{"id":46060,"date":"2021-04-01T02:59:00","date_gmt":"2021-04-01T06:59:00","guid":{"rendered":"http:\/\/blog.cybercon1.com\/?p=46060"},"modified":"2021-04-01T02:59:00","modified_gmt":"2021-04-01T06:59:00","slug":"acer-reportedly-suffered-a-revil-ransomware-attack-attracting-the-highest-ransom-demand-in","status":"publish","type":"post","link":"https:\/\/blog.cyberconservices.com\/index.php\/2021\/04\/01\/acer-reportedly-suffered-a-revil-ransomware-attack-attracting-the-highest-ransom-demand-in\/","title":{"rendered":"Acer Reportedly Suffered a REvil Ransomware Attack Attracting the Highest Ransom Demand in &#8230;"},"content":{"rendered":"\n<p>Acer suffered a REvil\u00a0<strong>ransomware<\/strong> attack\u00a0that attracted the highest\u00a0<strong>ransomware<\/strong> demand\u00a0in history. The threat actor behind the attack shared some of the pilfered files as proof of responsibility.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/cdn.pixabay.com\/photo\/2014\/11\/01\/22\/33\/gold-513062__340.jpg\" alt=\"\" width=\"654\" height=\"499\"\/><\/figure><\/div>\n\n\n\n<p>However, the Taiwanese electronic behemoth was reluctant to acknowledge a <strong>ransomware <\/strong>attack. Instead, the company cited \u201creported abnormal situations\u201d and claimed to be \u201cconstantly under attack.\u201d<\/p>\n\n\n\n<p>With a workforce of 7,000, annual revenue of $7.8 billion in 2019, and $3 billion in earnings in Q4 2020, Acer ranks among the most popular brands to fall victim to <strong>ransomware<\/strong> attacks.<\/p>\n\n\n\n<p>The <strong>ransomware<\/strong> gang that\u00a0breached Acer\u00a0demanded possibly the highest\u00a0ransom demand\u00a0of $50 million or XMR 214,151 (Monero), according to BleepingComputer. The previous record was a $30 million ransom payment demanded from Dairy Farm, also by the same ransomware group.  <a href=\"https:\/\/www.google.com\/url?rct=j&amp;sa=t&amp;url=https:\/\/www.cpomagazine.com\/cyber-security\/acer-reportedly-suffered-a-revil-ransomware-attack-attracting-the-highest-ransom-demand-in-history-of-50-million\/&amp;ct=ga&amp;cd=CAEYBioTOTQwNjQzNjU3NTEyMjQzMTc5MzIaZjk1ZDdkNTc3NTkyZGUyMTpjb206ZW46VVM&amp;usg=AFQjCNH5yejCvccV0ujW5e2hERBip38DOw\">Read On:<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Acer suffered a REvil\u00a0ransomware attack\u00a0that attracted the highest\u00a0ransomware demand\u00a0in history. The threat actor behind the attack shared some of the pilfered files as proof of responsibility. However, the Taiwanese electronic behemoth was reluctant to acknowledge a ransomware attack. Instead, the <span class=\"excerpt-dots\">&hellip;<\/span> <a class=\"more-link\" href=\"https:\/\/blog.cyberconservices.com\/index.php\/2021\/04\/01\/acer-reportedly-suffered-a-revil-ransomware-attack-attracting-the-highest-ransom-demand-in\/\"><span class=\"more-msg\">Continue reading &rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[636],"tags":[637],"class_list":["post-46060","post","type-post","status-publish","format-standard","hentry","category-ransomware","tag-ransomware"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack-related-posts":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/46060","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/comments?post=46060"}],"version-history":[{"count":0,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/posts\/46060\/revisions"}],"wp:attachment":[{"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/media?parent=46060"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/categories?post=46060"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.cyberconservices.com\/index.php\/wp-json\/wp\/v2\/tags?post=46060"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}