Last Week in Ransomware: Week of July 26th

This week REvil Ransomware had a universal decryption key appear out of thin air and the US has accused China of ProxyLogon.
1 min read
Last updated March 3, 2022

In previous weeks we mentioned that the group behind the REvil ransomware attack has vanished from the internet, which makes it particularly surprising that a universal decryption key has been released this week. The key should allow all the victims that didn’t have backups to unlock their files. The mysterious appearance of this key has led to wild speculation including the possibility of the Russian government’s involvement or the payment of the $70 million Ransom.

The ProxyLogon attack also has an official attribution with the US government accusing China of creating the attack and using it to distribute ransomware including black Kingdom.

CBS has an interesting story on what they’re calling the ransomware cartel i.e. the groups known as Wizard Spider, Twisted Spider, Viking Spider, and LockBit, and their seeming collaboration.

Famous OSINT researcher Michael Bazzell also released a provocative blog post this week highlighting the personal impact ransomware can have.

The other big headlines of the week include a fake browser update being the demise of a financial institution and SonicWall is being used by HelloKitty. Thankfully in the case of the HelloKitty attack, it’s a known vulnerability with a patch so it’s a simple matter of upgrading firmware and shutting down end-of-life devices.

Ransomware Research

This week we have several new ransomware variants along with samples on virus total and even the ransom email for several.

Upcoming Security Conferences

Ransomware Live 2021 ( July 29 – 31)

This is the largest conference focused exclusively on the ransomware threat. It offers a great opportunity to grow your security knowledge and find new and innovative ways to protect your company.

BLACK HAT USA 2021 (July 31 – Aug 5)

Black hat is one of the largest annual security conferences. It’s the corporate version of Defcon and as such is a great opportunity to get face time with security professionals such as the Varonis team. Be sure to stop by our booth!

 

What should I do now?

Below are three ways you can continue your journey to reduce data risk at your company:

1

Schedule a demo with us to see Varonis in action. We'll personalize the session to your org's data security needs and answer any questions.

2

See a sample of our Data Risk Assessment and learn the risks that could be lingering in your environment. Varonis' DRA is completely free and offers a clear path to automated remediation.

3

Follow us on LinkedIn, YouTube, and X (Twitter) for bite-sized insights on all things data security, including DSPM, threat detection, AI security, and more.

Try Varonis free.

Get a detailed data risk report based on your company’s data.
Deploys in minutes.

Keep reading

Varonis tackles hundreds of use cases, making it the ultimate platform to stop data breaches and ensure compliance.

what-is-database-activity-monitoring?-dam-explained
What is Database Activity Monitoring? DAM Explained
A critical component of any organization's security strategy, Database Activity Monitoring tools are used by organizations to fulfill compliance criteria and protect sensitive data.
rethinking-database-security-for-the-age-of-ai-and-cloud
Rethinking Database Security for the Age of AI and Cloud
Discover the pillars of database security and how Varonis Next-Gen database activity monitoring (DAM) protects sensitive data in AI and cloud environments.
top-10-cybersecurity-awareness-tips:-how-to-stay-safe-and-proactive
Top 10 Cybersecurity Awareness Tips: How to Stay Safe and Proactive
With breaches on the rise, it’s crucial to make cybersecurity a priority. Follow these preventative cybersecurity tips for stronger security practices.
research-reveals-healthcare-orgs-have-90%-of-sensitive-data-exposed-to-ai
Research Reveals Healthcare Orgs Have 90% of Sensitive Data Exposed to AI
Varonis studied 98 IT environments to assess AI’s impact on healthcare, biotech, and pharma — and how organizations can better protect critical data.