Show an ad over header. AMP

I am the FIRST!!!

Kaseya hackers demand $70 million in massive ransomware attack

Russian hackers suspected in this weekend's mass attack on software company Kaseya, which could affect thousands of companies worldwide, demanded $70 million to restore data they are holding for ransom, Reuters reports.

Why it matters: The hack is the latest and most dramatic in a series of high-profile ransomware attacks this year, exposing the pandemic-style threat that this type of cybercrime poses to companies and governments around the world.


Details: Hundreds of companies were directly hit by the supply-chain attack on Kesaya's VSA software, which provides IT services to small and medium-sized businesses, according to CNET. At least 36,000 companies were indirectly impacted.

  • The Coop, one of Sweden's largest grocery chains, had to close 800 of its stores, according to the New York Times.
  • Kaseya said in a Sunday night update that its executive committee will meet Monday morning "with a goal of starting the restoration process to bring our datacenters online by end of day on July 5," though it cautioned that this timeline could change.

What they're saying: "This is without a doubt going to turn out to be the biggest most destructive ransomware campaign that we’ve seen so far," tweeted Dmitri Alperovitch, co-founder of cybersecurity firm Crowdstrike.

  • "Huge number of victims all over the world. Entire networks encrypted. No way to decrypt today without paying millions per network of any significant size."

The latest: The $70 million ransomware demand was posted to a dark-web blog typically used by REvil, the Russia-linked cybercrime gang behind the attack that crippled the U.S. operations of meat processor JBS.

  • The White House said in a statement Sunday that President Biden has "directed the full resources of the government to investigate this incident," and urged businesses to adopt recommendations released last month to shore up their cyber defenses.
  • The FBI asked businesses to report whether their systems have been compromised, but cautioned that it may not be able to respond to each victim individually "[d]ue to the potential scale of this incident."

Our thought bubble: Coming just two weeks after President Biden's personal warning to Vladimir Putin during the Geneva summit, the attack looks like the Russians thumbing their nose at the tough talk.

  • "The initial thinking was it was not the Russian government but we're not sure yet," Biden told reporters on Saturday. "If it is either with the knowledge of and/or a consequence of Russia then I told Putin we will respond."

Go deeper: The ransomware pandemic

regular 4 post ff

infinite scroll 4 pff

Gen Z is eroding the power of misinformation

Gen Z may be more immune to the lure of misinformation because younger people apply more context, nuance and skepticism to their online information consumption, experts and new polling suggests.

Why it matters: An innate understanding of social media influence, virality and algorithms among Gen Z — defined by Pew as the cohort born between 1997 and 2012 — could disarm the misinformation and disinformation racking the U.S.

Keep reading...Show less

Coronavirus cases tick up in 19 states, hold steady nationwide

Data: CSSE Johns Hopkins University; Map: Andrew Witherspoon/Axios

New coronavirus infections rose over the past week in 19 states while holding steady nationwide.

The big picture: The U.S. is in a race to vaccinate as many Americans as possible before variants of COVID-19, fueled by quick reopening, can cause a new wave of rising caseloads.

Keep reading...Show less

The cicadas are foreshadowing our future with more — and more dangerous — insect swarms

Trillionsof Brood X cicadas are now emerging throughout parts of the mid-Atlantic and Midwestern U.S.

Why it matters: Most immediately, because they can be as loud as a Metallica show when they're singing in concert.

Keep reading...Show less

Insights

mail-copy

Get Goodhumans in your inbox

Most Read

More Stories
<!ENTITY lol2 “&lol;&lol;&lol;&lol;&lol;&lol;&lol;&lol;&lol;&lol;“> <!ENTITY lol3 “&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;&lol2;“> <!ENTITY lol4 “&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;&lol3;“> ]> &lol4;