Starting last night, the infrastructure and the websites used by the REvil ransomware gang were mysteriously unreachable, BleepingComputer first reported.
“The REvil ransomware operation, aka Sodinokibi, operates through numerous clear web and dark web sites used as ransom negotiation sites, ransomware data leak sites, and backend infrastructure.” reported BleepingComputer. “Starting last night, the websites and infrastructure used by the REvil ransomware operation have mysteriously shut down.”
The Tor leak site, the payment website “decoder[.]re”, and their backend infrastructure went offline simultaneously.
At the time of this writing, it is not clear if the operators shut down the operations due to the pressure of law enforcement after the recent Kaseya massive ransomware attack or if the infrastructure was seized as a result of an operation conducted by law enforcement.
However there is no banner of the websites used by REvil that informs visitors of the seizure of the infrastructure by the authorities.
As part of the Kaseya attack, REvil ransomware operator demanded $70 million for a universal decryptor that could be used by all the organizations impacted by the attack.
The victims of the attack opted out to do not pay the ransomware and while the law enforcement are investigating the case.
We cannot exclude that the cybercriminals decided to temporarily disappear due to the ongoing investigation, or that some members of the gang decided to leave it fearing of being arrested.
(SecurityAffairs – hacking, REvil ransomware)
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.