Kaseya forces customers to sign the NDA to get the Ransomware Decryptor


Image for an article titled Kaseya forces its customers to sign non-disclosure agreements to get a Ransomware decryption key

Photo: Jack Guez / AFP (Getty Images)

Kaseya demands the customers he affects massive REvil ransomware attack to sign non-disclosure agreements to obtain a decryption key, a move that could inform the incident of further mystery. While the key to deciphering will undoubtedly bring relief to some victims, others state it will have minimal impact.

New CNN report released on Friday, it revealed no-disclosure agreements, citing several cybersecurity experts working with victims of the attack. The sales house notes that these agreements are not uncommon in the cybersecurity industry, but that they could make it difficult to understand how the attack occurred. The discovery is the latest step in Kasey’s step narrow lips response since it announced that it had received a “universal decoder” from a “reliable third party” on Thursday.

It is still unknown where Kaseya got the decryptor from and whether it paid amazing A ransom of $ 70 million cybercrime gang REvil requested in exchange for providing a universal key for all approximately 1,500 victims worldwide in early July. To add another twist to the saga, a few days after he sought credit for the attack, the REvil gang disappeared from the internet.

The company declined to comment on whether it paid for the key in a statement to Gizmod on Friday. However, some experts say it is possible that the Russian government could have given Kasey the key after pressure from the Biden administration. Others argue that Kaseya could have paid REvil’s ransom early, after which the criminals went into hiding.

Cybersecurity experts who spoke to CNN pointed out that some of Kaseye’s clients were frustrated when the company announced it had acquired a universal decryptor because they had already spent time and resources trying to rebuild their systems on their own, albeit with mixed success. News of the decipherment arrived three weeks after the attack.

Andrew Kaiser, vice president of sales at Huntress Labs, told the store that the service provider affected by REvil’s attack spent thousands of hours trying to recover and would have made different decisions if they had known Kaseya was working to procure the decryptor.

“I spoke to a service provider yesterday,” Kaiser told CNN, “who said,“ Hey, listen, we’re a company of 10 to 20 people. We spent over 2,500 working hours renovating this through our business. If we had known that there was the potential to get this decryptor a week or 10 days ago, we would have made completely different decisions. We have now descended to only 10 or 20 systems that could benefit from this. ”

Gizmodo contacted Kasey on Saturday to ask for comment on whether it requires customers to sign the NDA. We also asked Kasey if they had reacted to victims who expressed frustration with the news regarding the universal descriptor. In an email response, the company said it had no comment.

Source link


Please enter your comment!
Please enter your name here