• CERTIFICATE
    • Eminent VARs of India
    • Best OEM 2023
  • SYNDICATION
    • AMD
    • DELL TECHNOLOGIES
    • HITACHI
    • LOGMEIN
    • MICROSOFT
    • RIVERBED
    • STORAGECRAFT
    • THALES
  • EVENTS
  • GO DIGITAL
  • INFOGRAPHICS
  • PRESS
    • Press Release PR News Wire
    • Press Release Business Wire
    • GlobeNewsWire
  • SPECIAL
    • WHITE PAPER
    • TECHNOMANIA
    • SME
    • SMART CITY
    • SERVICES
    • EDITOR SPEAK
    • CSR INITIATIVES
    • CHANNEL GURU
    • CHANNEL CHIEF
    • CASE STUDY
  • TECHTREND
    • VAR PANCHAYAT
    • TELECOM
    • SOFTWARE
    • POWER
    • PERIPHERALS
    • NETWORKING
    • LTE
    • CHANNEL BUZZ
    • ASK AN EXPERT
  • SUBSCRIBE
  • Apps
  • Gaming
  • KDS
  • Security
  • Telecom
  • WFH
  • Subscriber to Newsletter
  • April Issue
  • Blogs
  • Vlogs
  • Faceoff AI
    

HOME
NEWS

How to detect and defend against REvil ransomware


By VARINDIA - 2021-06-17
How to detect and defend against REvil ransomware

With news breaking daily about ransomware attacks, the most recent attack on a major global meat-producer shocked the cybsersecurity world. As one of the biggest REvil attacks, the meat-producer in question has slowly resumed operations after a weekend attack but experts feel that the vulnerabilities exposed by this attack are far from over. In fact reports also suggest that REvil is one of the most popular ransowmares targeting India and the APAC region at large. Sophos threat researchers have done a deep dive into the tactics, techniques and procedures (TTPs) of REvil attackers.

 

Sophos researchers report on how to detect and defend against REvil ransomware when no two attacks are the same

 

REvil, also known as Sodinokibi, is a mature and widely used ransomware-as-a-service (RaaS) offering. Criminal customers can lease the ransomware from the developers, adding their own targeting and deployment of the ransomware to victim computers. The approach and impact of an attack involving REvil ransomware is therefore highly variable, depending on the tools, behaviors, resources, and skills of the adversary leasing the malware.

 

In a new article, “Relentless REvil, Revealed: RaaS As Variable As the Criminals Who Use It,” Sophos researchers from SophosLabs and the Sophos Rapid Response team detail the tools and behaviors they have seen adversaries use most often to implement a REvil attack. The aim of the research is to arm defenders with actionable insight they can use to spot an impending or unfolding REvil ransomware attack and protect their organizations.

 

REvil ransomware attack tools and behaviors that Sophos researchers have seen include:

 

· Breaking-in through brute-force attacks against known internet-facing services like VPNs, remote desktop protocol (RDP), desktop remote management tools like VNC, and even some cloud-based management systems; abusing credentials obtained through malware or phishing; or simply by adding the payload to other malware that’s already on the target's network

 

· Credential harvesting and privilege escalation using Mimikatz to obtain the credentials of a Domain admin

 

· Laying the groundwork for the release of the ransomware by disabling or deleting back-ups, attempting to disable security technologies and identifying target machines for encryption

 

· Uploading large volumes of data for exfiltration – although Sophos researchers have only seen this in around half of the REvil/Sodonokibi incidents they’ve investigated. In cases that included data theft, roughly three-quarters used Mega.nz as a (temporary) repository for the stolen data

 

· Rebooting the computer into Safe Mode before data encryption in order to bypass endpoint protection tools

 

The article also includes a look under the hood of REvil ransomware, from its composition to how it behaves when executed.

 

Andrew Brandt, Principal Researcher, Sophos, said: “For a common, everyday ransomware that’s been around for a few years, REvil/Sodinokibi manages to do considerable damage and command multi-million-dollar ransom payments. Its success may be due in part to the fact that, as a ransomware-as-a-service offering, every attack is different. This can make it hard for defenders to know the warning signs to look out for.

 

“The adversaries deploying REvil ransomware can be very hands-on and persistent, according to the findings of Sophos Rapid Response. In one recent REvil attack investigated by the team, the data collected from a compromised server showed approximately 35,000 failed login attempts taking place over a five-minute period, originating from 349 unique IP addresses around the world. It is also worth noting that the ransomware landscape has not only become increasingly complex, but increasingly crowded. In at least two REvil attacks seen by Sophos researchers, the initial point of access was something that had been left behind from an earlier ransomware attack by another adversary.

 

“Fortunately, there are things defenders can do to protect their organizations, networks and endpoints. The ideal is to prevent the attackers from gaining access to the network in the first place. That may not always be possible, so effective detection is a must. If you can detect the presence of an intruder at an early stage, you can stop the attack from unfolding further.”

 

To learn more about REvil/Sodinokibi ransomware attacks and how to defend against them, see the article on SophosLabs Uncut.

 

If you would like to speak to one of our experts about REvil ransomware or any other ransomware-related topic, please get in touch.

 

Mr. Andrew Brandt, Principal Researcher, Sophos

See What’s Next in Tech With the Fast Forward Newsletter

SECURITY
View All
Zscaler announces AI innovations to its Data Protection Platform
Technology

Zscaler announces AI innovations to its Data Protection Platform

by VARINDIA 2024-05-20
SHIELD to enhance Swiggy’s fraud prevention and detection capabilities
Technology

SHIELD to enhance Swiggy’s fraud prevention and detection capabilities

by VARINDIA 2024-05-20
Axis Communications announces its first thermometric camera designed for Zone/Division 2
Technology

Axis Communications announces its first thermometric camera designed for Zone/Division 2

by VARINDIA 2024-05-20
SOFTWARE
View All
Hitachi Vantara and Veeam announce Global Strategic Alliance
Technology

Hitachi Vantara and Veeam announce Global Strategic Alliance

by VARINDIA 2024-05-16
Adobe launches Acrobat AI Assistant for the Enterprise
Technology

Adobe launches Acrobat AI Assistant for the Enterprise

by VARINDIA 2024-05-11
Oracle Database 23ai offers the power of AI to Enterprise Data and Applications
Technology

Oracle Database 23ai offers the power of AI to Enterprise Data and Applications

by VARINDIA 2024-05-10
START - UP
View All
Data Subject Access Request is an integrated module within ID-REDACT®
Technology

Data Subject Access Request is an integrated module within ID-REDACT®

by VARINDIA 2024-04-30
SiMa.ai Secures $70M Funds from Maverick Capital
Technology

SiMa.ai Secures $70M Funds from Maverick Capital

by VARINDIA 2024-04-05
Sarvam AI collaborates with Microsoft to bring its Indic voice LLM to Azure
Technology

Sarvam AI collaborates with Microsoft to bring its Indic voice LLM to Azure

by VARINDIA 2024-02-08

Tweets From @varindiamag

Nothing to see here - yet

When they Tweet, their Tweets will show up here.

CIO - SPEAK
Automation has the potential to greatly improve efficiency and production

Automation has the potential to greatly improve efficiency and production

by VARINDIA
Various approaches are followed to enhance efficiency, productivity, and cost-effectiveness

Various approaches are followed to enhance efficiency, productivity, and cost-effectiveness

by VARINDIA
Technology can be leveraged in several ways to boost efficiency, productivity and reduce cost

Technology can be leveraged in several ways to boost efficiency, productivity and reduce cost

by VARINDIA
Start-Up and Unicorn Ecosystem
GoDaddy harnesses AI power for new domain name recommendations

GoDaddy harnesses AI power for new domain name recommendations

by VARINDIA
UAE’s du Telecom selects STL as a strategic fibre partner

UAE’s du Telecom selects STL as a strategic fibre partner

by VARINDIA
JLR and Dassault Systèmes extend partnership for All Vehicle Programs worldwide

JLR and Dassault Systèmes extend partnership for All Vehicle Programs worldwide

by VARINDIA
Rapyder partners with AWS to accelerate Generative AI led innovation

Rapyder partners with AWS to accelerate Generative AI led innovation

by VARINDIA
ManageEngine integrates its SIEM solution with Constella Intelligence

ManageEngine integrates its SIEM solution with Constella Intelligence

by VARINDIA
Elastic replaces traditional SIEM game with AI-driven security analytics

Elastic replaces traditional SIEM game with AI-driven security analytics

by VARINDIA
Infosys and ServiceNow to transform customer experiences with generative AI-powered solutions

Infosys and ServiceNow to transform customer experiences with generative AI-powered solutions

by VARINDIA
Crayon Software Experts India inaugurates its ISV Incubation Center in Kolkata

Crayon Software Experts India inaugurates its ISV Incubation Center in Kolkata

by VARINDIA
Dassault Systèmes to accelerate EV charging infrastructure development in India

Dassault Systèmes to accelerate EV charging infrastructure development in India

by VARINDIA
Tech Mahindra and Atento to deliver GenAI powered business transformation services

Tech Mahindra and Atento to deliver GenAI powered business transformation services

by VARINDIA
×

Reproduction in whole or in part in any form or medium without express written permission of Kalinga Digital Media Pvt. Ltd. is prohibited.

  • Distributors & VADs
  • Industry Associations
  • Telco's in India
  • Indian Global Leaders
  • Edit Calendar
  • About Us
  • Advertise Us
  • Contact Us
  • Disclaimer
  • Privacy Statement
  • Sitemap

Copyright varindia.com @1999-2024 - All rights reserved.