Victims who have been unable to recover all of their data locked by the REvil ransomware group got a big assist Thursday, as Bitdefender announced the release of a free, universal decryption key to restore their files.
Bitdefender announced on its blog that the tool was created in conjunction with an unnamed law enforcement partner and restores files from attacks before July 13, 2021. While Bitdefender noted that the investigation with law enforcement is ongoing, both parties believed it was important to release the decryptor to help as many victims as possible.
“We believe new REvil attacks are imminent after the ransomware gang’s servers and supporting infrastructure recently came back online after a two month hiatus,” Bitdefender wrote in the post. “We urge organizations to be on high alert and to take necessary precautions.”
The decryption key’s release comes shortly after activity suggests that the REvil ransomware group has resumed its attacks after months offline.
The group’s leaks site, “Happy Blog,” last week began posting new samples of its malware, as well as proof of breaches. SC Media reported that cybersecurity firm Mandiant noticed a new victim was added to Happy Blog for the first time since its relaunch on Sept. 11.
"On the same day that these sites reemerged, a message was shared with REvil affiliates stating that the infrastructure had previously been turned off and moved to other servers for safety reasons," Kimberly Goody, director of Mandiant’s financial crime analysis, told SC Media via email. "The threat actor who posted the announcement also highlighted various, minor updates to the SODINOKIBI ransomware.”
Kaseya was hit with ransomware over the July 4 weekend and later confirmed it obtained a decryption key from a third party for users of its VSA remote monitoring product. Kaseya did not disclose how it obtained the decryptor, but it denied paying a ransom. SC Media previously reported that Kaseya believed between 50 and 60 total customers were victims of the REvil outbreak, but with a large MSP client base, around 1,500 total downstream businesses were ultimately infected.