Jen Psaki, Press Secretary of the White House said that US will act on Russian hackers if the Russian government doesn’t take any action against those threat actors. The recent supply chain and ransomware attack on MSP’s isn’t attributed to anybody in particular now. However, in a week’s time both US and Russian officials will come together to take some stand against recent attacks on US organizations.
During the briefing on the Biden administration policy agenda, it was also stated that the White House has taken expert level talks, and is planning to organize another meeting focused on ransomware attacks. The President has also made it clear to Russian President Putin that the US will take action against the hackers if the Russian government isn’t doing anything about it. And it seems the hackers that caused the massive MSP attack last week is from Russia, and the cybersecurity community agrees to this mentioning REvil operates from Russia.
It is also to be remembered that G7 leaders also did request the same from Russia and end this non stop ransomware attacks that is affecting several verticals around the world. Also, on a recent update from Kaseya, the REvil ransomware has hit less than 60 managed service providers using their Kaseya VSA software. However, on the flip side, REvil claims to have encrypted 1,000,000 systems through this attack, and did demand $70 million as ransom and now reduced the same to $50 million for a decryptor.
The below is the official video of Fred Voccola, the CEO of Kaseya regarding the breach,
CISA and the FBI have shared some guidance for proactively securing the organization against such attacks in future. And, the National Security Council of the White House is requesting the victims to use Kaseya’s guidance to mitigate the situation.
Explore the top 5 best Microsoft Intune alternatives, comparing key features, user reviews, and capabilities…
Discover the top 7 smartphones of 2024 with best security features, offering privacy, performance, and…
Discover the top 11 log management tools for efficient system management and monitoring. Learn about…
Explore the top 5 threat intelligence tools, their features, and how they enhance cybersecurity against…
Explore the top 5 best PAM Tools, market trends, and expert insights to secure the…
Explore the top solutions for Apple Device Management including to iOS Device Management and macOS…