Kaseya, which saw its Virtual Techniques Administrator (VSA) program compromised to start a substantial scale ransomware assault in opposition to customers of its managed service service provider clients, has received a essential to decrypt victims’ info.

The business reported it experienced received a common decryptor essential for the REvil ransomware utilised in the July 4 assault from “a 3rd bash” but furnished no further more particulars as to where it arrived from.

Security vendor Emsisoft is doing work with Kaseya, and has verified that the decryptor essential works and can unlock victims’ devices.

“We have no stories of problems or troubles with the decryptor,” Kaseya reported.

The REvil ransomware gang experienced previously demanded US$70 million for the common decryptor essential, backing down from an previously try at extorting US$45,000 per program from victims.

REvil claimed the assault experienced succeeded in encrypting around a million devices, and Kaseya chief government Fred Voccola believed that up to 1500 businesses ended up strike, even though the exact selection is really hard to verify.

A person grocery chain in Sweden experienced to shut 800 retailers just after currently being struck by the REvil ransomware distributed as a malicious update to Kaseya VSA.

US authorities have condemned the mass ransomware assault with the White Property giving up to US$10 million for information and facts that thwarts or helps obtain the extortionists, and a selection of other initiatives.

REvil has dismantled its ransomware infrastructure and appears to have shut down its functions for now.