Recent from talks
Nothing was collected or created yet.
REvil
View on WikipediaREvil (Ransomware Evil; also known as Sodinokibi) was a Russia-based[1] or Russian-speaking[2] private ransomware-as-a-service (RaaS) operation.[3] After an attack, REvil would threaten to publish the information on their page Happy Blog unless the ransom was received. In a high profile case, REvil attacked a supplier of the tech giant Apple and stole confidential schematics of their upcoming products. In January 2022, the Russian Federal Security Service said they had dismantled REvil and charged several of its members.
Key Information
History
[edit]REvil recruits affiliates to distribute the ransomware for them. As part of this arrangement, the affiliates and ransomware developers split revenue generated from ransom payments.[4] It is difficult to pinpoint their exact location, but they are thought to be based in Russia due to the fact that the group does not target Russian organizations, or those in former Soviet-bloc countries.[5]
Ransomware code used by REvil resembles the code used by DarkSide, a different hacking group; REvil's code is not publicly available, suggesting that DarkSide is an offshoot of REvil[6] or a partner of REvil.[7] REvil and DarkSide use similarly structured ransom notes and the same code to check that the victim is not located in a Commonwealth of Independent States (CIS) country.[8]
Cybersecurity experts believe REvil is an offshoot from a previous notorious, but now-defunct hacker gang, GandCrab.[9] This is suspected due to the fact that REvil first became active directly after GandCrab shutdown, and that the ransomware both share a significant amount of code.
2020
[edit]May
[edit]As part of the criminal cybergang's operations, they are known for stealing nearly one terabyte of information from the law firm Grubman Shire Meiselas & Sacks and demanding a ransom to not publish it.[10][11][12] The group had attempted to extort other companies and public figures as well.
In May 2020 they demanded $42 million from US president Donald Trump.[13][14] The group claimed to have done this by deciphering the elliptic-curve cryptography that the firm used to protect its data.[15] According to an interview with an alleged member, they found a buyer for Trumps information, but this cannot be confirmed.[16] In the same interview, the member claimed that they would bring in $100 million ransoms in 2020.
On 16 May 2020, the group released legal documents totaling a size of 2.4 GB related to the singer Lady Gaga.[17] The following day, they released 169 "harmless" e-mails which referred to Donald Trump or contained the word 'trump'.[11]
They were planning on selling Madonna's information,[18] but eventually reneged.[19]
2021
[edit]March
[edit]On 27 March 2021, REvil attacked Harris Federation and published multiple financial documents of the federation to its blog. As a result, the IT systems of the federation were shut down for some weeks, affecting up to 37,000 students.[20]
On 18 March 2021, an REvil affiliate claimed on their data leak site that they had downloaded data from multinational hardware and electronics corporation Acer, as well as installing ransomware, which has been linked to the 2021 Microsoft Exchange Server data breach by cybersecurity firm Advanced Intel, which found first signs of Acer servers being targeted from 5 March 2021. A US$50 million ransom was demanded to decrypt the undisclosed number of systems and for the downloaded files to be deleted, increasing to US$100 million if not paid by 28 March 2021.[21]
April
[edit]In April 2021, REvil stole plans for upcoming Apple products from Quanta Computer, including purported plans for Apple laptops and an Apple Watch. REvil threatened to release the plans publicly unless they receive $50 million.[22][23]
May
[edit]On 30 May 2021, JBS S.A. was attacked by ransomware which forced the temporary shutdown of all the company’s U.S. beef plants and disrupted operations at poultry and pork plants. A few days later, the White House announced that REvil may be responsible for the JBS S.A. cyberattack. The FBI confirmed the connection in a follow-up statement on Twitter.[24] JBS paid an $11 million ransom in Bitcoin to REvil.
June
[edit]On 11 June 2021, Invenergy reported that they were attacked by ransomware. Later, REvil claimed to be responsible.[25]
July
[edit]On 2 July 2021, hundreds of managed service providers had REvil ransomware dropped on their systems through Kaseya desktop management software.[26] REvil demanded $70 million to restore encrypted data.[27] As a consequence the Swedish Coop grocery store chain was forced to close 800 stores during several days.[28][29]
On 7 July 2021, REvil hacked the computers of Florida-based space and weapon-launch technology contractor HX5, which counts the Army, Navy, Air Force, and NASA among its clients, publicly releasing stolen documents on its Happy Blog. The New York Times judged the documents to not be of "vital consequence".[30]
After a July 9 phone call between United States president Joe Biden and Russian president Vladimir Putin, Biden told the press, "I made it very clear to him that the United States expects when a ransomware operation is coming from his soil even though it’s not sponsored by the state, we expect them to act if we give them enough information to act on who that is." Biden later added that the United States would take the group's servers down if Putin did not.[31][32]
On 13 July 2021, REvil websites and other infrastructure vanished from the internet.[33] Politico cited an unnamed senior administration official as stating that "we don't know exactly why they've [REvil] stood down;" the official also did not discount the possibility that Russia shut down the group or forced it to shut down.[34]
On 23 July 2021, Kaseya announced it had received the decryption key for the files encrypted in the July 2 Kaseya VSA ransomware attack from an unnamed "trusted third party", later discovered to be the FBI who had withheld the key for three weeks, and was helping victims restore their files.[35] The key was withheld to avoid tipping off REvil of an FBI effort to take down their servers, which ultimately proved unnecessary after the hackers went offline without intervention.[36]
September
[edit]In September 2021, Romanian cybersecurity firm Bitdefender published a free universal decryptor utility to help victims of the REvil/Sodinokibi ransomware recover their encrypted files, if they were encrypted before July 13, 2021.[37] From September until early November, the decryptor was used by more than 1,400 companies to avoid paying over $550 million in ransom and allow them to recover their files.[38]
On 22 September 2021, malware researchers identified a backdoor built into REvil malware that allowed the original gang members to conduct double-chats and cheat their affiliates out of any ransomware payments.[39] Ransomware affiliates who were cheated reportedly posted their claims on a "Hacker's Court", undermining trust in REvil by affiliates. Newer versions of REvil malware reportedly had the backdoor removed.[40]
October
[edit]On 21 October 2021, REvil servers were hacked in a multi-country operation and forced offline. VMWare's head of cybersecurity strategy said "The FBI, in conjunction with Cyber Command, the Secret Service and like-minded countries, have truly engaged in significant disruptive actions against these groups,”. A REvil gang member attempted to restore their servers from backups that had also been compromised.[41]
Investigations and criminal charges
[edit]As part of Operation GoldDust involving 17 countries, Europol, Eurojust and INTERPOL, law enforcement authorities arrested five individuals tied to Sodinokibi/REvil and two suspects connected to GandCrab ransomware. They are allegedly responsible for 5,000 infections, and collected half a million euros in ransomware payments.[42]
On 8 November 2021, the United States Department of Justice unsealed indictments against Ukrainian national Yaroslav Vasinskyi and Russian national Yevgeniy Polyanin. Vasinskyi was charged with conducting ransomware attacks against multiple victims including Kaseya, and Polyanin was charged with conducting ransomware attacks against multiple victims including Texas businesses and government entities. The Department worked with the National Police of Ukraine for the charges, and also announced the seizure of $6.1 million tied to ransomware payments.[43] Vasinskyi, also known as Rabotnik, was arrested while crossing the border from Ukraine to Poland on 8 October 2021 and was extradited to the United States in 2022. He pleaded guilty to cybercrime and money laundering charges, and on 1 May 2024 was sentenced to 13 years and seven months in prison and ordered to pay $16 million in restitution.[44][45] As of 2025[update], Polyanin remains at large, and is thought by the FBI to reside in Russia, possibly in Barnaul.[46][47]
In January 2022, the Russian Federal Security Service said they had dismantled REvil and charged several of its members after being provided information by the US.[48]
The Fluffy
[edit]There is a hacker group called Fluffy with Headquarters in Corrèze, known to have an affiliation with REvil, that primarily uses typosquatting, cybersquatting and keyword stuffing. This hacker group has distributed Magniber ransomware, Sodinokibi, and GandCrab, BlueCrab (It is the next version of GandCrab is the same variant that was used in the Kaseya VSA ransomware attack[49]). In France, it is known as Fluffy,[50] in Germany as Talentfrei,[51] in Australia and English speaking countries as "Emma Hill",[52] and in South Korea as Nebomi (meaning "Four Seasons Blossom" in Korean). Fluffy is known to have claimed a number of victims, especially in South Korea.[53][54]
The campaign in which Fluffy first targeted South Korea is known as Magniber,[55] and it utilized an exploit kit before the emergence of various modified payloads. The techniques employed by these modified payloads vary, but they share a commonality in utilizing standardized technologies supported by web browsers or operating systems, such as URI scheme and BASE64, unlike exploit kits that leverage zero-day vulnerabilities. Users receive security warnings from their operating systems before executing the files; however, the information provided by the attackers is often sufficient for users to decide to disregard the security alerts.
Following the introduction of these altered payloads in South Korea, Fluffy immediately referred to themselves as Nebomi and continued with ransomware attacks. The Seoul Central District Prosecutors' Office announced in November 2023 that accomplices assisting them in South Korea were prosecuted. According to the announcement, during the process of investigating the suspects, records of funds being transferred to Lazarus Group were also discovered.[56] It is unclear whether it is related to the ongoing ransomware investigation, but according to a media report in December 2023, The Supreme Court of Korea claimed that it experienced a cyberattack by the Lazarus Group, resulting in the leakage of sensitive data.[57]
Fluffy is presumed to assist in the distribution of various types of ransomware, ranging from Magniber and REvil to LockBit, leveraging successful cases of watering hole attacks they have executed. For example, it is believed that they may be implicated in incidents such as the successful cyber attack on Toshiba's French branch in May 2021, the claimed cyber attack on the Doosan Group in August 2022, and the claimed cyber attack on the National Tax Service (South Korea) in March 2023.[58]
At times, they employed relatively simple methods, such as emails, for the distribution of REvil ransomware (also known as GandCrab). The content of these emails typically involved impersonating law enforcement agencies. The senders of these emails were two individuals under the age of 19, who claimed to have committed such crimes in response to a proposition that said, "If you join in sending ransomware, we'll share the profits." In the trial held at the Seoul Central District Court in August 2021, they were sentenced to 2 years and 1 year 6 months of imprisonment. One of them had already received a 10-year prison sentence for participating in another campaign.
References
[edit]- ^ Bowden, John (July 13, 2021). "Russian-based ransomware group 'REvil' disappears after hitting US businesses". The Independent. Archived from the original on August 13, 2021.
- ^ Collier, Kevin (July 13, 2021). "Prolific ransomware gang suddenly disappears from internet. The timing is noteworthy". NBC News. Archived from the original on November 12, 2021.
- ^ Fokker, John (2019-10-02). "McAfee ATR Analyzes Sodinokibi aka REvil Ransomware-as-a-Service - The All-Stars". McAfee Blogs. Archived from the original on 2021-11-11. Retrieved 2020-10-07.
- ^ Abrams, Lawrence. "Sodinokibi Ransomware: Following the Affiliate Money Trail". Bleeping Computer. Archived from the original on 2021-07-05. Retrieved 2020-10-07.
- ^ Saarinen, Juha (January 29, 2020). "No let up on REvil ransomware-as-a-service attacks". it news.
- ^ SangerPerlroth>David E. Sanger & Nicole Perlroth, F.B.I. Identifies Group Behind Pipeline Hack, New York Times (May 10, 2021).
- ^ Charlie Osborne, Researchers track down five affiliates of DarkSide ransomware service, ZDNet (May 12, 2021).
- ^ What We Know About the DarkSide Ransomware and the US Pipeline Attack, Trend Micro Research (May 14, 2021).
- ^ Vijayan, Jai (September 25, 2019). "GandCrab Developers Behind Destructive REvil Ransomware". DARKReading.
- ^ Cimpanu, Catalin. "Ransomware gang asks $42m from NY law firm, threatens to leak dirt on Trump". ZDNet. Retrieved 2020-05-17.
- ^ a b Winder, Davey. "Hackers Publish First 169 Trump 'Dirty Laundry' Emails After Being Branded Cyber-Terrorists". Forbes. Retrieved 2020-05-17.
- ^ Sykes, Tom (2020-05-15). "'REvil' Hackers Double Their Allen Grubman Ransom Demand To $42m, Threaten To Dump Donald Trump Dirt". The Daily Beast. Retrieved 2020-05-17.
- ^ "Criminal group that hacked law firm threatens to release Trump documents". NBC News. 16 May 2020. Retrieved 2020-05-17.
- ^ Adler, Dan (15 May 2020). "What Do These Hackers Have On Trump, and Why Would Allen Grubman Pay to Suppress It?". Vanity Fair. Retrieved 2020-05-17.
- ^ "Forbes". Forbes.
- ^ Seals, Tara (October 29, 2020). "REvil Gang Promises a Big Video-Game Hit; Maze Gang Shuts Down". threatpost.
- ^ Dazed (2020-05-16). "Hackers have leaked Lady Gaga's legal documents". Dazed. Retrieved 2020-05-17.
- ^ Coble, Sarah (2020-05-19). "REvil to Auction Stolen Madonna Data". Infosecurity Magazine. Retrieved 2020-07-17.
- ^ Coble, Sarah (2020-09-23). "Thieves Fail to Auction Bruce Springsteen's Legal Documents". Infosecurity Magazine. Retrieved 2020-12-10.
- ^ "Evidence suggests REvil behind Harris Federation ransomware attack". IT PRO. 9 April 2021. Retrieved 2021-04-30.
- ^ Abrams, Lawrence (19 March 2021). "Computer giant Acer hit by $50 million ransomware attack". BleepingComputer. Retrieved 2021-03-20.
- ^ "Ransomware hackers steal plans for upcoming Apple products". the Guardian. 2021-04-22. Retrieved 2021-04-22.
- ^ "A Notorious Ransomware Gang Claims to Have Stolen Apple's Product Designs". Gizmodo. 20 April 2021. Retrieved 2021-04-22.
- ^ "FBI Statement on JBS Cyberattack". Twitter. 2021-06-02. Retrieved 2021-06-03.
- ^ "Hacker group REvil claims responsibility for Invenergy data breach". pv magazine USA. June 14, 2021.
- ^ "Important Notice July 2nd, 2021 – Kaseya". July 3, 2021. Archived from the original on 2021-07-03.
- ^ Satter, Raphael (2021-07-05). "Up to 1,500 businesses affected by ransomware attack, U.S. firm's CEO says". Reuters. Archived from the original on 2021-11-24. Retrieved 2021-07-05.
- ^ Ahlander, Johan; Menn, Joseph (2021-07-03). "Major ransomware attack against U.S. tech provider forces Swedish store closures". Reuters. Archived from the original on 2021-10-25. Retrieved 2021-07-05.
- ^ Lily Hay Newman (2021-07-04). "How REvil Ransomware Took Out Thousands of Business at Once". Wired. Archived from the original on 2021-11-10. Retrieved 2021-12-03.
- ^ Sanger, David E.; Perlroth, Nicole (July 7, 2021). "Biden Weighs a Response to Ransomware Attacks". The New York Times. Retrieved July 8, 2021.
- ^ Miller, Zeke; Tucker, Eric (July 9, 2021). "Biden tells Putin Russia must crack down on cybercriminals". Associated Press. Archived from the original on November 11, 2021.
- ^ Sanger, David E. (July 13, 2021). "Russia's most aggressive ransomware group disappeared. It's unclear who disabled them". The New York Times.
- ^ Fung, Brian; Cohen, Zachary; Sands, Geneva (July 13, 2021). "Ransomware gang that hit meat supplier mysteriously vanishes from the internet". CNN Business. Archived from the original on September 27, 2021.
- ^ Toosi, Nahal (July 20, 2021). "Biden official: 'We don't know exactly why' ransomware gang vanished from the web". POLITICO. Retrieved July 21, 2021.
- ^ "Ransomware key to unlock customer data from REvil attack". BBC News. BBC. July 23, 2021. Retrieved July 23, 2021.
- ^ Ellen Nakishima; Rachel Lerman (September 21, 2021). "FBI held back ransomware decryption key from businesses to run operation targeting hackers". The Washington Post.
- ^ "Bitdefender Offers Free Universal Decryptor for REvil/Sodinokibi Ransomware". Bitdefender. September 16, 2021. Archived from the original on November 26, 2021. Retrieved December 3, 2021.
- ^ Botezatu, Bogdan (November 8, 2021). "Bitdefender, Law Enforcement Partnership Saves REvil Victims Half a Billion in Ransom Demand". Bitdefender. Archived from the original on November 11, 2021. Retrieved December 3, 2021.
- ^ Vaas, Lisa (September 22, 2021). "How REvil May Have Ripped Off Its Own Affiliates". ThreatPost.com. Archived from the original on October 5, 2021. Retrieved December 3, 2021.
- ^ Vaas, Lisa (September 23, 2021). "REvil Affiliates Confirm: Leadership Were Cheating Dirtbags". ThreatPost.com. Archived from the original on October 8, 2021. Retrieved December 3, 2021.
- ^ Menn, Joseph; Bing, Christopher (October 21, 2021). "EXCLUSIVE Governments turn tables on ransomware gang REvil by pushing it offline". Reuters. Archived from the original on December 1, 2021. Retrieved December 3, 2021.
- ^ "FIVE AFFILIATES TO SODINOKIBI/REVIL UNPLUGGED". Europol. 8 November 2021. Archived from the original on 12 November 2021. Retrieved 12 November 2021.
- ^ "Ukrainian Arrested and Charged with Ransomware Attack on Kaseya". United States Department of Justice. November 8, 2021. Archived from the original on November 11, 2021. Retrieved November 12, 2021.
- ^ Rabinowitz, Hannah (2024-05-02). "Member of ransomware gang sentenced to more than 13 years in prison over 2021 attack". CNN. Retrieved 2025-02-16.
- ^ "Sodinokibi/REvil Affiliate Sentenced for Role in $700M Ransomware Scheme". Office of Public Affairs. United States Department of Justice. 2024-05-01. Retrieved 2025-02-16.
- ^ "YEVGENIY IGOREVICH POLYANIN". Federal Bureau of Investigation. Retrieved 2025-02-16.
- ^ Millward, Wade Tyler. "Accused Kaseya Ransomware Attacker Sentenced To 13-Plus Years". CRN. Retrieved 2025-02-16.
- ^ "REvil ransomware gang arrested in Russia". BBC News. 2022-01-14. Retrieved 2022-01-14.
- ^ "AhnLab, Kaseya supply-chain targeted ransomware, 'BlueCrab' identified". inews24 (in Korean). 2021-07-11.
- ^ ""Gootloader" expands its payload delivery options". Sophos News. 2021-03-01.
- ^ "German users targeted with Gootkit banker or REvil ransomware". MalwareBytes Labs. November 30, 2020.
- ^ Ford, Eric; Nichols, Ben (September 2022). "Is Gootloader Working with a Foreign Intelligence Service?" (PDF). deepwatch.
- ^ "GandCrab ransomware: it lurks behind free fonts and resumes". boannews (in Korean). 2018-11-12.
- ^ "BlueCrab ransomware: use optimized attack scenarios for individuals and companies. Be careful when downloading files". inews24 (in Korean). 2021-02-02.
- ^ "Security advice to respond to 'MY DECRYPTER' ransomware attack". KrCERT Security Notice (in Korean). 2017-10-23.
- ^ "Infecting with ransomware and demanding recovery fees... Arrest and prosecution of company representatives who collected 2.6 billion won". KBS Korea Broadcasting System (in Korean). 2023-11-20.
- ^ "The Supreme Court of Korea concealed the hacking incident carried out by North Korea hackers for six months. The password was 123qwe". Nocut News (in Korean). 2023-12-05.
- ^ "International hacking organization 'Lockbit' announces plans to disclose data claiming to have hacked the National Tax Service". KBS Korea Broadcasting System (in Korean). 2023-03-30.
REvil
View on GrokipediaREvil, also known as Sodinokibi, was a ransomware-as-a-service (RaaS) operation run by Russian-speaking cybercriminals that emerged in 2019, likely developed by former operators of the GandCrab ransomware.[1][2] The group utilized an affiliate model, distributing its malware through partners who conducted initial intrusions via methods such as phishing attachments, drive-by compromises, and exploitation of vulnerabilities like CVE-2018-8453 for privilege escalation.[2] REvil employed double-extortion tactics, encrypting victims' files with Salsa20 encryption and Salsa2.0 stream cipher while exfiltrating data for potential leakage on dedicated sites like the "Happy Blog" if ransoms—demanded in bitcoin—were not paid.[1][2] Its malware featured advanced capabilities, including multithreading for rapid encryption, service termination to hinder recovery, and command-and-control communication over HTTPS with asymmetric cryptography.[2] The syndicate targeted a wide range of sectors, with notable attacks on critical infrastructure such as the JBS meat processing company, the Kaseya software supply chain affecting thousands of downstream organizations, and healthcare providers like Grupo Fleury and Valley Health, contributing to 82 reported incidents in the health sector by mid-2021.[1][2] Overall, REvil ransomware compromised approximately 175,000 computers globally and extorted at least $200 million in payments, with individual affiliates responsible for subsets like $13 million from around 3,000 U.S.-targeted attacks on entities including law enforcement and municipalities.[3] The operation's infrastructure was disrupted in 2021 through coordinated international efforts, including a U.S. cyber operation that seized servers, followed by arrests such as that of key developer Yaroslav Vasinskyi in Poland and indictments of affiliates like Yevgeniy Polyanin, alongside Russian Federal Security Service actions in early 2022 that dismantled remaining elements and recovered over $6 million in assets.[1][3]
History
Formation and Early Malware (2019)
REvil, a ransomware-as-a-service (RaaS) operation also known by its malware strain Sodinokibi, formed in 2019 following the announced retirement of the GandCrab ransomware family. Security researchers first detected Sodinokibi in April 2019, with Cisco Talos identifying it as a novel encryptor exploiting Windows kernel vulnerabilities and remote code execution flaws.[4] Analysis by Secureworks revealed strong technical ties to GandCrab, including overlapping code strings, encryption routines, and affiliate payment structures, indicating that GandCrab's developers—rather than disbanding—rebranded and pivoted to a more controlled RaaS model under REvil to evade law enforcement scrutiny.[5][6] The initial Sodinokibi malware variants emphasized rapid deployment and evasion, often leveraging zero-day exploits like CVE-2019-2725 in Oracle WebLogic Server for unauthenticated remote code execution to breach enterprise networks.[7] Upon infection, the ransomware employed AES-256 for symmetric file encryption combined with RSA-2048 for key protection, targeting over 60 file extensions across drives while appending ".sodin" or ".zip" to encrypted files. It also disabled recovery options by deleting shadow copies and Volume Shadow Service components, then displayed a ransom note via a Tor-hosted HTML page demanding Bitcoin payments, with initial demands ranging from thousands to millions depending on victim profile.[6] Early builds included self-propagation via SMB and RDP, facilitating lateral movement in unpatched environments.[8] In its formative phase, REvil focused on building operational infrastructure, including leak sites for non-paying victims—though double-extortion tactics fully matured later—and recruiting affiliates through underground forums. Attacks in 2019 primarily struck small-to-medium enterprises and lacked the supply-chain focus of later campaigns, with infections often stemming from phishing, exploit kits, or compromised RDP credentials rather than advanced persistent threats. The group's Russian-speaking origins were evident in operational language and geographic targeting exclusions, aligning with self-imposed rules avoiding Russian-language victims to minimize domestic backlash.[9] By late 2019, REvil had encrypted thousands of systems, generating revenues estimated in the tens of millions, setting the stage for expanded RaaS scalability.[10]Expansion and RaaS Model Adoption (2020)
In 2020, REvil, operating under its Ransomware-as-a-Service (RaaS) framework, expanded operations by intensifying affiliate recruitment and targeting high-value victims across sectors including retail, legal, and telecommunications. Affiliates, responsible for initial access and deployment, received up to 70% of ransom proceeds, with developers retaining the remainder for malware maintenance and infrastructure.[11] This model enabled scalable growth, as evidenced by REvil's 16% share of ransomware infections in the third quarter, making it a leading strain according to market analysis.[12] Affiliates commonly exploited compromised Remote Desktop Protocol (RDP) credentials (65% of cases), phishing (16%), and software vulnerabilities (8%).[13] A pivotal recruitment drive occurred on September 27, 2020, when REvil deposited approximately 99 bitcoins (valued at around $1 million) into a public fund to lure experienced hackers, emphasizing sophisticated operations over mass infections.[14] This initiative followed the group's evolution from its 2019 origins as Sodinokibi malware, transitioning to a mature RaaS by early 2020 with formalized profit-sharing and affiliate portals for negotiation and data leaks. Estimated earnings exceeded $81 million that year, with REvil claiming over $100 million in total ransoms collected.[15] The group affected at least 140 organizations globally since inception, with over 60% in the United States, per incident tracking.[13] Expansion manifested in high-profile incidents leveraging double-extortion tactics—encrypting data while threatening leaks from exfiltrated files. In February 2020, REvil compromised apparel firm Kenneth Cole Productions. May attacks included currency exchanger Travelex, which paid an undisclosed ransom after operational shutdowns, and law firm Grubman Shire Meiselas & Sacks, where operators demanded $21 million (escalating to $42 million) and leaked 756 GB of data, including documents belonging to celebrities like Lady Gaga.[16] [17] Later in May-June, attempts targeted Sri Lanka Telecom (ultimately unsuccessful) and Telecom Argentina, encrypting 18,000 systems and demanding $7.5 million. These operations underscored REvil's shift toward targeted, lucrative strikes, boosting its notoriety and affiliate appeal.[11]Peak Activity and High-Profile Attacks (2021)
In 2021, REvil escalated its operations to unprecedented levels, comprising 37% of all ransomware engagements tracked by IBM X-Force that year, reflecting a surge in both volume and sophistication.[18] The group shifted toward targeting high-value entities in critical sectors, leveraging zero-day exploits, supply chain vectors, and double-extortion tactics to maximize disruption and payouts.[19] Early in the year, on March 19, REvil breached Taiwanese PC manufacturer Acer, exfiltrating over 75 gigabytes of sensitive financial and technical data via vulnerabilities in Microsoft Exchange servers, and demanded a then-record $50 million ransom while threatening data publication.[20] In April, the group extended its reach to Quanta Computer, a key supplier for Apple, stealing proprietary designs and source code worth an estimated hundreds of millions, again employing extortion to pressure payment.[21] REvil's assault on global food supply chains peaked with the May 30, 2021, attack on JBS Foods, the world's largest meat processor, which halted operations at 13 U.S. facilities and plants in Australia and Canada, prompting the company to pay $11 million in Bitcoin to regain access to encrypted systems and prevent data leaks.[22] The FBI publicly attributed the incident to REvil on June 3, confirming the group's use of its Sodinokibi variant for encryption following weeks of undetected data exfiltration starting in March.[22] This was preceded by REvil's April 14 tease of an impending "most high-profile attack ever," signaling growing audacity amid rising global tensions over ransomware's impact on essential services.[19] The year's most expansive operation unfolded on July 2, when REvil exploited a zero-day flaw (CVE-2021-30116) in Kaseya's VSA remote management software, enabling automated ransomware deployment to up to 1,500 downstream managed service providers and end-users across multiple countries.[23] The group demanded $70 million in Bitcoin for a universal decryptor, marking one of the broadest supply chain compromises to date and affecting sectors from education to healthcare.[23] Kaseya promptly isolated its servers, but the incident underscored REvil's tactical evolution toward scalable, multi-victim campaigns, amplifying economic fallout estimated in the billions.[24] These strikes not only yielded substantial revenues but also drew international scrutiny, foreshadowing coordinated disruptions later that year.[1]Shutdown and Fragmentation (Late 2021–2022)
In October 2021, a multi-country law enforcement operation, led by U.S. agencies including the FBI, U.S. Cyber Command, and Secret Service in coordination with at least one foreign partner, infiltrated REvil's network infrastructure.[25] Authorities exploited vulnerabilities in REvil's restored backup servers, which the group had reactivated unaware of prior compromises, to seize control and deploy disruptive measures.[25] This action rendered REvil's key Tor-based sites, including the "Happy Blog" for extortion communications, inaccessible, effectively halting ongoing operations and communications with victims.[25] A REvil administrator known as "0_neday" acknowledged the breach on a forum before going silent, marking a significant blow following earlier self-imposed downtime in July 2021 after the Kaseya supply-chain attack.[25][26] The October disruption built on U.S. efforts that included withholding a universal decryption key recovered from REvil systems after the Kaseya incident, prioritizing pursuit of group members over immediate victim recovery.[25] By November 2021, U.S. authorities had indicted two alleged REvil affiliates on charges related to ransomware deployment.[27] These actions temporarily fragmented REvil's centralized command, but the Ransomware-as-a-Service model's distributed affiliate structure allowed residual activity, with reports of opportunistic extortion attempts persisting via legacy channels. In January 2022, Russia's Federal Security Service (FSB) arrested several purported REvil members, seizing servers, cryptocurrency wallets holding over 450 million rubles (approximately $6 million USD at the time), and charging them with organized cybercrime.[27] Russian officials claimed this dismantled the group's core operations, aligning with international pressure amid heightened U.S.-Russia tensions over ransomware.[27] However, new REvil-branded ransomware binaries surfaced shortly after, suggesting involvement by unaffiliated copycats or surviving subsets of affiliates rather than original leadership, indicative of operational fragmentation into less coordinated entities with diminished scale and influence.[27][28] By mid-2022, accumulating indicators pointed to potential revival efforts by former members, though without the prior group's former cohesion or high-profile impact, reflecting broader patterns where takedowns scatter RaaS operators into splinter activities.[28][29]Operational Mechanics
Ransomware-as-a-Service Structure
REvil functioned as a Ransomware-as-a-Service (RaaS) operation, a model in which a central developer team supplied customizable ransomware tools to independent affiliates responsible for target selection, intrusion, deployment, and extortion activities.[30][31] This structure, initiated in 2019 following the retirement of the GandCrab ransomware, enabled scalable operations by distributing risk and leveraging specialized skills among participants.[31] The core team, presumed to consist of Russian-speaking actors based on operational patterns and language use, focused on malware evolution while affiliates executed field operations, primarily targeting organizations outside Russia and Commonwealth of Independent States (CIS) countries.[30] The developer team maintained control over the Sodinokibi/REvil ransomware codebase, releasing updates to evade detection and incorporating features like data exfiltration for double-extortion.[31] They provided affiliates with "builders"—tools to generate unique ransomware variants—and enforced operational guidelines, such as prohibiting attacks on government entities, social services, or entities in Russia, Belarus, and other CIS nations, as announced in a May 2021 forum post.[30] This central authority ensured malware integrity and handled backend infrastructure, including payment processing via cryptocurrency and victim data leak sites like the "Happy Blog."[32] Affiliates, often experienced cybercriminals including former GandCrab operators, managed the full attack lifecycle: gaining initial access through methods like Remote Desktop Protocol (RDP) brute-forcing or exploiting vulnerabilities, lateral movement within networks, data theft, ransomware encryption, and ransom negotiation.[31] Each affiliate received a unique identifier, such as a Process ID (PID), embedded in the malware to track infections attributable to their campaigns, facilitating accurate profit attribution in a parent-child deployment structure.[31] Affiliates targeted high-value victims, including managed service providers (MSPs) for supply-chain amplification, as seen in attacks demanding up to $50 million, with some payments like $11 million from JBS Foods in May 2021.[30] Profits from ransoms, typically demanded in Bitcoin and ranging into millions of dollars, were split with affiliates retaining at least 75% of proceeds, while developers claimed the remainder for malware provision and support.[30] Payments flowed through controlled wallets, with developers allegedly incorporating backdoors in some variants to monitor or divert funds, leading to reports of internal scams where core operators negotiated separately with victims to undercut affiliates.[33] Recruitment occurred via dark web forums, notably exploit.in, where REvil advertised its RaaS program to attract skilled operators, including those displaced from shuttered groups, emphasizing high payout potential and technical reliability.[30] This affiliate-centric model fostered rapid expansion but introduced tensions, as evidenced by forum disputes over rule enforcement and payout disputes, contributing to operational fragmentation by late 2021.[32]Malware Technical Features
REvil, also known as Sodinokibi or Sodevo, is a ransomware family that first appeared in April 2019 and exhibits code similarities to the discontinued GandCrab ransomware, including shared string decoding functions and URL-building logic suggestive of overlapping development.[6][34] The malware operates as a Windows PE executable, often delivered in obfuscated forms such as masquerading installers or macro-embedded documents, and supports command-line arguments for customized execution, such as-fast for rapid encryption or -nolocal to skip local drives.[35][36]
The core payload employs hybrid encryption, primarily using the Salsa20 stream cipher to encrypt files with unique session keys generated per victim or file, while the session keys themselves are secured via RSA-2048 or elliptic curve cryptography (ECC) with the attacker's public key.[34][36] Encrypted files receive randomly generated extensions (e.g., .1cd8t9ahd5 or strings from the registry like x4WHjRs), and the malware skips certain whitelisted paths or extensions such as boot files or .exe to maintain system operability.[35][6] Post-encryption, it deletes volume shadow copies using vssadmin delete shadows /all /quiet, disables Windows recovery options via bcdedit, and terminates interfering processes like antivirus software, SQL servers, or Outlook to hinder detection and recovery.[34][37] A ransom note, typically named HOW-TO-DECRYPT.txt or similar, is dropped in affected directories, containing a unique victim ID (e.g., F3FD1FCFF284306B) and instructions for payment via a TOR onion site.[6][35]
Initial infection vectors include exploitation of unpatched vulnerabilities, such as the zero-day CVE-2019-2725 in Oracle WebLogic servers for remote code execution, CVE-2018-8453 for privilege escalation, and supply-chain compromises like the June 2021 Kaseya VSA breach via CVE-2021-30116.[34][37][36] Other entry points encompass phishing emails with malicious ZIP attachments or Office macros, RDP brute-force attacks exploiting weak credentials, and drive-by downloads from compromised websites or backdoored software installers (e.g., WinRAR).[6][35] Lateral propagation occurs across network shares, with configurable options to target remote systems, often following initial foothold establishment via managed service providers (MSPs).[36]
Evasion techniques feature RC4-encrypted strings, dynamic loading of the Import Address Table (IAT) to avoid static signatures, CRC32-hashed function names, and creation of mutexes (e.g., C19C0A84-FA11-3F9C-C3BC-0BCB16922ABF) to prevent redundant executions.[6][35] The malware performs locale checks to self-terminate on Russian or CIS-language systems, reducing risk to operators, and embeds a JSON configuration (e.g., in .m69 resources or .cfg sections) for parameters like targeted file types and C2 endpoints.[35][37]
Command-and-control (C2) communication relies on HTTPS POST requests to hardcoded or dynamically generated domains, sending victim details in JSON format via semi-randomized paths (e.g., https://<c2>/wp-content/images/abcd.jpg) with User-Agent strings mimicking legitimate browsers.[6][35] Fallback to TOR onion sites (e.g., aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion) ensures resilience, while pre-exfiltration of data using tools like Rclone or WinSCP supports double-extortion by threatening leaks on dedicated dark web portals.[34][36]
