Threat Watch

REvil Ransomware Shuts Down Again After Tor Sites Hijacked

REvil ransomware’s Tor site was hijacked over the weekend forcing the group to shut down their site yet again. A REvil affiliate posted on the XSS hacking forum that their domains had been hijacked. The threat actor said the operation would be shut down and any affiliates can contact them for decryption keys so they can continue to finish any current ransomware campaigns. Initially, the threat actor stated their servers had not been compromised, but later discovered they were and stated that someone is targeting the group. The group briefly shutdown earlier this year only to reappear in September. The group’s reputation had been severely damaged after its initial disappearance and being accused of scamming their own affiliates. This latest incident likely marks the end for the group known as REvil, although they will likely rebrand and return as a new group.


Organizations should initiate proactive measures to ensure they are protected from ransomware. The US DHS website,, has links to resources that help organizations protect their systems from intrusions that lead to ransomware. To protect against ransomware attacks, organizations should:
• Regularly back up data, air gap, and password protect backup copies offline.
• Ensure copies of critical data are not accessible for modification or deletion from the system where the data resides.
• Implement network segmentation.
• Implement a recovery plan to maintain and retain multiple copies of sensitive or proprietary data and servers in a physically separate, segmented, secure location (i.e., hard drive, storage device, the cloud).
• Install updates/patch operating systems, software, and firmware as soon as practical after they are released. Implement monitoring of security events on employee workstations and servers, with a 24/7 Security Operations Center to detect threats and respond quickly.
• Use multifactor authentication where possible.
• Use strong passwords and regularly change passwords to network systems and accounts, implementing the shortest acceptable timeframe for password changes.
• Avoid reusing passwords for multiple accounts.
• Focus on cyber security awareness and training.
• Regularly provide users with training on information security principles and techniques as well as overall emerging cybersecurity risks and vulnerabilities.