REvil Happy Blog Ransomware Victim: KASEYA ATTACK INFO
NOTE: The information on this page is automated and scraped directly from the Revil Happy Blog page and reposted here for awareness.
Victim Name | KASEYA ATTACK INFO |
Victim Images (if available) | |
Victim Post Content | On Friday (02.07.2021) we launched an attack on MSP providers. More than a million systems were infected. If anyone wants to negotiate about universal decryptor – our price is 70 000 000$ in BTC and we will publish publicly decryptor that decrypts files of all victims, so everyone will be able to recover from attack in less than an hour. If you are interested in such deal – contact us using victims “readme” file instructions. |
Victim Blog Post Page | /posts/400 |
To get additional information, please visit the site located below:
(to defang, remove the [.] and replace with . Also change hXXp to http)
You can then copy and paste it into the browser to get updates regarding this victim of REvil
Revil Site Victim Post URL:
hXXp://dnpscnbaix6nkwvystl3yxglz7nteicqrou3t75tpcc5532cztc46qyd[.]onion