threatintel
actor tracker
All actors

REvil

revil · primary source: MITRE · first observed 2019 · last observed 2022
RU · RussiaRansomwareHigh confidencelast cited Jan 13, 2022 · 4y ago

Russian ransomware-as-a-service operation derived from GandCrab in April 2019. Conducted the 2021 Kaseya VSA supply-chain compromise (~1,500 downstream victims via 60 MSPs), the JBS Foods $11M ransom, and the Colonial Pipeline-era spike of double-extortion. The operation went dark in mid-July 2021 following intense U.S. pressure, briefly returned in September 2021, and was decisively disrupted on 14 January 2022 when Russia's FSB announced raids and arrests of 14 REvil members at the U.S. government's request — the first and last such cooperation.

Aliases

SodinokibiOtherPinchy SpiderCrowdStrikeGold SouthfieldOther

Motivations

financial gain

Target sectors

managed service providersmanufacturingprofessional services

Target countries

USGBDEBRITCA

Diamond Model

Caltagirone / Pendergast / Betz 2013 — four-vertex attribution framework.

Adversary
  • REvil
  • Russia
  • financial gain
Infrastructure
Victim
  • managed service providers
  • manufacturing
  • professional services
  • US
  • GB
  • +1 more

MITRE ATT&CK techniques

Tools & malware

1 entry

Timeline

2 events

Indicators of compromise

2 indicators
csv
TypeValueFirst seenSource
Name
Sodinokibi/REvil ransomware
family · REvil
Malware family DOJ identified by name in the November 8, 2021 unsealed indictment of Ukrainian national Yaroslav Vasinskyi as the payload deployed through the Kaseya VSA agent on July 2, 2021. Vasinskyi was sentenced May 1, 2024 to 13 years 7 months and $16M restitution.
Jul 1, 2021DOJ
Name
mpsvc.dll
family · REvil
Sodinokibi/REvil encryptor DLL side-loaded by a renamed MsMpEng.exe in the July 2, 2021 Kaseya VSA supply-chain compromise. Vasinskyi was indicted Nov. 8, 2021 by DOJ for deploying this code through Kaseya's auto-update channel to roughly 1,500 downstream customers.
Jul 1, 2021DOJ

Related actors

shared ATT&CK techniques

References

cite this page

Threat Intel Tracker. (2026-05-19). REvil — actor profile. Retrieved from https://threatintel.local/actors/revil

latest cited activity · 2022-01-14 · 2 cataloged indicators