Updated News Around the World

Ransomware: Kaseya says it has now got the REvil decryption key – and it works | ZDNet

American software firm Kaseya has access to the universal decryption key for the REvil ransomware that targeted its managed service provider customers.   

The company announced its access to the decryption tool on Thursday, some 20 days after the ransomware attack took place on July 2 

ZDNet Recommends

The best cyber insurance

The best cyber insurance

The cyber insurance industry is likely to go mainstream and is a simple cost of doing business. Here are a few options to consider.

Read More

The attack affected 60 of its customers directly and as many as 1,500 of their customers downstream. Swedish supermarket chain Coop’s cash registers were down for almost a week due to the attack. The company’s cash registers nationwide were infected via a tainted software update of Kaseya’s product, VSA, which is used to distribute software and security updates to endpoints. Schools in New Zealand using Kaseya software were also affected

SEE: Network security policy (TechRepublic Premium)

According to Kaseya, New Zealand-based security firm Emsisoft has confirmed the decryption tool does unlock files encrypted with REvil. 

“We can confirm that Kaseya obtained the tool from a third party and have teams actively helping customers affected by the ransomware to restore their environments, with no reports of any problem or issues associated with the decryptor,” Kaseya said in a statement

“Kaseya is working with Emsisoft to support our customer engagement efforts, and Emsisoft has confirmed the key is effective at unlocking victims.” 

An unnamed customer last week claimed to have paid a ransom to the REvil gang but was unable to decrypt encrypted files with the decryption key provided. REvil sold its ransomware as a service to third-party criminal gangs.     

The REvil gang’s websites went dark last week after US President Joe Biden pressed Russian President Vladmir Putin to clamp down on cybercriminals based in Russia that were targeting US firms.  

Biden reportedly told Putin that critical infrastructure should be off limits after a separate ransomware attack from the group DarkSide knocked US east coast fuel distributor Colonial Pipeline offline. 

ZDNet Recommends

The best cyber insurance

The best cyber insurance

The cyber insurance industry is likely to go mainstream and is a simple cost of doing business. Here are a few options to consider.

Read More

Some security experts believe the attack on Colonial elevated Russian-based ransomware to diplomatic discussions and prompted REvil to suspend its operations. 

SEE: Ransomware: Now gangs are using virtual machines to disguise their attacks

Coop rolled out a mobile payment system to allow customers to pay for goods while it replaced encrypted cash registers on July 8. The mobile payment system was rolled out to 300 stores across Sweden, allowing it to continue in-store trade. It also worked with charities to distribute perishable items while its cash registers were down to minimize waste. 

It’s not clear whether Kaseya paid the ransom demand of $70 million. A Kaseya spokesperson told The Guardian that it acquired the decryption key from a “trusted third party”. 

While some of Kaseya’s downstream customers have remediated affected systems, some customers’ endpoints have remained offline and could restore systems with the decryption key. 

For all the latest Technology News Click Here 

 For the latest news and updates, follow us on Google News

Read original article here

Denial of responsibility! NewsUpdate is an automatic aggregator around the global media. All the content are available free on Internet. We have just arranged it in one platform for educational purpose only. In each content, the hyperlink to the primary source is specified. All trademarks belong to their rightful owners, all materials to their authors. If you are the owner of the content and do not want us to publish your materials on our website, please contact us by email – [email protected]. The content will be deleted within 24 hours.