Similar to decryptor[.]cc and decryptor[.]top in previous #REvil/#Sodinokibi versions, decoder[.]re is used to grant the victims access to the threat actors WEB-site for further negotiations should their connection be limited via #TOR.
To access the page in WWW or TOR - the victim needs to provide a valid UID (e.g. "9343467A488841AC")
A unique private key is required to establish a chat with the threat actors.
decoder[.]re resolves to IP 82.146.34.4 (AS29182) belonging to Russian ISP / cloud hosting company.
Visual graph of the current #REvil ecosystem. The domain decoder[.]re and #ransomware page on it are still active. It's hard to believe such malicious activity has gone unnoticed by certain governments resulting in damage to thousands of enterprises globally. #ThreatIntel
08 Jul 2021 06:53:00 AM - The domain still points to the same IP address. Reports available via @Site24x7 and @HostTracker2.
08 Jul 2021 08:38:00 AM - both decoder[.]re and its TOR 'mirror' continues to serve victims. Using valid UIDs and keys collected from ransom notes dropped by #REvil samples available at @hatching_io Triage - both resources return identical content and have the same functionality.
• • •
Missing some Tweet in this thread? You can try to
force a refresh