REvil ransomware gang sites mysteriously stop working ngừng

The REvil ransomware infrastructure and websites have been mysteriously down since last night (the night of July 13).

The REvil ransomware group, aka Sodinokibi, uses a variety of clean and dark web sites to negotiate ransoms, share stolen data, and serve as backend infrastructure.

Starting last night, the websites and infrastructure owned by the REvil ransomware group mysteriously stopped working.

"In a word, their onion website is offline or disabled. To be sure, you need to contact the administrator of this site," - BleepingComputer quoted Al Smith of the Tor Project.

Picture 1 of REvil ransomware gang sites mysteriously stop working ngừng

While it's not uncommon for REvil's websites to lose connection for a while, it's unusual for all of them to go down altogether.

Furthermore, the fact that the decoder[.]re clean site is not responding to DNS queries indicates that the DNS records for the domain have been affected or that the DNS infrastructure is disabled.

Picture 2 of REvil ransomware gang sites mysteriously stop working ngừng

According to Recorded Future expert Alan Liska, REvil's websites went offline around 1am on July 13.

On the afternoon of the same day, a representative of the LockBit ransomware posted on the XSS hacking forum that the REvil gang deleted their server after learning that they had to appear in court.

"According to unverified information, REvil server infrastructure received a government legal request, forcing REvil to completely delete server infrastructure and disappear. However, that has not been confirmed. received", BleepingComputer quoted a post by a LockBit ransomware representative.

Picture 3 of REvil ransomware gang sites mysteriously stop working ngừng

Soon after, the XSS admin banned Unknown, the public representative of the REvil ransomware gang, from operating on the forum.

Picture 4 of REvil ransomware gang sites mysteriously stop working ngừng

Advanced Intel's Vitali Kremez explains: 'As a rule of thumb, administrators of forums would ban members from being active while under suspicion by the police.

On July 2, the REvil ransomware gang encrypted about 60 managed service providers (MSPs) and more than 1,500 small businesses using a zero-day vulnerability in the Kaseya VSA remote management software. .

As part of these attacks, REvil initially demanded a ransom of $70 million, but later reduced it to $50 million.

Since then, the REvil ransomware group has come under closer scrutiny by law enforcement.

Because these ransomware gangs often operate outside of Russia, President Biden negotiated with President Putin about the attacks and warned that, if Russia did not take action against them, the United States would automatically problem solving.

At this time, it is not clear whether REvil's servers are down for technical reasons or the impact of Russian or US law enforcement agencies.

Other ransomware groups, such as Darkside and Babuk, voluntarily ceased operations due to legal pressure.

However, when ransomware groups close down, they often renew their money to continue the attack. This has happened in the past when GandCrab closed and many members of the group reactivated under the name REvil.

Babuk also reactivated as Babuk v2.0 after the group disbanded due to differences in the way attacks were carried out.

The FBI declined to comment on the incident.

Update 14 July 2021
Category

System

Mac OS X

Hardware

Game

Tech info

Technology

Science

Life

Application

Electric

Program

Mobile