Acer, a technology corporation with headquarters in Taiwan, was reportedly the target of a Revil 50m Acercimpanu Therecord ransom attack in which the perpetrators wanted a $50 million ransom in return for a decryption key that would allow access to Acer’s encrypted files.
After that, the attackers spread the ransomware throughout Acer’s network, encrypting a sizable amount of data, including confidential financial and other data. With the decryption key, the terrorists then wanted a $50 million ransom.
According to reports, Acer declined to pay the ransom and instead employed its internal security team and outside security specialists to look into the incident and decrypt the data. It’s unclear whether Acer was successful in recovering every bit of its data or whether any information was misplaced or taken during the attack.
As attackers try to use holes in their targets’ networks and systems to extort money from them, ransomware assaults have grown in importance as a danger to companies and organizations in recent years. To defend against such assaults, it is crucial for enterprises to have robust cybersecurity measures in place, such as regular software updates and backups.
Who did 50m Acercimpanu Therecord ransom attack
The organization REvil/Sodinokibi, renowned for using ransomware operations to extort money from victims, was suspected of carrying out the attack. Acer’s Microsoft Exchange Server purportedly had a vulnerability that allowed the attackers to access the company’s network; Microsoft addressed the issue early this year.
What was the Revil 50m ransomware demand on Acer
In March 2021, a ransomware attack targeted Acer. In exchange for a decryption key that would allow Acer to regain access to its encrypted files, the attackers wanted a $50 million ransom.
The REvil/Sodinokibi group launched the attack, using a security hole in Acer’s Microsoft Exchange Server to access the company’s network. Acer resorted to its own security team and outside consultants to conduct an investigation and decrypt the data after refusing to pay the ransom.
How much did Acer pay ransomware?
Acer did not pay the $50 million ransom requested by the hackers who launched the ransomware attack in March 2021, as far as is known to the general public. Acer instead used its own security team and other security professionals to look into the assault and decrypt its encrypted data. It is widely advised that victims of ransomware attacks avoid paying the ransom because doing so merely promotes more attacks and offers no assurance that the encrypted data will be returned safely.
Who is to blame for the ransomware attack?
It can be difficult to pinpoint the exact cause of a ransomware attack, and it often depends on a number of variables. The perpetrators of the incident and those who want the ransom are frequently the same people.
It’s vital to keep in mind, too, that in some instances the ransomware victims may have made the attackers’ target more vulnerable. This can involve doing things like failing to put in place robust enough security measures, not keeping software and systems up to date, or falling prey to phishing scams that give attackers access to their network.
In some circumstances, contractors or third-party providers may also share some of the culpability for the victim’s network or system vulnerabilities.