ReVil Ransomware Threatens to Squeeze Their Victims with Public Exposure of Data



Ransomware-ImageThe REvil Ransomware crew are getting ready to put more pressure on their ransomware victims to pay up by threatening to release data if the ransom isn't paid.

Our friends at Bleepingcomputer report that the REvil group is threatening to use exfiltrated data obtained before the encryption process to increase pressure on victims to pay up or face more consequences.

According to Bleeping Computer: “ In a new post to a Russian malware and hacker forum shared with us by security researcher Damian, the public-facing representative of the REvil ransomware known as UNKN states that a new "division" has been created for large operations."

"REvil goes on to say that if a company does not pay the ransom, the ransomware actors will publicly release the stolen data or sell it to competitors. It is in their opinion that this would be more costly to the victim than paying the ransom."  

This is not a first for this tactic. In early December ZDNET reported that CyrusOne data centers were hit by a Ransomware attack. A sample uploaded to VirusTotal determined the cause to be Sodinokibi/REvil. Bleeping Computer also reported that REvil persona UNKN "claimed " in a post on a Russian hacker forum that they retained and exposed data in that event.  In November, Allied Universal was the victim of the Maze ransomware attackTo apply pressure, the MAZE ransomware group uploaded a small portion of Allied Universal’s data to a hacking forum and continued to apply more leverage with elevated threats of additional exposure.

These tactics puts victims in a serious dilemma. If the victim doesn’t pay the ransom, the bad guys can continue to apply extortion pressure by threatening to expose more and more of the exfiltrated data either to the dark web, their competitors or the public. The attack then may be considered a data breach if any of the data exposed includes PII, (personally protected information)  protected Hipaa ( Health Insurance Portability and Accountability Act) information, or other "protected" data.

In addition to losing data, loss of business uptime,  remediation, and forensic examinations of the compromised computer systems, the threat of civil legal suits or other consequences may follow from third parties.  Ransomware continues to be a major threat.  Bleeping Computer has the details.


Free Ransomware Simulator Tool

How vulnerable is your network against ransomware attacks?

Bad guys are constantly coming out with new strains to evade detection. Is your network effective in blocking all of them when employees fall for social engineering attacks?

KnowBe4’s "RanSim" gives you a quick look at the effectiveness of your existing network protection. RanSim will simulate 15 ransomware infection scenarios and 1 cryptomining infection scenario and show you if a workstation is vulnerable.

RanSimScreen-1Here's how it works: 

  • 100% harmless simulation of real ransomware and cryptomining infections
  • Does not use any of your own files
  • Tests 16 types of infection scenarios
  • Just download the install and run it 
  • Results in a few minutes!

Get RanSim!

PS: Don't like to click on redirected buttons? Cut & Paste this link in your browser:

https://www.knowbe4.com/ransomware-simulator

Topics: Ransomware

Subscribe To Our Blog


Weak Password Test Contest




Get the latest about social engineering

Subscribe to CyberheistNews