Sodinokibi

Threat Actor updated 2 months ago (2024-07-07T00:17:37.303Z)
Download STIX
Preview STIX
Sodinokibi, also known as REvil, is a significant threat actor first identified in April 2019. This ransomware family operates as a Ransomware-as-a-Service (RaaS) and has been responsible for one in three ransomware incidents responded to by IBM Security X-Force in 2020. The Sodinokibi ransomware strain was the most frequently observed by IBM Security X-Force in that year, capitalizing on blended ransomware and extortion attacks. Notably, at least 32% of Sodinokibi ransomware victims have had their data leaked by those operating this ransomware. The Sodinokibi ransomware has been delivered through various methods, including fileless techniques used by GootLoader. It has been linked with other significant threats such as SunCrypt ransomware, Kronos trojans, and Cobalt Strike. Notable instances of its deployment include an attack on Alameda County, California, where it was used to encrypt data, exfiltrate victim information, and extort a ransom payment. Throughout 2021, authorities arrested several individuals connected to the REvil and GandCrab RaaS operations, believed to be operated by the same group. Sodinokibi's influence extends to connections with other major ransomware groups. In early 2023, it was reported that the leader of LockBit had connections to the leader of REvil - Sodinokibi - as well as DarkSide, which hit Colonial Pipeline and later evolved into BlackMatter and Alphv, aka BlackCat. The group has drawn significant attention from U.S. authorities due to high-profile attacks, including a 2021 hack of IT management service Kaseya and multiple Texas towns in 2019. Over the last two years, the State Department has offered rewards up to $15 million for information leading to the location of members of the Sodinokibi (REvil), Conti, and DarkSide ransomware networks.
Description last updated: 2024-07-07T00:15:35.517Z
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at.
IDVotesProfile Description
REvil
10
REvil is a type of malware, specifically ransomware, that has been linked to significant cyber attacks. It emerged as part of the Ransomware as a Service (RaaS) model that gained popularity in 2020. This model established relationships between first-stage malware and subsequent ransomware attacks, s
Maze
3
Maze is a type of malware, specifically ransomware, that gained notoriety in 2019 for its double extortion tactic. This malicious software infects systems through suspicious downloads, emails, or websites and can steal personal information, disrupt operations, or hold data hostage for ransom. Maze w
Gandcrab
2
GandCrab, a threat actor, is known for its malicious activities involving ransomware attacks. Originating from Russian origins and evolving from Team Truniger, a former GandCrab affiliate, the group has been linked to numerous ransomware variants including Bad Rabbit, LockBit 2.0, STOP/DJVU, and REv
Sodin
2
Sodin, also known as Sodinokibi or REvil, is a sophisticated threat actor that emerged in the first half of 2019. This entity quickly drew attention due to its unique methods of distribution and attack. It exploited an Oracle Weblogic vulnerability to distribute itself and targeted Managed Service P
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Ransomware
Ransom
Encrypt
Exploit
RaaS
Malware
Cybercrime
Windows
Apt
Vulnerability
Extortion
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Malware
To see the evidence that has resulted in these malware associations, create a free account
IDTypeVotesProfile Description
ContiUnspecified
3
Conti is a notorious malware and ransomware operation that has caused significant damage to computer systems worldwide. The Conti group, believed to have around 200 employees, operated like a regular business, with internal communications revealing the organization's structure and operations. It was
RyukUnspecified
3
Ryuk is a type of malware known as ransomware, which has been utilized by the threat group ITG23 for several years. This group has been notorious for crypting their malware, with crypters seen in use with other malware such as Trickbot, Emotet, Cobalt Strike, and Ryuk. In 2019, most ransomware inves
LockbitUnspecified
3
LockBit is a malicious software, or malware, that has been notably active and damaging in the cyber world. Known for its ability to infiltrate systems often without detection, it can steal personal information, disrupt operations, and even hold data hostage for ransom. In the first half of 2024, Loc
NetwalkerUnspecified
2
NetWalker is a highly profitable ransomware kit, known for its ability to disable antivirus software on Windows 10 systems and encrypt files, adding a random extension to the encrypted ones. Once executed, it disrupts operations and can even hold data hostage for ransom. It has been observed that Ne
Associated Threat Actors
To see the evidence that has resulted in these threatActor associations, create a free account
IDTypeVotesProfile Description
DarkSideUnspecified
3
DarkSide is a threat actor known for its malicious activities, particularly in the realm of ransomware. This group was notably responsible for the major attack on the U.S. energy sector that targeted Colonial Pipeline Co. on May 7, 2021, using a ransomware-as-a-service operation. The DarkSide ransom
AlphvUnspecified
2
Alphv is a threat actor group known for its malicious activities in the cyber world. They have been particularly active in deploying ransomware attacks, with one of their most significant actions being the theft of 5TB of data from Morrison Community Hospital. This act not only disrupted hospital op
Source Document References
Information about the Sodinokibi Threat Actor was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
Securityaffairs
2 months ago
GootLoader is still active and efficient
Krebs on Security
4 months ago
U.S. Charges Russian Man as Boss of LockBit Ransomware Group
CERT-EU
10 months ago
Medical firm reaches $100,000 settlement with HHS over 2017 ransomware attack
BankInfoSecurity
6 months ago
Who is LockBitSupp? Police Delay Promise to Reveal Identity
CERT-EU
a year ago
What Is Double Extortion Ransomware?
CERT-EU
2 years ago
FBI Dismantles Hive Ransomware Network From the Inside, Thwarting Over $130m in Ransom Demands | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware - National Cyber Security
MITRE
2 years ago
Notorious Cybercrime Gang, FIN7, Lands Malware in Law Firm
BankInfoSecurity
6 months ago
No Big Reveal: Cops Don't Unmask LockBit's LockBitSupp
BankInfoSecurity
4 months ago
Breach Roundup: REvil Hacker Gets Nearly 14-Year Sentence
DARKReading
5 months ago
Cisco Warns of Massive Surge in Password Spraying Attacks on VPNs
CERT-EU
6 months ago
A brief look at hacker group takedowns | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting
CERT-EU
6 months ago
Russia Announces Arrest of Medibank Hacker Tied to REvil | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #hacker | National Cyber Security Consulting
BankInfoSecurity
6 months ago
Post-LockBit, How Will the Ransomware Ecosystem Evolve?
Flashpoint
7 months ago
COURT DOC: U.S. and U.K. Disrupt LockBit Ransomware Variant
BankInfoSecurity
7 months ago
Russia Announces Arrest of Medibank Hacker Tied to REvil
CERT-EU
7 months ago
U.S. And United Kingdom Disrupt Prolific 'Lockbit' Cybercrime Gang: DOJ | #cybercrime | #infosec | National Cyber Security Consulting
CERT-EU
7 months ago
U.S. and U.K. Disrupt LockBit Ransomware Variant – Dailyfly | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware | National Cyber Security Consulting
CERT-EU
7 months ago
Two people arrested after takedown of Lockbit
Krebs on Security
7 months ago
Feds Seize LockBit Ransomware Websites, Offer Decryption Tools, Troll Affiliates
CERT-EU
7 months ago
Feds Seize LockBit Ransomware Websites, Offer Decryption Tools, Troll Affiliates – GIXtools