REvil’s Back; Coder Fat-Fingered Away Its Decryptor Key

Threat Post -

How did Kaseya get a universal decryptor after a mind-bogglingly big ransomware attack? A REvil coder misclicked, generated & issued it, and “That’s how we sh*t ourselves.”

The REvil ransomware gang’s tentacles shot out yet again last week, with the ransomware gang’s servers back online, a fresh victim listed on its site, ransomware payments back up and flowing, and an explanation of why it took a two-month hiatus

A purported REvil representative also addressed a slew of questions, including: 

Q: How did Kaseya, an IT solutions developer for managed service providers (MSPs), get its hands on a universal decryptor key that was leaked online after REvil launched one of the biggest ransomware sprees in history against it and 60 of its MSP clients on July 2?

A:  The short answer: A REvil coder screwed up. 

As Flashpoint has reported, REvil posted twice on the Exploit underground forum

The post REvil’s Back; Coder Fat-Fingered Away Its Decryptor Key originally appeared on Threat Post.

Read More.....