REvil spokesman boasts that hackers have access to ballistic missile launch systems

hackers have access to missile

A Revil representative under the pseudonym Unknown, claims that the hackers, partners in the use of malware, have access to ballistic missile launch systems.

Cybercriminal group REvil operates on the RaaS ransomware-as-a-service business model, in which attackers offer malware to partners who use it to block devices and encrypt organizations’ data.

A REvil spokesperson under the pseudonym Unknown explained, why ransomware can be a devastating weapon in cyber warfare.

Ransomware can be a very destructive weapon in cyber warfare. At least a few partners have access to the ballistic missile launch system, one to the cruiser systems of the US Navy, the other to the devices of the nuclear power plant, and one to the systems of the weapons factory. They can quite realistically start a war, but it’s not worth it – the consequences are unprofitable.The Record quoted Unknown’s saying.

According to Unknown, the cybercriminal group is trying to maintain political neutrality.

Ransomware operators avoid attacks on organizations in the CIS countries, including Georgia and Ukraine, mainly because of geopolitics, local legislation, or patriotism of some members of the group. As Unknown noted, very poor countries do not pay the ransom, including India, Pakistan, Afghanistan, etc.

The hacker also said that cyber insurance companies are among the most attractive targets. The group first attacks similar organizations to gain access to their customer base, and then deliberately organizes malicious campaigns against other businesses.

REvil operators do not often resort to DDoS attacks, as calls to victims, their partners and journalists have very good results, increasing the pressure. Publishing the stolen data is usually guaranteed to force the victim to pay the ransom.

But ending negotiations with a DDoS attack means destroying the company. Literally. I also think we will expand this tactic to targeting the CEO and/or founder of the company. Collection and analysis of information from publicly available sources, bullying. I think this will also be a very interesting option. However, the victims must understand that all the resources we spent before the ransom was paid will be included in the ransom cost.Unknown said.

Let me remind you that the expert told how he hacked into a nuclear power plant.

By Vladimir Krasnogolovy

Vladimir is a technical specialist who loves giving qualified advices and tips on GridinSoft's products. He's available 24/7 to assist you in any question regarding internet security.

Leave a comment

Your email address will not be published. Required fields are marked *