Tuesday, March 4, 2025
HomeCyber Security NewsREvil Ransomware Gang Suddenly Disappear - Dark Web Sites Are Down

REvil Ransomware Gang Suddenly Disappear – Dark Web Sites Are Down

Published on

SIEM as a Service

Follow Us on Google News

REvil is one of the well-known Ransomware Gangs from Russia which is popular for its earlier and recent ransomware attacks. Apart from this, the REvil ransomware gang mainly targets political figures and big tech companies.

However, all the websites that were associated with the REvil ransomware group have currently disappeared from the Internet. 

According to several web reports, all those websites that are associated with REvil Ransomware Gang are no longer accessible, and all kinds of communications have been discontinued. 

REvil Ransomware Gang Suddenly Disappear

Apart from websites, the media that has been used by the group to communicate had also stopped. Even all the dark websites that are associated with the REvil ransomware group are now inaccessible.

Recently, REvil ransomware group has encrypted nearly 60 managed service providers (MSPs) and more than 1,500 individual businesses simply by utilizing a zero-day vulnerability in the Kaseya VSA remote management software.

This attack is one of the big attacks of REvil, and after implementing the attack, this ransomware gang has charged $70 million for a comprehensive decryptor for all victims that got affected by this attack but soon after the demand the group decreased the demanded price to $50 million.

Dismissal possibilities 

According to the law enforcement team, security experts have raised few dismissal possibilities, and here we have mentioned them below:-

  • It might happened, because initially, the United States has made a strong settlement to attack the servers of this group.
  • It might happened due to the discussion between Vladimir Putin and Biden, and as a result, Russia has taken few actions to follow the United States’ demands. All this has been done to stop mutual relations from starting to undergo due to repeated attacks.
  • It may also be possible that the REvil group itself has eliminated all of its websites. However, their attacks have obtained nearly 42%, and it’s becoming quite risky for them to implement further attacks, that’s why doing this will help them a lot, and later the attackers could appear again under a new name and with new victims.

However, REvil ransomware group was in the spotlight as last month, the group has attacked JBS, the world’s biggest supplier of beef and poultry, as well as the second-largest producer of pork.

Moreover, the analysts are still trying their best to find the possible reasons and the loopholes for such a situation. Even they have also claimed that there are many possibilities and they are striving to know all of them as soon as possible.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Hunters International Claims Tata Technologies Cyberattack

Multinational engineering and technology services firm Tata Technologies has reportedly fallen victim to a...

Authorities Seize $31 Million Linked to Crypto Exchange Hack

U.S. authorities announced the seizure of $31 million tied to the 2021 Uranium Finance...

Google, Meta, and Apple Power the World’s Biggest Surveillance System

Imagine a government that tracks your daily movements, monitors your communications, and catalogs your...

Docusnap for Windows Flaw Exposes Sensitive Data to Attackers

A recently disclosed vulnerability in Docusnap's Windows client software (CVE-2025-26849) enables attackers to decrypt...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hunters International Claims Tata Technologies Cyberattack

Multinational engineering and technology services firm Tata Technologies has reportedly fallen victim to a...

Authorities Seize $31 Million Linked to Crypto Exchange Hack

U.S. authorities announced the seizure of $31 million tied to the 2021 Uranium Finance...

Google, Meta, and Apple Power the World’s Biggest Surveillance System

Imagine a government that tracks your daily movements, monitors your communications, and catalogs your...