perm_phone_msgUNDER ATTACK? S.O.S. LINE + 1 (855) 805-3658

Ukrainian national sentenced over REvil ransomware spree

Blog ThorTech todayMay 5, 2024

Background
share close

Afiq Sam – stock.adobe.com

A 24-year-old Ukrainian man has been sentenced to more than 13 years in prison after being convicted of his role in the REvil ransomware attacks

By

Published: 02 May 2024 14:45

A United States court has sentenced a 24-year-old Ukrainian national named as Yaroslav Vasinskyi to 13 years and seven months in prison, and ordered him to pay more than $16m in restitution, after convicting him of over 2,500 ransomware attacks demanding over $700m in payments under the REvil/Sodinokibi crime spree.

Vasinskyi, who used the handle Rabotnik online, had previously pled guilty in a Texas court to 11 indictments of conspiracy to commit fraud and related activity in connection with computers, damage to protected computers, and conspiracy to commit money laundering. He was arrested in late 2021 after he tried to cross from Ukraine into Poland, and extradited to the US.

“As this sentencing shows, the Justice Department is working with our international partners and using all tools at our disposal to identify cyber criminals, capture their illicit profits, and hold them accountable for their crimes,” said US attorney general Merrick Garland.

“Deploying the REvil ransomware variant, the defendant reached out across the globe to demand hundreds of millions of dollars from US victims,” added deputy attorney general Lisa Monaco. “But this case shows the Justice Department’s reach is also global – working with our international partners, we are bringing to justice those who target US victims, and we are disrupting the broader cyber crime ecosystem.”

The REvil syndicate was behind a string of high-profile cyber attacks and dominated the ransomware ecosystem for a time in 2020 and 2021.

It first came to widespread attention in the UK after it knocked over the systems of foreign exchange provider Travelex in January 2020.

Other victims included American foodservice firm JBS, one of the world’s largest beef suppliers; tech firm and Apple supplier Quanta Computer, via which it attacked Apple itself; and a New York City law firm with clients including former president Donald Trump and singer Lady Gaga.

Most famously, REvil was behind the 4 July 2021 hit on Kaseya. In the aftermath of the Kaseya heist, REvil claimed it had infected a million computer systems – Kaseya found 50 managed service provider (MSP) customers and about 1,500 of the customers of those MSPS were affected, and demanded a $70m bitcoin ransom to provide a universal decryptor.

Such was the scale of the attack that it prompted the multinational law enforcement action that ultimately brought Vasinskyi to justice.

REvil was among the pioneers of the double extortion technique that emerged around the turn of the decade, in which victims not only find their data has been encrypted, but also stolen and effectively held hostage.

This now standard technique is purposely designed to pile additional pressure on crisis-stricken organisations, extract more money from them to avoid embarrassment, and in some cases to attract the attention of regulators. REvil itself frequently used its dark web site – known somewhat incongruously as the Happy Blog – to name and shame its victims.

The prolific gang was finally disrupted and laid low by the Russian authorities in early 2022. The action took place in a brief window of time prior to the invasion of Ukraine when it seemed like Moscow might willingly collaborate with Western agencies on the ransomware threat.

Read more on Hackers and cybercrime prevention


  • 20 companies affected by major ransomware attacks in 2021

    By: Arielle Waldman


  • Cyber pros: Don’t revel in REvil’s downfall just yet

    By: Alex Scroxton


  • Is ransomware as a service going out of style?

  • US seeks to extradite REvil affiliate who attacked Kaseya

    By: Alex Scroxton

Read More

Written by: ThorTech

Rate it

Previous post

Post comments (0)

Leave a reply

Your email address will not be published. Required fields are marked *


 


LOGO

 

  • info@thorsolution.com


Products


Company


Contacts

Support