Software vendor caught up in ransomware attack obtains decryptor key

Kaseya is currently helping to restore the systems of customers whose networks were still locked down by REvil’s software, it said.
“I can confirm we have received a decryptor and are currently working to assist the customers impacted by the attack,” said Kaseya spokesperson Dana Liedholm. “We can’t share the source but can say it’s from a trusted third party.”
    Liedholm declined to answer further questions about whether the decryptor key had been reverse-engineered from the REvil malware.
      Brett Callow, a threat analyst at the cybersecurity firm Emsisoft, said his firm had verified the effectiveness of the key at restoring victim data.
          “We are working with Kaseya to support their customer engagement efforts. We have confirmed the key is effective at unlocking victims and will continue to provide support to Kaseya and its customers,” Callow told CNN.
          The Kaseya attack has been called one of the largest ransomware attacks in history. On July 2, hackers affiliated with REvil β€” a cybercriminal gang that is believed to operate out of Eastern Europe or Russia β€” used Kaseya’s remote management tools to deliver malicious software to Kaseya’s customers that encrypted their data and locked them out.
          It is still unclear how the attackers managed to gain access to Kaseya’s product.
          Many of Kaseya’s customers are IT support firms that help small businesses such as dentists’ offices, local restaurants and accounting firms with their information technology needs. When the support firms were hit, their own customers were also affected, prompting Kaseya to estimate later that as many as 1,500 organizations worldwide may have been compromised by the ransomware.
            REvil issued an eye-popping $70 million ransom demand in exchange for a decryptor key that could unlock all of the affected systems at once. But even as some companies were still reeling from the attack, REvil vanished from the internet β€” with most of its websites going dark.
            The group’s mysterious disappearance last week has sparked speculation as to its fate. The US government has steadfastly declined to say whether it played a role, though the Biden administration has vowed to crack down on ransomware. And, in the case of Colonial Pipeline, US law enforcement officials have been able to track and recover some of the money the company paid to its ransomware attackers β€” a group known as DarkSide that has also since disappeared.


            Source: .” Software vendor caught up in ransomware attack obtains decryptor key”. Retrieved From

            All Rights Of This Article Reserved To CNN

            Leave a Reply

            Your email address will not be published. Required fields are marked *

            %d bloggers like this: