Kaseya’s REvil Ransomware Attack Hits 40 Customers worldwide & Hackers Ask’s $70 Million

https://gbhackers.com/kaseyas-revil-ransomware-attack/

Recently a cyberattack struck the American MSP supplier Kaseya, and the specialists have declared that this attack is one of the largest in the history of ransomware attacks.

Nevertheless, the specialists estimated that the hackers will do so to distribute the malicious update and set up the ransomware on VSA servers working on the networks of the businesss consumers.

The head of DIVD, Victor Gevers declined to divulge any further details concerning the vulnerability. But, the very first entity that reported this occurrence, Huntress Labs noted that this vulnerability is about an authentication bypass vulnerability in the VSA web user interface.

Presently, it is not understood for sure how this attack is being brought out, however it appears to be affecting both Kaseya and its 40 Customers in addition to their clients worldwide.

Further information

Here they declared that the hackers carried out SQL commands on the VSA gadgets to install ransomware on all linked customers by utilizing the bypass the authorization on the VSA web panel.

REvil Ransomware also known as Sodinokibi observed wild at the end of April 2019. The REvil ransomware is a part of Ransomware-as-a-Service (RaaS) where a set of people keep the source code and other affiliate groups disperse the ransomware.

However, the researchers at Dutch non-profit organization DIVD verified the hackers exploited an unidentified 0-day vulnerability in the Kaseya VSA server.

The enemies behind this incident, which impacted numerous companies utilizing Kaseya software application, is the ransomware group “REvil.” And not only that even to supply a universal decryptor the operator of REvil has actually demanded $70 million in bitcoins to unlock all the encrypted systems.

As soon as the server is contaminated, the malware shuts down administrative gain access to and begins securing data, the precursor to the full ransomware attack cycle. When the file encryption process is complete, the systems desktop wallpaper is set as follows.

The head of the DIVD, Victor Gevers asserted that when Kaseya was attacked at that time Kaseya was in the procedure of patching a 0-day (CVE-2021-30116) vulnerability.

Apart from this, more than 1 million systems were contaminated with this ransomware, as the hackers have claimed on their darknet website. It was assumed initially that operators of REvil ransomware might get to the Kaseya backend facilities.

Ransomware Gang Demand $70 Million Ransom

Early last month REvil extorted $11 million from the meat-processor JBS, and since April 2019 REvil is active. And now for a universal decryptor, the hackers have asked Kaseya $70 million as a ransom payment.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity and hacking news updates.

While apart from this, over the weekend the researcher at ESET has tape-recorded a record swell in infections with the REvil ransomware, and they associate this with the Kaseya incident.

The business stated that it has actually recognized the vulnerability and is preparing a fix, and not just this, even they have likewise supplied a brand-new tool known as Compromise Detection Tool to inspect servers for hacks to all its customers.

According to the reports, this substantial ransom amount is the biggest ransom payment ever demanded by any ransomware operator.