-
#Sodinokibi /#REvil#ransomware is back and not just their sites. The latest variant from today: https://www.virustotal.com/gui/file/ab0aa003d7238940cbdf7393677f968c4a252516de7f0699cd4654abd2e7ae83 …pic.twitter.com/dpfoq0Oy6Y
-
We're currently working on a report on
#REvil/#Sodinokibi ransomware. Should have the report out in a week or so (each report takes 40+ hours of work). Interested in the C2 IPs, files, mem dumps, logs, etc. ahead of time?
https://thedfirreport.com/services/ pic.twitter.com/wiYhx2YwQL
Show this thread -
List of victims(1160) attacked by Ransomware groups(20) => https://bit.ly/2YwotlM
#AKO#Avaddon#Clop#Conti#DarkSide#DoppelPaymer#Egregor#LockBit#MAZE#MountLocker#Nefilim#NetWalker#Pay2Key#Pysa#Ragnar_Locker#RansomEXX#RanzyLocker#Sekhmet#Sodinokibi#Suncrypt https://twitter.com/darktracer_int/status/1335828161410473986 …pic.twitter.com/eaNUEbGzfP
-
#Kaseya VSA servers are under active#REvil/#Sodinokibi#ransomware attacks.
We are closely monitoring the situation and making sure our customers are protected.
https://blog.malwarebytes.com/cybercrime/2021/07/shutdown-kaseya-vsa-servers-now-amidst-cascading-revil-attack-against-msps-clients/ …pic.twitter.com/wWYrWMfdkw
Show this thread -
DO IT!!!! Please we need to be rid of this orange carbuncle.
#REvil#Sodinokibi pic.twitter.com/Jcpbxe9fzF
-
The ransomware group REvil, aka
#Sodinokibi, published a blog on its site in which it claimed to have infiltrated the computer network of#Quanta Computer Inc. primary supplier of#Apple Stolen info about: Apple Watch Apple Macbook Air Apple Macbook Pro ThinkPadZ6om#AppleLeak pic.twitter.com/6M3VY2p3go
-
Top 4 vulnenrabilites whihc are the causes behind major cyberattacks https://ethicaldebuggers.com/top-vulnerabilities/ …
#Technology#infosec#Cybersecurity#Cyberattack#Ransomware#Vulnerability#Programming#Technews#ITSec#Security#Privacy#Informationsecurity#Maze#Sodinokibi#REvilpic.twitter.com/LoiZ8J3CMm
-
#HappyBlog is back !! (checked today 070920:00 UTC -3)#Ransomware#REvil#Sodinokibi pic.twitter.com/26G3MZUHuO
-
Sample
#Sodinokibi#Ransomware! https://www.virustotal.com/gui/file/6523c8c93b5a3d4cb73475a8b8782a4d4220c4ea885557cdb08e794c12db536f/detection … https://www.hybrid-analysis.com/sample/6523c8c93b5a3d4cb73475a8b8782a4d4220c4ea885557cdb08e794c12db536f/5f277a4a9b973b1543047183 …pic.twitter.com/Wk87bNWFEW
-
Five affiliates to
#Sodinokibi/#REvil were arrested during operation#GoldDust, which involved 17 countries, Europol,@Eurojust &@INTERPOL_HQ. The arrested affiliates are suspected of 7 000 infections, asking for over €200 million in ransom. More
http://ow.ly/J6Jg50GIl93 pic.twitter.com/2btgGFdElt
Show this thread -
#Sodinokibi#Ransomware Group hacked Kenneth Copeland and leaked related data to the#DarkWeb.pic.twitter.com/94VKHOwtR7
-
#REvil /#Sodinokibi#Ransomware - Affiliate "sub": "7088" - Adds "Company Name" in the ransom note. - {EXT}-read-me-<company_name>.txt - "bootcfg /raw /a /safeboot:network /id 1" - "bcdedit /set {current} safeboot network"pic.twitter.com/VvreSirSuP
-
T3 2021 was quite a busy period for ransomware. According to
#ESETresearch, the first and biggest spike occurred on September 9, caused by#Sodinokibi/#Revil hitting South Africa
, only days before the country's Department of Justice saw its systems encrypted. 1/5pic.twitter.com/4qv45wPJJt
Show this thread -
This week we saw significant growth in activity from
#TeslaCrypt,#Sodinokibi and#Gandcrab. while#Conti appears to be winding down considerably.pic.twitter.com/h0XEFFgkcY
-
Interesting to see how
#Revil /#Sodinokibi operators track security researchers and adapt their game appropriately! pic.twitter.com/u1HhY3nbCB
-
We're seeing a lot of chatter about Acer/Exchange and wanted to share something from our report.
The TAs first lateral movement was to our Exchange server.

Cobalt Strike SCM exec from beachhead
Exchange was vulnerable

Exchange was not exploited
#REvil/#Sodinokibi pic.twitter.com/qLr81rpJCV
Show this thread -
Today's Snort rule release is a doozy. We've got new coverage for
#Sodinokibi,#Emotet and perhaps most notably,#Drovorub http://cs.co/6013GlG5P pic.twitter.com/F8oRxsoTcQ -
"LV"
#Ransomware group using#Sodinokibi /#REvil Ransom note: https://pastebin.com/tS6bqZ4q pic.twitter.com/qMO6uEwWdk
-
#REvil#Sodinokibi
MD5: 6543523F2483B9365FD1AED238879588
VER: 2.3
SUB: "5781"
Price:
963.436 XMR first 48h after 1926.872 XMR
≈ 200,000 USD after ≈ 400,000 USD
RDP Client: WIN-1L9F5B0JHVM
IP: 193.169.252.]125
@58_158_177_102@guelfoweb@JRoosen@csirt_it@JAMESWT_MHTpic.twitter.com/ibTPpIKbkq
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.