State hackers breach defense, energy, healthcare orgs worldwide
MediaMarkt hit by Hive ransomware, initial $240 million ransom
REvil ransomware affiliates arrested in Romania and Kuwait
Pwn2Own: Printer plays AC/DC, Samsung Galaxy S21 hacked twice
U.S. offers $10 million reward for leaders of REvil ransomware
Robinhood discloses data breach impacting 7 million customers
Softbank plans to charge electronic gadgets using 5G antennas
US sanctions Chatex cryptoexchange used by ransomware gangs
Qualys BrowserCheck
Junkware Removal Tool
How to remove the PBlock+ adware browser extension
Remove the Search Redirect
Remove the Search Redirect
Remove the Search Redirect
Remove Security Tool and SecurityTool (Uninstall Guide)
How to remove Antivirus 2009 (Uninstall Instructions)
How to Remove WinFixer / Virtumonde / Msevents / Trojan.vundo
How to remove Google Redirects or the TDSS, TDL3, or Alureon rootkit using TDSSKiller
Locky Ransomware Information, Help Guide, and FAQ
CryptoLocker Ransomware Information Guide and FAQ
CryptorBit and HowDecrypt Information Guide and FAQ
CryptoDefense and How_Decrypt Ransomware Information Guide and FAQ
How to make the Start menu full screen in Windows 10
How to install the Microsoft Visual C++ 2015 Runtime
How to open an elevated PowerShell Admin prompt in Windows 10
How to Translate a Web Page in Google Chrome
How to start Windows in Safe Mode
How to remove a Trojan, Virus, Worm, or other Malware
How to show hidden files in Windows 7
How to see hidden files in Windows
IT Certification Courses
Gear + Gadgets
Department of State reward
The U.S. is offering up to $10 million for identifying or locating leaders in the REvil (Sodinokibi) ransomware operation, including $5 million leading to the arrest of affiliates.
This bounty is being offered as part of the Department of State’s Transnational Organized Crime Rewards Program (TOCRP), which rewards informants for information that leads to the arrest or conviction of individuals in transnational organized crime groups.
Like the reward offered for information on DarkSide ransomware members, the amount rewarded for information depends on the person’s role in the REvil/Sodinokibi operation.
The Department of State is offering a reward of up to $10,000,000 for information leading to the identification or location of any individual holding a key leadership position in the Sodinokibi ransomware variant transnational organized crime group,” the Department of State announced today.
“In addition, the Department is offering a reward offer of up to $5,000,000 for information leading to the arrest and/or conviction in any country of any individual conspiring to participate in or attempting to participate in a Sodinokibi variant ransomware incident.
The REvil ransomware gang is responsible for numerous high-profile attacks against KaseyaJBSCoopTravelexGSMLawKenneth Cole, and Grupo Fleury.
When ransomware gangs attempt to evade law enforcement, they commonly rebrand under a new name. For example, the GandCrab operation rebranded as REvil in 2019 after they began receiving too much attention from the media and law enforcement.
Similarly, other ransomware operations have also rebranded in the past, including:
As the Department of Statement announcement states, “Sodinokibi variant ransomware,” this reward will also apply to new ransomware operations created by the REvil gang in the future.
Today was also filled with numerous announcements regarding the arrest and indictments of multiple REvil gang members. These arrests included an REvil hacker linked to the Kaseya ransomware attack and the seizure of $6 million in cryptocurrency obtained through REvil ransom demands.
To further disrupt the financial operations of ransomware groups, the U.S. also announced sanctions against the Chatex cryptocurrency exchange for assisting ransomware gangs in laundering and cashing out ransom payments.
REvil ransomware affiliates arrested in Romania and Kuwait
US targets DarkSide ransomware and its rebrands with $10 million reward
Free REvil ransomware master decrypter released for past victims
US Congress asks FBI to explain delay in helping Kaseya attack victims
REvil ransomware is back in full attack mode and leaking data
Not a member yet? Register Now
Microsoft: New Windows driver deployment service coming soon
MediaMarkt hit by Hive ransomware, initial $240 million ransom
To receive periodic updates and news from BleepingComputer, please use the form below.
Terms of Use Privacy PolicyEthics Statement
Copyright @ 2003 – 2021 Bleeping Computer® LLC – All Rights Reserved
Not a member yet? Register Now
Read our posting guidelinese to learn what content is prohibited.


You May Also Like

This image looks very different on Apple devices — see for yourself

TellYouThePass ransomware revived in Linux, Windows Log4j attacksCredit card info of 1.8…

Six million Sky routers exposed to takeover attacks for 17 months

US regulators order banks to report cyberattacks within 36 hoursHackers deploy Linux…

Winamp prepares a relaunch, new beta version almost ready

US regulators order banks to report cyberattacks within 36 hoursHackers deploy Linux…

Microsoft Edge for Linux out of beta, now generally available

FBI: Ransomware targets companies during mergers and acquisitionsAndroid November patch fixes actively…