Ransomware

REvil Ransomware Attack on Acer: $50M Demand via ProxyLogon

πŸ“… 2021-03-14 🏒 Microsoft Exchange Server 🦠 REvil (Sodinokibi) ransomware πŸ”Ž CVE-2021-26855
Primary Source β†—

Incident Details

On March 14, 2021, REvil ransomware operators attacked Acer, the Taiwanese PC manufacturer, using the freshly-disclosed ProxyLogon Exchange vulnerability (CVE-2021-26855, disclosed March 2, 2021) as the initial access vector β€” less than two weeks after the vulnerability became public. REvil demanded $50 million in Monero cryptocurrency β€” the largest ransomware demand publicly recorded at the time. The group posted images of allegedly stolen financial spreadsheets, bank balances, and bank communications as proof of data exfiltration. They threatened to double the ransom to $100 million if not paid within their deadline. Acer acknowledged a ‘security incident’ but did not confirm paying a ransom. The attack demonstrated the extremely short window between vulnerability disclosure and weaponization by ransomware operators β€” and the particular danger of internet-facing Exchange servers during the ProxyLogon exploitation wave.

Technical Details

Initial Attack Vector
REvil gained initial access to Acer's network via the ProxyLogon Microsoft Exchange Server vulnerability (CVE-2021-26855) β€” exploiting the critical zero-day mere days after public disclosure
Vendor / Product
Microsoft Exchange Server
Malware Family
REvil (Sodinokibi) ransomware
CVE / GHSA References
CVE-2021-26855

Timeline

  1. 2021-03-14 Breach occurred
  2. 2021-03-19 Publicly disclosed
  3. 2021-03-19 Customers notified