{"id":1665,"date":"2021-04-21T16:32:44","date_gmt":"2021-04-21T11:02:44","guid":{"rendered":"https:\/\/xiarch.com\/blog\/?p=1665"},"modified":"2021-06-07T11:24:42","modified_gmt":"2021-06-07T05:54:42","slug":"revil-attackers-threatens-to-sell-stolen-blueprints-that-they-export-from-apple","status":"publish","type":"post","link":"https:\/\/xiarch.com\/blog\/revil-attackers-threatens-to-sell-stolen-blueprints-that-they-export-from-apple\/","title":{"rendered":"REvil Attackers Threatens to Sell Stolen Blueprints that they Export from Apple!"},"content":{"rendered":"\n<p><p style=\"text-align: justify\">Another cyber attack was perused by the Revil ransomware attacker gang that asked the organization to buy back the stolen products and the blueprints while avoiding them leaked on their website before the organization launched the Spring event.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">However, the ransomware gang force Apple to pay the ransom before 1st May to prevent the data leaked, and the attacker also said that they are also open to negotiating the sale of large quantity data and other confidential drawings with multiple other brands.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">Although, the attackers contact Apple because their business partner, a famous notebook manufacturer named Quanta Computer will be refused to deal with them. Quanta is a Taiwan-based organization that designed and manufacture Apple Watch, Apple Macbook, Apple Macbook Pro, Air, and ODM. The organization has a long list of multiple high-profile clients that include Dell, HP, Alienware, Microsoft, Cisco, Lenovo, and Apple.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">According to the number of units sold, Quanta Computer is the world&#8217;s second-largest organization that designed and manufacture laptops. Whereas, according to the experts the organization had to pay $50 million on 27th April and $100 after this whole countdown ends.<\/p><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"724\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/04\/revil-ransowmare-attack-on-apple-image-1-1024x724.png\" alt=\"Revil Attackers Threatens to Sell Stolen Blueprints that they Export from Apple!\" class=\"wp-image-1666\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/04\/revil-ransowmare-attack-on-apple-image-1-1024x724.png 1024w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/04\/revil-ransowmare-attack-on-apple-image-1-300x212.png 300w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/04\/revil-ransowmare-attack-on-apple-image-1-768x543.png 768w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/04\/revil-ransowmare-attack-on-apple-image-1.png 1098w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n\n<p><p style=\"text-align: justify\">Meanwhile, the attackers leaked multiple diagrams and blueprints of MacBook components on the Dark Web and there is no confirmation that these are linked to Apple&#8217;s new upcoming products.<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">While negotiating with Revils, they warned that all the blueprints of all the Apple devices are all the confidential data of employees and customers will be leaked on the web and available for sale if the organization did not negotiate and pay the ransom. They also published the schematics on the site where data is leaked.<\/p><\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"691\" height=\"245\" src=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/04\/revil-ransowmare-attack-on-apple-image-2.png\" alt=\"Revil Attackers Threatens to Sell Stolen Blueprints that they Export from Apple!\" class=\"wp-image-1667\" srcset=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/04\/revil-ransowmare-attack-on-apple-image-2.png 691w, https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/04\/revil-ransowmare-attack-on-apple-image-2-300x106.png 300w\" sizes=\"(max-width: 691px) 100vw, 691px\" \/><\/figure><\/div>\n\n\n\n<p><p style=\"text-align: justify\">Since the Revil ransomware-as-a-service (RaaS) operation will also be known for recruiting the affiliates&#8217; data breaches, hijacking unencrypted data, corporate networks, and encrypt devices.<\/p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Summering Up<\/strong><\/h2>\n\n\n\n<p><p style=\"text-align: justify\">Once the ransom is paid that Revil core developers and other affiliates will transfer the payments and the affiliates generally hold the large share. The Revil has also identified while hacking the high-profile organizations that also deal with Acer ($ million), Asteelflash($ million), and Pierre Fabre ($25 million).<\/p><\/p>\n\n\n\n<p><p style=\"text-align: justify\">The other security researchers also said that Revil has now targeting high-profile clients and creating high demands while negotiating the price. The Apple or Quanta spokesperson is still not available for any type of comment on this attack.<\/p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Another cyber attack was perused by the Revil ransomware attacker gang that asked the organization to buy back the stolen products and the blueprints while avoiding them leaked on their website before the organization launched the Spring event. However, the ransomware gang force Apple to pay the ransom before 1st May to prevent the data [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":1668,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[5],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.11 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>REvil Attackers Threatens to Sell Stolen Blueprints that they Export from Apple! - Xiarch Solutions Private Limited<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xiarch.com\/blog\/revil-attackers-threatens-to-sell-stolen-blueprints-that-they-export-from-apple\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"REvil Attackers Threatens to Sell Stolen Blueprints that they Export from Apple! - Xiarch Solutions Private Limited\" \/>\n<meta property=\"og:description\" content=\"Another cyber attack was perused by the Revil ransomware attacker gang that asked the organization to buy back the stolen products and the blueprints while avoiding them leaked on their website before the organization launched the Spring event. However, the ransomware gang force Apple to pay the ransom before 1st May to prevent the data [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xiarch.com\/blog\/revil-attackers-threatens-to-sell-stolen-blueprints-that-they-export-from-apple\/\" \/>\n<meta property=\"og:site_name\" content=\"Xiarch Solutions Private Limited\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/xiarch\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-21T11:02:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-06-07T05:54:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/04\/revil-ransowmare-attack-on-apple-featured-image-11.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"525\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Xiarch Security\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xiarch\" \/>\n<meta name=\"twitter:site\" content=\"@xiarch\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xiarch Security\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/xiarch.com\/blog\/revil-attackers-threatens-to-sell-stolen-blueprints-that-they-export-from-apple\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/revil-attackers-threatens-to-sell-stolen-blueprints-that-they-export-from-apple\/\"},\"author\":{\"name\":\"Xiarch Security\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\"},\"headline\":\"REvil Attackers Threatens to Sell Stolen Blueprints that they Export from Apple!\",\"datePublished\":\"2021-04-21T11:02:44+00:00\",\"dateModified\":\"2021-06-07T05:54:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/xiarch.com\/blog\/revil-attackers-threatens-to-sell-stolen-blueprints-that-they-export-from-apple\/\"},\"wordCount\":390,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"articleSection\":[\"Breaches\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/xiarch.com\/blog\/revil-attackers-threatens-to-sell-stolen-blueprints-that-they-export-from-apple\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/xiarch.com\/blog\/revil-attackers-threatens-to-sell-stolen-blueprints-that-they-export-from-apple\/\",\"url\":\"https:\/\/xiarch.com\/blog\/revil-attackers-threatens-to-sell-stolen-blueprints-that-they-export-from-apple\/\",\"name\":\"REvil Attackers Threatens to Sell Stolen Blueprints that they Export from Apple! - Xiarch Solutions Private Limited\",\"isPartOf\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#website\"},\"datePublished\":\"2021-04-21T11:02:44+00:00\",\"dateModified\":\"2021-06-07T05:54:42+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/xiarch.com\/blog\/revil-attackers-threatens-to-sell-stolen-blueprints-that-they-export-from-apple\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/xiarch.com\/blog\/revil-attackers-threatens-to-sell-stolen-blueprints-that-they-export-from-apple\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/xiarch.com\/blog\/revil-attackers-threatens-to-sell-stolen-blueprints-that-they-export-from-apple\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/xiarch.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"REvil Attackers Threatens to Sell Stolen Blueprints that they Export from Apple!\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/xiarch.com\/blog\/#website\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"name\":\"Xiarch Solutions Private Limited\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/xiarch.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/xiarch.com\/blog\/#organization\",\"name\":\"Xiarch\",\"url\":\"https:\/\/xiarch.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"contentUrl\":\"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png\",\"width\":300,\"height\":300,\"caption\":\"Xiarch\"},\"image\":{\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/xiarch\/\",\"https:\/\/twitter.com\/xiarch\",\"https:\/\/www.linkedin.com\/company\/xiarch\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c\",\"name\":\"Xiarch Security\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g\",\"caption\":\"Xiarch Security\"},\"sameAs\":[\"https:\/\/xiarch.com\/blog\/\"],\"url\":\"https:\/\/xiarch.com\/blog\/author\/vector\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"REvil Attackers Threatens to Sell Stolen Blueprints that they Export from Apple! - Xiarch Solutions Private Limited","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xiarch.com\/blog\/revil-attackers-threatens-to-sell-stolen-blueprints-that-they-export-from-apple\/","og_locale":"en_US","og_type":"article","og_title":"REvil Attackers Threatens to Sell Stolen Blueprints that they Export from Apple! - Xiarch Solutions Private Limited","og_description":"Another cyber attack was perused by the Revil ransomware attacker gang that asked the organization to buy back the stolen products and the blueprints while avoiding them leaked on their website before the organization launched the Spring event. However, the ransomware gang force Apple to pay the ransom before 1st May to prevent the data [&hellip;]","og_url":"https:\/\/xiarch.com\/blog\/revil-attackers-threatens-to-sell-stolen-blueprints-that-they-export-from-apple\/","og_site_name":"Xiarch Solutions Private Limited","article_publisher":"https:\/\/www.facebook.com\/xiarch\/","article_published_time":"2021-04-21T11:02:44+00:00","article_modified_time":"2021-06-07T05:54:42+00:00","og_image":[{"width":1000,"height":525,"url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/04\/revil-ransowmare-attack-on-apple-featured-image-11.png","type":"image\/png"}],"author":"Xiarch Security","twitter_card":"summary_large_image","twitter_creator":"@xiarch","twitter_site":"@xiarch","twitter_misc":{"Written by":"Xiarch Security","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xiarch.com\/blog\/revil-attackers-threatens-to-sell-stolen-blueprints-that-they-export-from-apple\/#article","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/revil-attackers-threatens-to-sell-stolen-blueprints-that-they-export-from-apple\/"},"author":{"name":"Xiarch Security","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c"},"headline":"REvil Attackers Threatens to Sell Stolen Blueprints that they Export from Apple!","datePublished":"2021-04-21T11:02:44+00:00","dateModified":"2021-06-07T05:54:42+00:00","mainEntityOfPage":{"@id":"https:\/\/xiarch.com\/blog\/revil-attackers-threatens-to-sell-stolen-blueprints-that-they-export-from-apple\/"},"wordCount":390,"commentCount":0,"publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"articleSection":["Breaches"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/xiarch.com\/blog\/revil-attackers-threatens-to-sell-stolen-blueprints-that-they-export-from-apple\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/xiarch.com\/blog\/revil-attackers-threatens-to-sell-stolen-blueprints-that-they-export-from-apple\/","url":"https:\/\/xiarch.com\/blog\/revil-attackers-threatens-to-sell-stolen-blueprints-that-they-export-from-apple\/","name":"REvil Attackers Threatens to Sell Stolen Blueprints that they Export from Apple! - Xiarch Solutions Private Limited","isPartOf":{"@id":"https:\/\/xiarch.com\/blog\/#website"},"datePublished":"2021-04-21T11:02:44+00:00","dateModified":"2021-06-07T05:54:42+00:00","breadcrumb":{"@id":"https:\/\/xiarch.com\/blog\/revil-attackers-threatens-to-sell-stolen-blueprints-that-they-export-from-apple\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xiarch.com\/blog\/revil-attackers-threatens-to-sell-stolen-blueprints-that-they-export-from-apple\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/xiarch.com\/blog\/revil-attackers-threatens-to-sell-stolen-blueprints-that-they-export-from-apple\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/xiarch.com\/blog\/"},{"@type":"ListItem","position":2,"name":"REvil Attackers Threatens to Sell Stolen Blueprints that they Export from Apple!"}]},{"@type":"WebSite","@id":"https:\/\/xiarch.com\/blog\/#website","url":"https:\/\/xiarch.com\/blog\/","name":"Xiarch Solutions Private Limited","description":"","publisher":{"@id":"https:\/\/xiarch.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xiarch.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/xiarch.com\/blog\/#organization","name":"Xiarch","url":"https:\/\/xiarch.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","contentUrl":"https:\/\/xiarch.com\/blog\/wp-content\/uploads\/2021\/06\/xi-logo-002.png","width":300,"height":300,"caption":"Xiarch"},"image":{"@id":"https:\/\/xiarch.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/xiarch\/","https:\/\/twitter.com\/xiarch","https:\/\/www.linkedin.com\/company\/xiarch"]},{"@type":"Person","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/655d814a04eacce56942270cfdc5c59c","name":"Xiarch Security","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/xiarch.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d33699ed91b76568586dc1ae278ea568?s=96&d=mm&r=g","caption":"Xiarch Security"},"sameAs":["https:\/\/xiarch.com\/blog\/"],"url":"https:\/\/xiarch.com\/blog\/author\/vector\/"}]}},"_links":{"self":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/1665"}],"collection":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/comments?post=1665"}],"version-history":[{"count":1,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/1665\/revisions"}],"predecessor-version":[{"id":1669,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/posts\/1665\/revisions\/1669"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media\/1668"}],"wp:attachment":[{"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/media?parent=1665"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/categories?post=1665"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xiarch.com\/blog\/wp-json\/wp\/v2\/tags?post=1665"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}