CISA, FBI publish guidance for MSPs and their customers affected by recent REvil supply chain ransomware attack
Kaseya estimates that "fewer than 1,500 downstream businesses" have been affected by the REvil ransomware attack.
Kaseya estimates that "fewer than 1,500 downstream businesses" have been affected by the REvil ransomware attack.
It appears, that hackers abused a zero-day flaw in the Kaseya VSA servers.
Targeted organizations include government and military, defense contractors, energy firms, logistics companies, think tanks, universities, law firms and media companies.
The new threat actor is asking for .006 bitcoins from victims and is using email to communicate with victims instead of a dedicated Tor payment site.
Mihai Ionut Paunescu was first arrested in Romania in 2012, but was able to avoid extradition.
Researchers from Chinese cybersecurity company Sangfor published a proof-of-concept code of a bug that wasn’t actually the same vulnerability fixed by Microsoft.
The researchers speculate that mass-wipe and factory reset were carried out by different attackers.
The Denmark’s central bank said it found no evidence that the attack “had any real consequences.”
Until its take-down, DoubleVPN’s site stated that the service kept no logs and statistics on its users, but it appears not to be the case.
The Netfilter driver signed by Microsoft was redirecting traffic bound for hundreds of IP addresses to a server in China.
Showing elements 2971 - 2980