{
	"id": "5aaa68bb-37df-421f-a95f-d55dc6889632",
	"created_at": "2026-04-06T00:22:21.173693Z",
	"updated_at": "2026-04-10T03:21:36.085846Z",
	"deleted_at": null,
	"sha1_hash": "db4e9e167aab00cc606cdcf64960325fe032e24b",
	"title": "REvil ransomware hits Managed.com hosting provider, 500K ransom",
	"llm_title": "",
	"authors": "",
	"file_creation_date": "0001-01-01T00:00:00Z",
	"file_modification_date": "0001-01-01T00:00:00Z",
	"file_size": 3715613,
	"plain_text": "REvil ransomware hits Managed.com hosting provider, 500K ransom\r\nBy Lawrence Abrams\r\nPublished: 2020-11-18 · Archived: 2026-04-05 20:16:06 UTC\r\nManaged web hosting provider Managed.com has taken their servers and web hosting systems offline as they struggle to\r\nrecover from a weekend REvil ransomware attack.\r\nOn Monday morning, Managed.com announced that they had suffered an issue affecting the availability of their hosting\r\nservices and are investigating the matter.\r\nAs first reported by ZDNet, Managed.com disclosed on Tuesday that they were hit with a ransomware attack and, to protect\r\nthe \"integrity of our customer's data,\" they decided to take their entire system down, including clients' websites.\r\nhttps://www.bleepingcomputer.com/news/security/revil-ransomware-hits-managedcom-hosting-provider-500k-ransom/\r\nPage 1 of 4\n\n0:00\r\nhttps://www.bleepingcomputer.com/news/security/revil-ransomware-hits-managedcom-hosting-provider-500k-ransom/\r\nPage 2 of 4\n\nVisit Advertiser websiteGO TO PAGE\r\n\"November 17, 2020 – On Nov.16, the Managed.com environment was attacked by a coordinated ransomware campaign. To\r\nensure the integrity of our customers’ data, the limited number of impacted sites were immediately taken offline. Upon\r\nfurther investigation and out of an abundance of caution, we took down our entire system to ensure further customer sites\r\nwere not compromised. Our Technology and Information Security teams are working diligently to eliminate the threat and\r\nrestore our customers to full capacity. Our first priority is the safety and security of your data. We are working directly with\r\nlaw enforcement agencies to identify the entities involved in this attack. As more information is available, we will\r\ncommunicate directly with you,\" Managed.com stated in a status update.\r\nAt the time of this writing, websites for Managed.com hosting clients continue to be unavailable, leading to some clients\r\nswitching their web hosting to another provider.\r\nIf you have first-hand information about this or other unreported cyberattacks, you can confidentially contact us on Signal\r\nat +16469613731 or on Wire at @lawrenceabrams-bc.\r\nREvil demanding a $500 thousand ransom\r\nSince learning of the attack, multiple sources have told BleepingComputer that Managed.com was hit by the ransomware\r\noperation known as REvil.\r\nAccording to a screenshot shared with BleepingComputer, REvil is demanding a $500,000 ransom in Monero to receive a\r\ndecryptor. It is not known if the ransomware operation stole unencrypted files before encrypting devices.\r\nRansom amount for Managed.com\r\nREvil is a Ransomware-as-a-Service that began infecting victims in April 2019 and has since grown to become one of the\r\nlargest ransomware operations currently operating.\r\nIn a recent interview with the public-facing representative of REvil, the ransomware operation claims to earn over $100\r\nmillion a year in extortion payments.\r\nREvil has been responsible for large attacks in the past, including Travelex, Kenneth Cole, SeaChange, Brown-Forman, and\r\ncelebrity law firm Grubman Shire Meiselas \u0026 Sacks (GSMLaw).\r\nBleepingComputer has contacted Managed.com with questions related to the attack but has not heard back.\r\nhttps://www.bleepingcomputer.com/news/security/revil-ransomware-hits-managedcom-hosting-provider-500k-ransom/\r\nPage 3 of 4\n\nAutomated Pentesting Covers Only 1 of 6 Surfaces.\r\nAutomated pentesting proves the path exists. BAS proves whether your controls stop it. Most teams run one without the\r\nother.\r\nThis whitepaper maps six validation surfaces, shows where coverage ends, and provides practitioners with three diagnostic\r\nquestions for any tool evaluation.\r\nSource: https://www.bleepingcomputer.com/news/security/revil-ransomware-hits-managedcom-hosting-provider-500k-ransom/\r\nhttps://www.bleepingcomputer.com/news/security/revil-ransomware-hits-managedcom-hosting-provider-500k-ransom/\r\nPage 4 of 4",
	"extraction_quality": 1,
	"language": "EN",
	"sources": [
		"Malpedia",
		"ETDA"
	],
	"references": [
		"https://www.bleepingcomputer.com/news/security/revil-ransomware-hits-managedcom-hosting-provider-500k-ransom/"
	],
	"report_names": [
		"revil-ransomware-hits-managedcom-hosting-provider-500k-ransom"
	],
	"threat_actors": [],
	"ts_created_at": 1775434941,
	"ts_updated_at": 1775791296,
	"ts_creation_date": 0,
	"ts_modification_date": 0,
	"files": {
		"pdf": "https://archive.orkl.eu/db4e9e167aab00cc606cdcf64960325fe032e24b.pdf",
		"text": "https://archive.orkl.eu/db4e9e167aab00cc606cdcf64960325fe032e24b.txt",
		"img": "https://archive.orkl.eu/db4e9e167aab00cc606cdcf64960325fe032e24b.jpg"
	}
}