German authorities and reporters claim to identify core REvil member

Suspect connected to criminal Bitcoin payments

German authorities and reporters claim to identify core REvil member

German authorities and reporters claim to identify core REvil member

The big picture A group of cooperating German investigators and intelligencers claim to have tracked down a crucial member of the REvil ransomware gang, which has been responsible for a significant number of attacks this time. It remains unclear when or if the investigators will be suitable to arrest the person in question because they live in Russia, a government that is been indicted of turning an eyeless eye to ransomware gangs staying within its borders. 

 According to reports from German news associations Bayerischer Rundfunk and Die Zeit, the two spent months following the digital trail of Bitcoin and dispatch addresses to establish a connection between ransomware payments and someone they relate to as"NikolayK."Social media vids from his woman" EkaterinaK." shows the couple holidaying in the Mediterranean on precious yachts. Nikolay's profile only reveals that he makes plutocrats in Bitcoin. 
The journalists were suitable to connect NikolayK.'s name to Russian websites and phone figures connected to a Telegram account, which is connected to a Bitcoin address. That Bitcoin address entered at least six payments totaling over$ from accounts Zeit says are connected to felonious associations. Bitcoin payment judges tell Zeit the payments most probably come from gouging. 


 
 The Baden-Württemberg State Criminal Police Office (LKA) is also convinced NikolaiK. is a REvil member and has been probing him since a 2019 ransomware attack on a Stuttgart theater. The LKA has formerly prepared an arrest leave for NikolaiK., but can not arrest him unless he enters a company willing to cooperate with Germany. NikolayK.'s most recent holiday still was in Crimea, which Russia enthralled and adjoined in 2014. 

German authorities and reporters claim to identify core REvil member

German authorities and reporters claim to identify core REvil member


Before this month, McAfee released a security report claiming that REvil's ransomware software was responsible for over 70 percent of ransomware findings out of the top 10 bushwhackers for the alternate quarter of 2021. 


 REvil most famously assailed IT operation platform Kaseya this summer, affecting hundreds of companies that use its favors. REvil demanded a$ 70 million deliverances for the decryption keys to unlock systems that the REvil software had paraphrased. 
 Security groups Latterly released those keys for free along with instructions for how to use them. REvil also temporarily faded, only to latterly reappear and renew its attacks using new software that the old keys can not decipher. REvil has indeed reportedly stolen deliverance plutocrat from guests that rented its software for their own attacks. 

Post a Comment

Previous Post Next Post