CyberScoop reports that the REvil ransomware operation has been dismantled in January with the help of a "disgruntled internal source" upset with their earnings in relation to other affiliates.
Trellix Head of Threat Intelligence John Fokker noted in a report that researchers were able to better understand REvil's operations, as well as the way how it monitored associates, through screenshots of its backend pane shared by the aggrieved affiliate. The source revealed that infostealer logs, PowerShell scripts, RDPBrute, WinPEAS, ADFind, Cobalt Strike, and Mimikatz have been part of REvil's arsenal.
"This unprecedented finding was surprising, and we immediately packaged these findings together with additional analysis on individual members and the organizations communication channels in a 55-page report for global law enforcement," wrote Fokker.
The disruption of REvil indicates the importance of affiliate happiness among ransomware operators.
"It shows that if you're not paying your people, you're not paying what people think they're owed, the loyalty goes out the door," Fokker added.
BleepingComputer reports that multinational building automation conglomerate Johnson Controls had its operations, as well as those of its subsidiaries, disrupted by a significant ransomware attack claimed by the Dark Angels ransomware operation over the weekend that compromised its VMware ESXi servers and various other devices.
The Philippine Health Insurance Corporation, which manages the country's universal healthcare system, had its websites and portals disrupted by a Medusa ransomware attack last week, from which it is struggling to recover, reports The Record, a news site by cybersecurity firm Recorded Future.
Japanese multinational conglomerate Sony has begun an investigation into an alleged cyberattack, which was reported to have resulted in the exposure of 3.14 GB of data in hacking forums, amid the emergence of different attackers claiming to be behind the hack, according to BleepingComputer.