REvil Used 0-Day in Kaseya Ransomware Attack, Demands $70 Mi

REvil Used 0-Day in Kaseya Ransomware Attack, Demands $70 Million Ransom


REvil Used 0-Day in Kaseya Ransomware Attack, Demands $70 Million Ransom
Amidst the massive supply-chain ransomware attack that triggered an infection chain compromising thousands of businesses on Friday, new details have emerged about how the notorious Russia-linked REvil cybercrime gang may have pulled off the unprecedented hack.
The Dutch Institute for Vulnerability Disclosure (DIVD) on Sunday revealed it had alerted Kaseya to a number of zero-day vulnerabilities in its VSA software (CVE-2021-30116) that it said were being exploited as a conduit to deploy ransomware. The non-profit entity said the company was in the process of resolving the issues as part of a coordinated vulnerability disclosure when the July 2 attacks took place.

Related Keywords

United States , Mexico , Kenya , New Zealand , Netherlands , Argentina , South Africa , Indonesia , Canada , American , Dutch , Barry Hensley , Kevin Reed , Victor Gevers , Acronis , Dutch Institute For Vulnerability Disclosure , Linkedin , Infrastructure Security Agency , Twitter , Facebook , Dutch Institute , Vulnerability Disclosure , North American , Compromise Detection Tool , Chief Threat Intelligence Officer , Hacker News , ஒன்றுபட்டது மாநிலங்களில் , மெக்ஸிகோ , கேந்ய , புதியது ஜீலாந்து , நெதர்லாந்து , அர்ஜெண்டினா , இந்தோனேசியா , கனடா , அமெரிக்கன் , டச்சு , பாரி ஹென்ஸ்லி , கெவின் நாணல் , வெற்றியாளர் கேவேர்ச் , சென்டர் , ட்விட்டர் , முகநூல் , டச்சு நிறுவனம் , வடக்கு அமெரிக்கன் , ஹேக்கர் செய்தி ,

© 2025 Vimarsana