Ransomware Resurrection? REvil Servers Come Back Online



Ransomware ResurrectionAfter months of what was thought to be the retirement of the REvil ransomware gang, REvil-related systems and Tor sites popped up on the Dark Web last week.

We thought we had seen the last of REvil – one of the most prolific and impactful pieces of ransomware to date. Its ransomware-as-a-service model made it a popular variant used in some of the most well-known attacks this year, taking in tens of millions of dollars in the process. It was thought that REvil had become Darkside and then BlackMatter (which may still be true), but last week’s development may change that.

According to Bleeping Computer, on September 7, both the Tor payment/negotiation site and REvil's Tor 'Happy Blog' data leak site suddenly came back online. The negotiation site did not seem to be functional and the data leak site hadn’t been updated since July 28th.

This may be a mishap due to booting up old systems that are to be repurposed. But even so, it’s a reminder that some of the greatest minds in ransomware can easily “re-band” as easily as they can disband, putting organizations like yours further at risk.

Security Awareness Training plays a major role in the protection against ransomware attacks. Affiliates for REvil and other RaaS variants still need a way to gain entrance into an organization. Phishing is one of the most used initial attack vectors. By implementing Security Awareness Training, organizations can teach users to participate in the organization’s security stance, being continually vigilant against any email or web content that may seem suspicious, helping to minimize the likelihood of engagement with malicious links or attachments.


Free Ransomware Simulator Tool

Threat actors are constantly coming out with new strains to evade detection. Is your network effective in blocking all of them when employees fall for social engineering attacks?

KnowBe4’s "RanSim" gives you a quick look at the effectiveness of your existing network protection. RanSim will simulate 24 ransomware infection scenarios and 1 cryptomining infection scenario and show you if a workstation is vulnerable.

RansIm-Monitor3Here's how it works:

  • 100% harmless simulation of real ransomware and cryptomining infections
  • Does not use any of your own files
  • Tests 25 types of infection scenarios
  • Just download the install and run it 
  • Results in a few minutes!

Get RanSim!

PS: Don't like to click on redirected buttons? Cut & Paste this link in your browser:

https://www.knowbe4.com/ransomware-simulator

Topics: Ransomware



Subscribe to Our Blog


Comprehensive Anti-Phishing Guide




Get the latest about social engineering

Subscribe to CyberheistNews