
Meanwhile, many security services and countries have reacted, with the White House declaring that it will reach out to the victims “to give assistance based on an assessment of national risk. REvil’s onslaught is massive in scope, but it is the magnitude of the strike that may ultimately lead to their demise. In response to the attack on the New Zealand schools, the organization stated that it was “an accident.” Demonstrating their inability to maintain complete control over all aspects of their attack.
#JACK CABLE KREBS GROUP RANSOMWHERE SOFTWARE#
Seven also use the software but have no evidence of impact and have shut down the impacted services as a precautionary measure.”

There is no evidence of data loss at this stage They have taken steps to contain the issue which may have a short-term operational impact. Two have confirmed they use the software and have been impacted by ransomware. Two have confirmed they are not impacted as they have not used this software for some time Of the 11 schools (out of roughly 2,500) we initially identified as possibly having been impacted by this global ransomware attack: The Kindergarden chain announced the following on Monday: One of these is a New Zealand-based Kindergarten chain.

However, following Cable’s recent findings, it appears that the hackers are willing to compromise.Īnother issue in the hackers‘ ransom’s authenticity is that they appear to have unintentionally targeted some organizations. REvil mentioned in their ransom message that the fee would double if the ransom fee is not paid by July 10th. The ransomwhe. REvil, also known as Sodinokibi, has claimed responsibility for a ransomware attack that affected hundreds of organizations across numerous nations using its date-scrambling malware. A security expert has launched a site to keep a publicly trackable record of bitcoin payments to key ransomware gangs, such as REvil. Hundreds of American firms were among the victims of this attack, which targeted various small to medium-sized businesses.Īccording to one source, Jack Cable of the cybersecurity-focused Krebs Stamos Group, who spoke to Reuters and revealed he had contacted one of the gang’s affiliates who said he could sell a “universal decrypter” for $50 million, the gang’s initial demands of $70 million are now “open to negotiation.” The advanced hacking approach allowed the hackers to control one piece of software and compromise hundreds of people all at once. New Zealand officials said on Monday that 11 schools and several kindergartens were affected by the ransomware attack.The hacking gang REvil, responsible for the widespread ransomware attacks that occurred over the weekend and affected a dozen different nations, may have taken on more than they can handle. The fallout of July 2 hack is still coming into focus. Ransomwhere collecte ces données et les met à la disposition du public pour que quiconque puisse les voir ou les télécharger.

"For all of their big talk on their blog, I think this got way out of hand," said Allan Liska of cybersecurity firm Recorded Future. Jack Cable, architecte sécurité du cabinet de conseil en cybersécurité Krebs Stamos Group, a lancé le site jeudi. "It makes you wonder if they're having a hard time getting people to pay," he said.Īnother expert said that the hackers, by encrypting so much data from so many businesses at once, may have bitten off more than they could chew. Reuters was subsequently able to log on to the payment portal and chat with an operator who said the price was unchanged at $US70 million "but we are always ready to negotiate".īecause of REvil's affiliate structure, it is occasionally difficult to determine who speaks on the hackers' behalf but Cable said both conversations suggested that despite the headline $US70 million demand "they're definitely not attached to that number".

Cable told Reuters he managed to get through to the hackers after obtaining a cryptographic key needed to log on to the group's payment portal.
