REvil: Criminals that got a taste of their own medicine | Behind the hacks

1K views
5 months ago

šŸ˜ˆ Discover the story of the attack against the REvil group. šŸ˜ˆ šŸš€ Enhance your online protection with a few clicks šŸ“±šŸ‘ˆ šŸ”„Get the special YouTube offer: https://content.nordvpn.com/3x6QzID šŸ”„ *** The REvil ransomware group has caused massive disruptions over the years. Yet at some point, this notorious group got a taste of its own medicine. Who hacked the REvil group? How did this operation happen? Dive into the story about the REvil ransomware attack. Contents of the video: 00:00 Intro 00:15 What is the REvil group? 01:25 How was REvil hacked? *** Hacking a hacker is fighting fire with fire. Using this dangerous strategy, a multi-nation team hit REvil, the notorious ransomware group. Weā€™re about to dig deeper into this mission. What do we know about REvil? Even though its origins are a bit murky, this hacker group emerged around 2019. It performed ransomware-as-a-service operations, meaning its main specialty was to develop malware. The criminals shared the malware with affiliates, who carried out various cyberattacks with REvilā€™s product and demanded ransom from their victims. REvil would then take part of the profit gained from victims. Who suffered from the groupā€™s crimes? The story gets more interesting. The REvil targets list includes lots of famous people. It also attacked huge companies. For example, an attack on the software company Kaseya remains one of the biggest ransomware assaults in history. REvil has also targeted JBS, the largest meat processing company in the world. Allegedly, it paid 11 million dollars to mitigate the attack. Itā€™s clear as day that this ransomware group was no joke. Hold on ā€“ the plot thickens from here. REvil was a relatively public group. It had a blog on which to post the sensitive stolen data of those who refused to pay ransoms. The name of this page was ā€œHappy Blog.ā€ One day, it went offline. Why? It was hacked. Several countries teamed up and used REvilā€™s favorite tactic ā€“ compromised backups. During REvilā€™s attack on Kaseya, the FBI managed to obtain a universal decryption key. It allowed victims to recover their files without paying ransom to the group. With this key, law enforcement accessed REvilā€™s network. It also hid the FBIā€™s software in REvilā€™s backups. Wait till you hear the best part. When one of the groupā€™s members decided to restore Revilā€™s servers hit by the FBI, he opened a gate. Law enforcement entered REvilā€™s systems, temporarily shut it down, and gained even more insight into how this group operates. Fighting fire with fire, beating hackers at their own game, or using an Uno reverse card ā€“ call this operation what you want. Yet one thing is clear ā€“ itā€™s a remarkable example of fighting cybercrime. *** šŸ“ŒOUR SOCIAL MEDIA šŸ“± šŸ”µFACEBOOK: https://www.facebook.com/NordVPN/ šŸ”µINSTAGRAM: https://www.instagram.com/nordvpn/ šŸ”µTIKTOK: https://www.tiktok.com/@nordvpn šŸ”µTWITTER: https://twitter.com/NordVPN #REvil #ransomwareattack #Behindthehacks

0 Comments

0/2000