Connect with us

Press Release

Member of the REvil ransomware extradited to the United States to face trial for the Kaseya attack

Published

on

Member of the REvil ransomware extradited to the United States to face trial for the Kaseya attack

Member of the REvil ransomware extradited to the United States to face trial for the Kaseya attack
Vasinkyi is thought to be an affiliate of the REvil ransomware, charged with breaking into corporate networks around the world, stealing unencrypted data, and then encrypting every device connected to the network.
The DOJ revealed shortly after Vasinkyi’s arrest that he was behind the ransomware attack against managed services provider Kaseya, which affected thousands of businesses all across the world.

The release from the U.S. DoJ stated that during the alleged attack on Kaseya, Vasinskyi “enabled the deployment of malicious Sodinokibi/REvil code throughout a Kaseya product that allowed the Kaseya production feature to deploy REvil ransomware to “endpoints” on Kaseya client networks.”

Data on PCs belonging to companies using Kaseya software worldwide were encrypted after remote access to Kaseya endpoints was achieved and ransomware was installed on those computers.

In order to decrypt every one of Kaseya’s impacted customers, the REvil operation (also known as Sodinokibi) wanted $70 million. But once a law enforcement operation managed to access the ransomware business’s servers, the FBI was given the decryption key.

Vasinskyi is thought to be one of REvil’s long-term associates and has been involved in at least nine ransomware operations against American businesses that have been verified.

Eleven counts are supported by the indictment, which was revealed after his detention and links them to separate attacks on North American businesses.

The accusations against Vasinskyi for his acts are as follows:

conspiracy to commit fraud and similar computer-related behaviour
intentional harm to systems behind a firewall
collaborating to launder money
Vasinskyi will be imprisoned for a total of 115 years if found guilty on all counts. He will also lose all of his possessions and financial resources.

In order to remotely manage their clients’ networks, such as pushing out patches, providing remote help, and controlling the Windows domain, managed service providers utilise specialised software.

Since the beginning of the GandCrab and REvil ransomware operations, an affiliate has continuously demonstrated proficiency with MSP platforms by leveraging them to encrypt the clients of targeted MSPs.

With the help of the specific software that managed service providers employ, such as the Kaseya, ConnectWise, and WebRoot MSP platforms, successful attacks against these providers have been made possible.

The Kaseya assault may have been carried out by the same affiliate since it made use of previously undiscovered zero-day vulnerabilities and deep system knowledge.

Vasinskyi’s arrest and potential imprisonment, if he is this affiliate, will be advantageous to the MSP sector because there will be one less threat player to be concerned about.

REvil in suspense
Given that Ukraine and the United States do not currently have an extradition agreement, the Vasinkyi case is a victory for American law enforcement and the judiciary.

He is not, however, a fundamental member of the famed RaaS (ransomware as a service) group, but rather one of the countless REvil affiliates.

Two alleged REvil associates were detained on November 4, 2021, in Romania and Kuwait as part of a global law enforcement operation orchestrated by Europol and Interpol.

The Federal Security Service (FSB) announced the arrest of fourteen alleged REvil members on January 15, 2022, but the group’s top operatives are still believed to remain at large.

Even if the REvil ransomware organisation has been shut down, it wouldn’t be unexpected if some of its core members or affiliates later rebranded as a new operation.

 

Continue Reading

Press Release

Dramaindo

Published

on

Dramaindo

If you’re looking for Moenime? After that, this is where you can find various sources that provide thorough information.

Nonton Streaming Drama Sub Indo at Dramaindo.moe
Dramaindo.moe is a site where you can stream and download Indonesian dramas in 240p, 360p, 480p, and 720p HD. Tempat Nonton Drama Sub Indo Terlengkap, Dramaindo.moe.

https://163.172.111.222/
Extracurricular Drama in Indonesian – Dramaindo.moe
Extracurricular can be seen online and downloaded in HD in the following resolutions: 240p, 360p, 480p, and 720p. Dramaindo.moe is the only site where you can access Extracurricular complete episodes with subtitles in Indonesian.

https://163.172.111.222/series/extracurricular/
I hope the sources mentioned above give you with information about Dramaindo. If not, you can contact me through the comments.

Continue Reading

Press Release

T-Mobile data leak revealed call logs and phone numbers

Published

on

T-Mobile data leak revealed call logs and phone numbers

T-Mobile has disclosed a data breach that exposed customer proprietary network information (CPNI), which includes phone numbers and call history.

T-Mobile started texting consumers about a “security incident” that revealed the details of their accounts yesterday.

T-Mobile claims that recently, their systems had “malicious, unauthorised access” uncovered by their security staff. T-Mobile hired a cybersecurity company to conduct an investigation, and the results showed that threat actors had gotten access to CPNI, or customer-generated network information, used for telecommunications.

Phone numbers, call history, and the number of lines on an account are among the data compromised in this attack.

“The Federal Communications Commission (FCC) regulations’ definition of customer proprietary network information (CPNI) was accessed. The CPNI that was accessed might have included your phone number, the number of lines you have subscribed to, and, in some cases, call-related data gathered as part of your wireless service’s routine operation “T-Mobile claimed in a notification of a data breach.

According to T-Mobile, the compromised data did not include the names, addresses, email addresses, financial information, credit card information, social security numbers, tax IDs, passwords, or PINs of account holders.

T-Mobile claimed that this hack only affected a “small number of consumers (less than 0.2%)” in a statement to BleepingComputer. There are roughly 200,000 persons who have been impacted by this breach out of T-estimated Mobile’s 100 million customers.

“Less than 0.2% of our clients are now receiving notifications that some account information may have been improperly accessed. Names connected to the account, financial information, credit card details, social security numbers, passwords, PINs, and physical or email addresses were NOT among the data obtained. Phone numbers, the number of lines a user subscribes to, and, in a few rare situations, call-related data gathered as part of routine operation and service, were among the data that may have been accessed “Tells BleepingComputer, T-Mobile.

Anyone who has received a text alert about this incident should be on the watch for any suspicious texts that seem to be from T-Mobile and ask for information or contain links to websites that are not owned by T-Mobile.

Threat actors frequently employ information they have obtained from other targeted phishing and smishing efforts in an effort to obtain sensitive data such login names and passwords.

Prior data breaches at T-Mobile occurred in 2018, 2019 for prepaid customers, and in March 2020, which exposed personal and financial information.

Continue Reading

Press Release

According to an internally sourced Facebook post, Rob LathERN, CHIEF OF ADVERTISING INTEGRITY who handled ads around sensitive subjects, left the company on Dec. 30 (KATIE PAUL/REUTERS).

Published

on

ads around sensitive subjects

Internal Facebook post indicates Rob Leathern, chief of advertising integrity who handled ad products around sensitive subjects, left the company on December 30  —  (Reuters) – Facebook Inc’s chief of advertising integrity, who handled the company’s ad products around sensitive subjects …

Continue Reading

Trending