REvil: Criminals that got a taste of their own medicine | Behind the hacks

Поделиться
HTML-код
  • Опубликовано: 6 июл 2024
  • 😈 Discover the story of the attack against the REvil group. 😈
    🚀 Enhance your online protection with a few clicks 📱👈
    🔥Get the special RUclips offer: content.nordvpn.com/3x6QzID 🔥
    ***
    The REvil ransomware group has caused massive disruptions over the years. Yet at some point, this notorious group got a taste of its own medicine. Who hacked the REvil group? How did this operation happen? Dive into the story about the REvil ransomware attack.
    Contents of the video:
    00:00 Intro
    00:15 What is the REvil group?
    01:25 How was REvil hacked?
    ***
    Hacking a hacker is fighting fire with fire. Using this dangerous strategy, a multi-nation team hit REvil, the notorious ransomware group.
    We’re about to dig deeper into this mission.
    What do we know about REvil? Even though its origins are a bit murky, this hacker group emerged around 2019. It performed ransomware-as-a-service operations, meaning its main specialty was to develop malware. The criminals shared the malware with affiliates, who carried out various cyberattacks with REvil’s product and demanded ransom from their victims. REvil would then take part of the profit gained from victims. Who suffered from the group’s crimes? The story gets more interesting.
    The REvil targets list includes lots of famous people. It also attacked huge companies. For example, an attack on the software company Kaseya remains one of the biggest ransomware assaults in history. REvil has also targeted JBS, the largest meat processing company in the world. Allegedly, it paid 11 million dollars to mitigate the attack. It’s clear as day that this ransomware group was no joke. Hold on - the plot thickens from here.
    REvil was a relatively public group. It had a blog on which to post the sensitive stolen data of those who refused to pay ransoms.
    The name of this page was “Happy Blog.” One day, it went offline. Why? It was hacked. Several countries teamed up and used REvil’s favorite tactic - compromised backups. During REvil’s attack on Kaseya, the FBI managed to obtain a universal decryption key. It allowed victims to recover their files without paying ransom to the group. With this key, law enforcement accessed REvil’s network. It also hid the FBI’s software in REvil’s backups. Wait till you hear the best part. When one of the group’s members decided to restore Revil’s servers hit by the FBI, he opened a gate. Law enforcement entered REvil’s systems, temporarily shut it down, and gained even more insight into how this group operates.
    Fighting fire with fire, beating hackers at their own game, or using an Uno reverse card - call this operation what you want. Yet one thing is clear - it’s a remarkable example of fighting cybercrime.
    ***
    📌OUR SOCIAL MEDIA 📱
    🔵FACEBOOK: / nordvpn
    🔵INSTAGRAM: / nordvpn
    🔵TIKTOK: / nordvpn
    🔵TWITTER: / nordvpn
    #REvil #ransomwareattack #Behindthehacks
  • НаукаНаука

Комментарии • 2

  • @Nordvpn
    @Nordvpn  29 дней назад

    Is the REvil ransomware group gone for good? 🕵🏼‍♀
    Improve your online security 📱👈
    Get NordVPN: content.nordvpn.com/3z0ScIn