{
	"id": "217a470c-ac94-41d1-a635-9b4fd4203ccf",
	"created_at": "2026-04-06T00:17:47.822256Z",
	"updated_at": "2026-04-10T13:12:42.790713Z",
	"deleted_at": null,
	"sha1_hash": "7dac9d0e89749a045abc674bb459b722192a31c0",
	"title": "REvil gang tries to extort Apple, threatens to sell stolen blueprints",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 1130786,
	"plain_text": "REvil gang tries to extort Apple, threatens to sell stolen blueprints\r\nBy Sergiu Gatlan\r\nPublished: 2021-04-20 · Archived: 2026-04-05 13:05:58 UTC\r\nThe REvil ransomware gang asked Apple to \"buy back\" stolen product blueprints to avoid having them leaked on REvil's\r\nleak site before today's Apple Spring Loaded event.\r\nThe ransomware gang wants Apple to pay a ransom by May 1st to prevent its stolen data from being leaked and added that\r\nthey are also \"negotiating the sale of large quantities of confidential drawings and gigabytes of personal data with several\r\nmajor brands.\"\r\nREvil tried to extort Apple only after Quanta Computer, a leading notebook manufacturer and one of Apple's business\r\npartners, refused to communicate with the ransomware gang or pay the ransom demanded after they allegedly stole \"a lot of\r\nconfidential data\" from Quanta's network.\r\nhttps://www.bleepingcomputer.com/news/security/revil-gang-tries-to-extort-apple-threatens-to-sell-stolen-blueprints/\r\nPage 1 of 5\n\n0:00\r\nhttps://www.bleepingcomputer.com/news/security/revil-gang-tries-to-extort-apple-threatens-to-sell-stolen-blueprints/\r\nPage 2 of 5\n\nVisit Advertiser websiteGO TO PAGE\r\nQuanta is a Taiwan-based original design manufacturer (ODM) and an Apple Watch, Apple Macbook Air, and Apple\r\nMacbook Pro maker. \r\nQuanta has a long list of high-profile customers, including Apple, Dell, Hewlett-Packard, Alienware, Lenovo, Cisco, and\r\nMicrosoft.\r\nBased on the number of ODM laptop units sold, Quanta is the world's second-largest original design manufacturer of\r\nlaptops, only behind Compal who was also targeted by ransomware last year. \r\nAccording to the Tor payment page shared with BleepingComputer, Quanta has to pay $50 million until April 27th, or $100\r\nmillion after the countdown ends.\r\nQuanta ransom demand\r\nSo far, REvil leaked over a dozen schematics and diagrams of MacBook components on its dark web leak site, although\r\nthere is no indication that any of them are new Apple products.\r\nIn a negotiation chat on REvil's payment site seen by BleepingComputer, REvil warned that \"drawings of all Apple devices\r\nand all personal data of employees and customers will be published with subsequent sale\" if Quanta did not begin\r\nnegotiating a ransom.\r\nAfter that time frame expired, REvil published the schematics on their data leak site.\r\nQuanta payment page chat\r\nhttps://www.bleepingcomputer.com/news/security/revil-gang-tries-to-extort-apple-threatens-to-sell-stolen-blueprints/\r\nPage 3 of 5\n\nREvil is a ransomware-as-a-service (RaaS) operation known for recruiting affiliates to breach corporate networks, steal\r\nunencrypted data, and encrypt devices.\r\nOnce a ransom payment is made, the REvil core developers and the affiliates split the payment, with the affiliates generally\r\ngetting the larger share.\r\nREvil has been on a hacking spree over the last month, demanding extremely high ransom demands in attacks targeting Acer\r\n($50 million), Pierre Fabre ($25 million), and Asteelflash ($24 million). \r\nCybersecurity researchers have told BleepingComputer that they believe REvil has been making extremely high demands to\r\nstart at a higher negotiation price.\r\n\"Quanta Computer’s information security team has worked with external IT experts in response to cyber attacks on a small\r\nnumber of Quanta servers,\" a Quanta spokesperson told BleepingComputer.\r\n\"We’ve reported to and kept seamless communications with the relevant law enforcement and data protection authorities\r\nconcerning recent abnormal activities observed. There’s no material impact on the Company’s business operation.\r\n\"The information security defense mechanism was activated in no time while conducting a detailed investigation to ensure\r\ncontainment and recovery of data are in process and a small range of services impacted by the attacks were brought back to\r\nnormal.\r\n\"Consequently, we upgraded the level of cybersecurity by reviewing and enhancing current infrastructure for information\r\nsecurity and protection.\"\r\nAn Apple spokesperson was not available for comment when contacted by BleepingComputer earlier today.\r\nUpdate: Added statement from Quanta.\r\nAutomated Pentesting Covers Only 1 of 6 Surfaces.\r\nAutomated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the\r\nother.\r\nhttps://www.bleepingcomputer.com/news/security/revil-gang-tries-to-extort-apple-threatens-to-sell-stolen-blueprints/\r\nPage 4 of 5\n\nThis whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic\r\nquestions for any tool evaluation.\r\nSource: https://www.bleepingcomputer.com/news/security/revil-gang-tries-to-extort-apple-threatens-to-sell-stolen-blueprints/\r\nhttps://www.bleepingcomputer.com/news/security/revil-gang-tries-to-extort-apple-threatens-to-sell-stolen-blueprints/\r\nPage 5 of 5",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"ETDA",
		"Malpedia"
	],
	"origins": [
		"web"
	],
	"references": [
		"https://www.bleepingcomputer.com/news/security/revil-gang-tries-to-extort-apple-threatens-to-sell-stolen-blueprints/"
	],
	"report_names": [
		"revil-gang-tries-to-extort-apple-threatens-to-sell-stolen-blueprints"
	],
	"threat_actors": [],
	"ts_created_at": 1775434667,
	"ts_updated_at": 1775826762,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/7dac9d0e89749a045abc674bb459b722192a31c0.pdf",
		"text": "https://archive.orkl.eu/7dac9d0e89749a045abc674bb459b722192a31c0.txt",
		"img": "https://archive.orkl.eu/7dac9d0e89749a045abc674bb459b722192a31c0.jpg"
	}
}