New REvil Samples Indicate Ransomware Gang is Back After Months of Inactivity,
The notorious ransomware operation known as REvil (aka Sodin or Sodinokibi) has resumed after six months of inactivity, an analysis of new ransomware samples has revealed.
« Analysis of these samples indicates that the developer has access to REvil’s source code, reinforcing the likelihood that the threat group has reemerged, » researchers from Secureworks Counter Threat Unit (CTU) said in a
« Analysis of these samples indicates that the developer has access to REvil’s source code, reinforcing the likelihood that the threat group has reemerged, » researchers from Secureworks Counter Threat Unit (CTU) said in a
,
The notorious ransomware operation known as REvil (aka Sodin or Sodinokibi) has resumed after six months of inactivity, an analysis of new ransomware samples has revealed.
« Analysis of these samples indicates that the developer has access to REvil’s source code, reinforcing the likelihood that the threat group has reemerged, » researchers from Secureworks Counter Threat Unit (CTU) said in a
« Analysis of these samples indicates that the developer has access to REvil’s source code, reinforcing the likelihood that the threat group has reemerged, » researchers from Secureworks Counter Threat Unit (CTU) said in a
, ,
https://thehackernews.com/2022/05/new-revil-samples-indicate-ransomware.html