Wednesday, January 29, 2025
HomeCyber Security NewsREvil Ransomware Gang Suddenly Disappear - Dark Web Sites Are Down

REvil Ransomware Gang Suddenly Disappear – Dark Web Sites Are Down

Published on

SIEM as a Service

Follow Us on Google News

REvil is one of the well-known Ransomware Gangs from Russia which is popular for its earlier and recent ransomware attacks. Apart from this, the REvil ransomware gang mainly targets political figures and big tech companies.

However, all the websites that were associated with the REvil ransomware group have currently disappeared from the Internet. 

According to several web reports, all those websites that are associated with REvil Ransomware Gang are no longer accessible, and all kinds of communications have been discontinued. 

REvil Ransomware Gang Suddenly Disappear

Apart from websites, the media that has been used by the group to communicate had also stopped. Even all the dark websites that are associated with the REvil ransomware group are now inaccessible.

Recently, REvil ransomware group has encrypted nearly 60 managed service providers (MSPs) and more than 1,500 individual businesses simply by utilizing a zero-day vulnerability in the Kaseya VSA remote management software.

This attack is one of the big attacks of REvil, and after implementing the attack, this ransomware gang has charged $70 million for a comprehensive decryptor for all victims that got affected by this attack but soon after the demand the group decreased the demanded price to $50 million.

Dismissal possibilities 

According to the law enforcement team, security experts have raised few dismissal possibilities, and here we have mentioned them below:-

  • It might happened, because initially, the United States has made a strong settlement to attack the servers of this group.
  • It might happened due to the discussion between Vladimir Putin and Biden, and as a result, Russia has taken few actions to follow the United States’ demands. All this has been done to stop mutual relations from starting to undergo due to repeated attacks.
  • It may also be possible that the REvil group itself has eliminated all of its websites. However, their attacks have obtained nearly 42%, and it’s becoming quite risky for them to implement further attacks, that’s why doing this will help them a lot, and later the attackers could appear again under a new name and with new victims.

However, REvil ransomware group was in the spotlight as last month, the group has attacked JBS, the world’s biggest supplier of beef and poultry, as well as the second-largest producer of pork.

Moreover, the analysts are still trying their best to find the possible reasons and the loopholes for such a situation. Even they have also claimed that there are many possibilities and they are striving to know all of them as soon as possible.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Vulnerability in Airline Integration Service enables A Hacker to Gain Entry To User Accounts

A recent security vulnerability in a widely used airline integration service has exposed millions...

Hackers Seize Control of 3,000 Companies Through Critical Vulnerabilities

In a groundbreaking cybersecurity investigation, researchers identified several critical vulnerabilities in a target system,...

PoC Exploit Released for Critical Cacti Vulnerability Let Attackers Code Remotely

A critical vulnerability in the Cacti performance monitoring framework tracked as CVE-2025-22604, has been...

TorNet Backdoor Exploits Windows Scheduled Tasks to Deploy Malware

Cisco Talos researchers have identified an ongoing cyber campaign, active since mid-2024, deploying a...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Vulnerability in Airline Integration Service enables A Hacker to Gain Entry To User Accounts

A recent security vulnerability in a widely used airline integration service has exposed millions...

Hackers Seize Control of 3,000 Companies Through Critical Vulnerabilities

In a groundbreaking cybersecurity investigation, researchers identified several critical vulnerabilities in a target system,...

PoC Exploit Released for Critical Cacti Vulnerability Let Attackers Code Remotely

A critical vulnerability in the Cacti performance monitoring framework tracked as CVE-2025-22604, has been...