A Kaseya redemption of redemption, which took place in July and affected nearly 1,500 companies worldwide, was a major, destructive disorder – the largest and most obscure in recent memory. But new information suggests that the FBI could have reduced the number of victims but did not.
A new report from the Washington Post shows that, shortly after the assassination, the FBI had a secret secret that could unlock the identities of victims — and allow them to restore their businesses. However, instead of sharing or Kaseya, an IT company under threat, the office kept it a secret for three weeks.
Experiments are reported he did so because he was planning to “disrupt” the terrorists who instigated the conspiracy – the Russian funders Evil-And they did not want to give up. However, before the FBI launched its schemes, the terrorist group disappeared strangely. The office shared with Kaseya on July 21 – just one week after the group disappeared.
A confidential secret, which is sent to the victim after the victim’s payment has been made, does not invalidate the contents hidden at the time of the ransom The attack and can help an infected company to heal. However, they it doesn’t always work well-That’s one of the reasons the authorities insist that victims he does not have to pay a ransom.
So, How did the FBI find out about REvil’s secret? The section is odd. The government seems to have taken it through the “access to the servers” of the redemptive group, although it is not known how they got the opportunity or why it was so easy to come soon to the destruction.
The council’s final result of the eviction was that it appeared to have secured an important tool that would have helped the organizations involved in the protest to avoid it. to compare “Millions of dollars in restitution.” These organizations consisted of schools, hospitals, and small business units.
What he was asked to do with the Washington Post chalk on this issue to the extent that it assesses the benefits that public entities should go through in pursuit of criminals.
“The questions we always ask are, what would the cost of the key be when it was revealed? How many are affected? Who can be helped? ” another source told the newspaper. “And on the record, what the cost could be in the long run work by disrupting the environment? These are questions that we will continue to have. “
When Tuesday came to comment via email, Kaseya’s spokesman told Gizmodo he was “grateful for the FBI’s help” and could not “respond to their decisions regarding when to release the key.”
The FBI has not yet responded to a request for comment.
Frankly, this raises more questions than it answers. For one thing, it means that the government had access to hacking servers and, as a result, a strong key, almost at the same time after the conspiracy. Although the Post article does not disclose the exact date on which the office had the key, we know that Kaseya first publicly disclosed that it had a key on July 22 – about three weeks after the destruction. Why the FBI could have quickly taken the key is a little strange.
That being said, this is not the first time that these files, in the search for the eagle, have found a very important piece of analysis, which seems to be a small thing. After the colonial revolt happened in May, the government similarly managed to place a key to the wreckage of the invading eagle – allowing them to repay a large ransom paid to the robbers. This work, which was taken over by the Department of Justice millions in crypto, it has not been fully disclosed to the public.
What we do know is that: The business owners who suffered as a result of the Kaseya attack did not really enjoy the restoration. Describing July as “the month of hell,” Joshua Justice, who owns a company owned by Maryland IT JustTech, told the Post that the timing of the demonstration had devastated his business.
“I was an old man crying to myself and on the phone to ask if their business would continue,” he said. “I had one father who said, ‘Should I retire? Should I let my employees go?'”