog.malwarebytes.com\/ransomware\/2022\/05\/its-business-as-usual-for-revil-ransomware\/attachment\/mwb-tor-ransom-note-revil\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/mwb-tor-ransom-note-revil.png\" data-orig-size=\"1025,1192\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"mwb-tor-ransom-note-revil\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/mwb-tor-ransom-note-revil-258x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/mwb-tor-ransom-note-revil-516x600.png\" width=\"516\" height=\"600\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/mwb-tor-ransom-note-revil-516x600.png\" alt=\"\" class=\"wp-image-56347\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/mwb-tor-ransom-note-revil-516x600.png 516w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/mwb-tor-ransom-note-revil-258x300.png 258w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2022\/05\/mwb-tor-ransom-note-revil.png 1025w\" sizes=\"auto, (max-width: 516px) 100vw, 516px\" \/><figcaption>The new REvil ransomware note.<\/figcaption><\/figure>\n<\/div>\n<p>Malwarebytes detects this new REvil sample as Sodinokibi.Ransom.Encrypt.DDS.<\/p>\n<h2>What should previous victims do now?<\/h2>\n<p>When REvil&#8217;s servers disappeared on an early Tuesday morning in July 2021, current victims of the ransomware gang were left stumped, not knowing what to do next. They were stuck in mid-negotiations, fearing they might never hear from the gang again, leaving their essential files encrypted forever.<\/p>\n<p>With REvil back and the new operators apparently inheriting former victims of the old ransomware gang, what does this mean for victims?<\/p>\n<p>It&#8217;s almost a year since REvil&#8217;s infrastructure went dark, and victim companies may have already moved on or sought help from law enforcement. Either way, REvil might one day come knocking at their digital doors to pick up where it left off.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/ransomware\/2022\/05\/its-business-as-usual-for-revil-ransomware\/\">It&#8217;s business as usual for REvil ransomware<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/ransomware\/2022\/05\/its-business-as-usual-for-revil-ransomware\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Jovi Umawing| Date: Thu, 05 May 2022 11:24:03 +0000<\/strong><\/p>\n<p>A sample of the new REvil ransomware was found in the wild, signaling that, yes, REvil has indeed come back.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/ransomware\/2022\/05\/its-business-as-usual-for-revil-ransomware\/\">It&#8217;s business as usual for REvil ransomware<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[17363,12247,25987,25988,11597,3765,11598,22297,24878,22298,22299],"class_list":["post-18950","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-gandcrab","tag-jakub-kroustek","tag-jbs","tag-kaseya","tag-raas","tag-ransomware","tag-ransomware-as-a-service","tag-revil","tag-revil-ransomware","tag-sodin","tag-sodinokibi"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18950","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=18950"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/18950\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=18950"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=18950"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=18950"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}