Ransomware
REvil Ransomware Attack on Acer: $50M Demand via ProxyLogon
Primary Source βIncident Details
On March 14, 2021, REvil ransomware operators attacked Acer, the Taiwanese PC manufacturer, using the freshly-disclosed ProxyLogon Exchange vulnerability (CVE-2021-26855, disclosed March 2, 2021) as the initial access vector β less than two weeks after the vulnerability became public. REvil demanded $50 million in Monero cryptocurrency β the largest ransomware demand publicly recorded at the time. The group posted images of allegedly stolen financial spreadsheets, bank balances, and bank communications as proof of data exfiltration. They threatened to double the ransom to $100 million if not paid within their deadline. Acer acknowledged a ‘security incident’ but did not confirm paying a ransom. The attack demonstrated the extremely short window between vulnerability disclosure and weaponization by ransomware operators β and the particular danger of internet-facing Exchange servers during the ProxyLogon exploitation wave.
Technical Details
- Initial Attack Vector
- REvil gained initial access to Acer's network via the ProxyLogon Microsoft Exchange Server vulnerability (CVE-2021-26855) β exploiting the critical zero-day mere days after public disclosure
- Vendor / Product
- Microsoft Exchange Server
- Malware Family
- REvil (Sodinokibi) ransomware
- CVE / GHSA References
- CVE-2021-26855
Timeline
- 2021-03-14 Breach occurred
- 2021-03-19 Publicly disclosed
- 2021-03-19 Customers notified