Kaseya deploying ransomware decryptor key on victims of REvil attack
Kaseya, the information technology company whose software was exploited to deliver the REvil ransomware strain to its customers this month, announced it has obtained a universal decryptor key that restores infected systems.
Nearly three weeks after the crippling supply-chain attack, Kaseya said Thursday that it recently acquired the decryptor key and was successfully using it to restore customer systems that remain affected.
âWe can confirm that Kaseya obtained the tool from a third party and have teams actively helping customers affected by the ransomware to restore their environments, with no reports of any problem or issues associated with the decryptor,â Kaseya stated on its website, adding it was working with Emsisoft, a New Zealand-based anti-virus firm that specializes in helping victims rebound from ransomware attacks.
Kaseya did not offer details about the origins of the decryptor. A spokesperson for the Florida software company told reporters the key came from a âtrusted third partyâ but did not specify further.
âWe are working with Kaseya to support their customer engagement efforts,â Emsisoft said in a statement, adding it âconfirmed the key is effective at unlocking victimsâ of the wide-scale ransomware attack.
REvil existed until recently as a ransomware-as-a-service operation. REvilâs developers licensed the custom malware to affiliates in exchange for a cut of any ransom payments received from their victims.
In addition to holding data hostage, REvil attackers occasionally also exfiltrated and then published online sensitive material stolen from victims who the attackers said failed to pay whatever sum was requested.
Kaseya announced July 3 that it was the victim of a âsophisticated cyberattackâ in which its remote access software had been hacked and then used to attack its customers with the REvil ransomware strain.
Up to 1,000 businesses were affected by the attack, Kaseya has said, among them Coop, a Swedish supermarket chain that said it was forced to close hundreds of its stores for several days.
Victims of the attack were told by the perpetrators to pay a ransom to regain access to affected systems, and websites associated with REvil later offered to sell a master decryptor key for $70 million.
REvil vanished July 13, however, when all known websites and online infrastructure associated with the gang went offline, denying their victims a way of reaching the perpetrators should they wish to pay.
It was not clear if Kaseya had bought the master key from the ransomware gang or obtained it by other means.
âWe canât share the source but can say itâs from a trusted third party,â Kaseya spokesperson Dana Liedholm told reporters.
The White House says REvil was likely based in Russia. President Biden said he warned Russian President Vladimir Putin to rein in ransomware attacks coming from his country days before REvil vanished.
The FBI advises ransomware victims against paying.
Sign up for Daily Newsletters
0 Response to "Kaseya deploying ransomware decryptor key on victims of REvil attack"
Post a Comment