Connect with us

Press Release

Ransomware assault costs $50 million on computer giant Acer

Published

on

Ransomware assault costs $50 million on computer giant Acer

Revil ransomware has attacked computer company Acer, and the threat actors are requesting the $50,000,000,000 ransom, which is the highest known ransom to date.

Acer is a well-known Taiwanese manufacturer of computers, electronics, and monitors. About 7,000 people work for Acer, which had revenue of $7.8 billion in 2019.

The ransomware gang said yesterday that they have infiltrated Acer and posted some screenshots of purportedly stolen files as evidence on their data leak website.

These documents, which contain financial spreadsheets, bank balances, and bank correspondence, were exposed through the use of leaked photos.

In response to BleepingComputer’s queries, Acer said that they “reported recent odd situations” to pertinent LEAs and DPAs but did not give a clear statement as to whether they had been the victim of a REvil ransomware assault.

Below is a link to their full response:

“Acer regularly checks its IT infrastructure, and the majority of hacks are successfully thwarted. Companies like ours are frequently targeted, and we have recently witnessed strange circumstances that we have notified to the appropriate law enforcement and data protection agencies in several different countries.”

“To ensure company continuity and information integrity, we have been steadily improving our cybersecurity infrastructure. We strongly advise all businesses and organisations to follow cyber security best practises and guidelines and to keep an eye out for any unusual network behaviour.” – Acer.

Acer responded to queries for additional information by saying “there is an ongoing investigation and for the sake of security, we are unable to comment on details.”

Known highest ransom demand
Following the release of our article, LegMagIT’s Valery Marchive found the REvil ransomware sample that was utilised in the Acer assault and demanded a huge $50 million ransom.

Soon after, BleepingComputer discovered the sample and is able to corroborate that it is from the onslaught on Acer based on the ransom message and the victim’s chat with the attackers.

Beginning on March 14th, the victim began speaking with REvil, who displayed disbelief at the victim’s enormous $50 million demand.

The REvil representative offered a link to the Acer data leak page later on in the chat, which was still under wraps at the moment.

A 20% discount was also provided by the assailants if payment was completed by this past Wednesday. The ransomware group would deliver a decryptor, a vulnerability report, and the destruction of the files they had stolen in exchange.

The REvil operation once issued a mysterious warning to Acer, telling them “not not repeat the fate of the SolarWind.”

The previous greatest known ransom was the $30 million extortion from the Dairy Farm cyberattack, which was also perpetrated by REvil. REvil’s 50 million demand is the largest known ransom to date.

Possibly exploited Microsoft Exchange
According to Vitali Kremez of BleepingComputer, the Revil gang recently targeted a Microsoft Exchange server on the Acer domain, which Advanced Intel’s Andariel cyberintelligence technology was able to identify.

Kremez told BleepingComputer that “Advanced Intel’s Andariel cyberintelligence technology noticed that one specific REvil affiliate pursued Microsoft Exchange weaponization.”

Although they are a smaller operation with fewer victims, the threat actors behind the DearCry ransomware have already deployed their ransomware via the ProxyLogon vulnerability.

If the current Microsoft Exchange flaws were utilised by REvil to steal data or encrypt devices, it would mark the first time one of the ransomware operations that targets large-scale threats used this kind of attack.

Continue Reading

Press Release

Rajshree Game Play Result

Published

on

Rajshree Game Play Result

If you are searching to find Play Rajshree Video Game Outcome? After that, you can find several sites here that provide in-depth information.

Results Chart for the Playrajshree Lottery game online
RAJSHREE-J. 09:00 AM: 9033: 9123: 9272: 9389: 9452: 9503: 9671: 9722: 9827: 9948: It is completely forbidden to buy lottery tickets using this website in jurisdictions where lotteries are outlawed. To play the online lottery, you must be at least 18 years old.

http://www.playrajshree.com/QuickLink/ResultChart.aspx
DSDIR, Rajshri Play Game Result
Rajshree Lottery is a fun online game where you can view the results every 15 and 20 minutes as of Mar. 13, 2022. The age requirement to play this game is 18. Good luck today. Any adult can play the online game Rajshree Lottery.

Rajshri Play Game Result


Game Rajashri to play
Welcome to play the Rajashri Lottery at Draw Time: 10:00 AM on Draw Date: 10-03-2022: Golden (GA 60-69) ShubhLaxmi (SA 20-29). The current time is: 07:06:34 PM on 10-03-2022.

https://playrajashrilott.com/
Rajshree Result – DSDIR to play
Results Chart – PLAY ONLINE PLAYRAJSHREE LOTTERY GAME. RAJSHREE-J. Mar. 12, 2022. 09:00 AM: 9033: 9123: 9272: 9389: 9452: 9503: 9671: 9722: 9827: 9948: It is completely forbidden to buy lottery tickets using this website in jurisdictions where lotteries are outlawed.

Play Rajshree Result


Goa Lottery Rajshree Results – Lottery Results
Mar. 11, 2022 The Rajshree Lottery is held daily in Goa, and the results are reported below in the table. The top prize-winning ticket and the sum earned are displayed. You can check your tickets here to see if you won the top prize in the Rajshree lottery or any of the other levels. You can also check the top reward for previous drawings.

https://www.lotto.in/goa/rajshree-results
Findings – GOA Star
Summary of the results: Golden A Game, Subhlaxmi A Game, and Rajshree A Game.

https://playrajshreegoa.com/
Results Sheet for Rajshri’s Victory
In the states where lotteries are illegal, buying lottery tickets through our website is strictly forbidden. To play the online lottery, you must be at least 18 years old.

http://playrajshriwin.com/result.php
Results from the Rajshree Lottery
Rajshree Lottery is an online game that you can play for entertainment purposes; the results are updated every 15 and 20 minutes. The age requirement to play this game is 18. Good luck today. Rajshree Lottery is an internet game that any adult can play for free. No upfront payment is necessary.

https://www.rajshreelottery.co.in/
Application Rajshree Lottery Results – Google Play
This Rajshree Lottery Sambad is unofficial and has no affiliation with any State Lottery Result Board as of October 29, 2021. We simply gathered these findings from open-source third-party websites, and we urge you to double-check them against officially released data.

https://play.google.com/store/apps/details?

id=loteryresulraj
Rajshree Outcome
Play the Rajshree lottery, Rajshree lottery, best lottery, lottery, play the Rajshree lottery result, and Rajshree lottery result. Draw time for the Rajshree Sikkim Lottery is today at 3:00 AM.

https://www.rajshree10.com/current-draw.php
The sources mentioned above should be able to provide you with information on the Play Rajshree Game Result. If not, you can contact me through the comments.

Continue Reading

Press Release

Two million Android malware apps have been discovered on Google Play.

Published

on

Two million Android malware apps have been discovered on Google Play.

Over two million individuals have been duped into installing new Android malware, phishing, and adware apps that have penetrated the Google Play store.

The programmes, which appear to be helpful utilities and system optimizers but are actually the causes of performance glitches, advertisements, and a degraded user experience, were found by Dr. Web antivirus.

One Dr. Web-illustrated app that has one million downloads is TubeBox, which is still accessible on Google Play as of this writing.

When trying to redeem the collected prizes, TubeBox consistently presents problems, despite promising users money for watching movies and advertisements on the app.

Even customers who successfully complete the final withdrawal stage never actually receive the money, according to the researchers, as the whole thing is just a ploy to keep users on the app as long as possible so they may view adverts and bring in money for the makers.

The following adware applications also showed up on Google Play in October 2022 but were later taken down:

One million downloads of the Bluetooth device auto connect (bt autoconnect group)
USB, Wi-Fi, and Bluetooth drivers (simple things for everyone) Over 100,000 downloads
Bt Autoconnect Group’s Volume, Music Equalizer: 50,000 downloads
(Hippo VPN LLC) Fast Cleaner & Cooling Master – 500 downloads

The aforementioned apps take instructions from Firebase Cloud Messaging and load the websites listed in them, which results in the fraudulent display of advertisements on the affected devices.

The remote operators might also set up an infected device to function as a proxy server in the instance of Fast Cleaner & Cooling Master, which had a low download volume. The threat actors could route their own traffic through the infected device using this proxy server.

Last but not least, Dr. Web came across a number of loan scam apps with an average of 10,000 downloads on Google Play that claimed to have a direct connection to Russian banks and investment companies.

Through malicious advertising on other apps, these apps were marketed as offering assured investment returns. Actually, the apps direct users to phishing websites where their personal data is gathered.

You should always look for bad reviews, carefully read the privacy statement, and visit the developer’s website to verify the legitimacy of an app before downloading it from Google Play.

Generally speaking, try to limit the number of installed apps on your smartphone and occasionally check to make sure Google Play Protect is turned on.

Continue Reading

Press Release

BOSTON-BASED VALO HEALTH, WHICH ANALYZES CLINICAL DATA TO IDENTIFY MOLECULES AND PREDICT THEIR CHANCES FOR USE IN DRUGS, RAISES $300M SERIES B (DANIEL MCCOY/WICHITA BUSINESS JOURNAL)

Published

on

BOSTON-BASED VALO HEALTH

Boston-based Valo Health, which analyzes clinical data to identify molecules and predict their chances for use in drugs, raises $300M Series B  —  A Boston-based company working to improve the way drugs are brought to the market has secured $110 million in Series B funding from Koch Disruptive Technologies.

Continue Reading

Trending