{"id":41226,"date":"2021-06-03T14:20:50","date_gmt":"2021-06-03T14:20:50","guid":{"rendered":"https:\/\/packetstormsecurity.com\/news\/view\/32342\/Attack-On-Meat-Supplier-Came-From-REvil-Ransomwares-Most-Cut-Throat-Gang.html"},"modified":"2021-06-03T14:20:50","modified_gmt":"2021-06-03T14:20:50","slug":"attack-on-meat-supplier-came-from-revil-ransomwares-most-cut-throat-gang","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/attack-on-meat-supplier-came-from-revil-ransomwares-most-cut-throat-gang\/","title":{"rendered":"Attack On Meat Supplier Came From REvil, Ransomware&#8217;s Most Cut Throat Gang"},"content":{"rendered":"<figure class=\"intro-image intro-left\"><img decoding=\"async\" src=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2021\/06\/ransomware-800x600.jpeg\" alt=\"Ransomware\"><figcaption class=\"caption\">\n<div class=\"caption-text\"><a href=\"https:\/\/cdn.arstechnica.net\/wp-content\/uploads\/2021\/06\/ransomware.jpeg\" class=\"enlarge-link\" data-height=\"750\" data-width=\"1000\">Enlarge<\/a> <span class=\"sep\">\/<\/span> Ransomware<\/div>\n<div class=\"caption-credit\">Getty Images<\/div>\n<\/figcaption><\/figure>\n<aside id=\"social-left\" class=\"social-left\" aria-label=\"Read the comments or share this article\"><a title=\"94 posters participating\" class=\"comment-count icon-comment-bubble-down\" href=\"https:\/\/arstechnica.com\/gadgets\/2021\/06\/attack-on-meat-supplier-came-from-revil-ransomwares-most-cut-throat-gang\/?comments=1\"> <\/p>\n<h4 class=\"comment-count-before\">reader comments<\/h4>\n<p> <span class=\"comment-count-number\">233<\/span> <span class=\"visually-hidden\"> with 94 posters participating<\/span> <\/a> <\/p>\n<div class=\"share-links\">\n<h4>Share this story<\/h4>\n<\/p><\/div>\n<\/aside>\n<p><!-- cache hit 236:single\/related:73a17be1438f7301b901a15ce154f276 --><!-- empty --><\/p>\n<p>The cyberattack that halted some operations at the world\u2019s biggest meat processor this week was the work of REvil, a ransomware franchise known for its ever-escalating series of cutthroat tactics designed to extort the highest price.<\/p>\n<p>The FBI <a href=\"https:\/\/twitter.com\/NatashaBertrand\/status\/1400199441823436812\">made<\/a> the attribution on Wednesday, a day after word emerged that Brazil-based JBS SA had experienced a <a href=\"https:\/\/arstechnica.com\/gadgets\/2021\/06\/ransomware-striking-the-worlds-biggest-meat-producer-threatens-shortages\/\">ransomware attack<\/a> that prompted the closure of at least five US-based plants, in addition to facilities in Canada and Australia.<\/p>\n<h2>High-pressure ransom<\/h2>\n<p>REvil and its affiliates account for about <a href=\"https:\/\/blog.emsisoft.com\/en\/38619\/ransomware-statistics-for-2021-q1-report\/\">4 percent<\/a> of attacks on the public and private sectors. In most respects, REvil is a fairly average ransomware enterprise. What sets it apart is the cruelty of its tactics, which are designed to exert maximum pressure on victims.<\/p>\n<p>&#8220;In some respects REvil is a &#8216;pioneer&#8217;&#8230; being one of the early adopters of publicly blogging victims and leaning heavily into the &#8216;double-extortion&#8217; side of things,&#8221; Jim Walter, a senior threat researcher at security firm SentinelOne, said in a text message. &#8220;They were also early experimenters with auctioning off stolen data. Some auctions were successful, some where not, but potentially data stolen from select victims would have been available to the highest bidder.&#8221;<\/p>\n<p>In one case, the REvil dark web site posted a screenshot purporting to show that pornography was present in a temporary files folder of a computer belonging to the IT director of a large company that had recently fallen victim to the group.<\/p>\n<aside class=\"ad_wrapper\" aria-label=\"In Content advertisement\"> <span class=\"ad_notice\">Advertisement <\/span> <\/aside>\n<p>\u201cWhile he was jerking his cock, we downloaded several hundred gigabytes of private information about the company\u2019s customers,&#8221; said the post. &#8220;God bless his hairy palms. Amen!\u201d<\/p>\n<p>REvil is also the group that hacked Grubman, Shire, Meiselas &amp; Sacks, the celebrity law firm that represented Lady Gaga, Madonna, U2, and other top-flight entertainers. When REvil demanded $21 million in return for not publishing the data, the law firm <a href=\"https:\/\/web.archive.org\/web\/20210322063552\/https:\/\/www.zdnet.com\/article\/ransomware-gang-asks-42m-from-ny-law-firm-threatens-to-leak-dirt-on-trump\/\">reportedly offered<\/a> $365,000. REvil responded by upping its demand to $42 million and later publishing a 2.4GB archive containing some Lady Gaga legal documents.<\/p>\n<p>Other REvil victims include Kenneth Copeland, SoftwareOne, Quest, and <a href=\"https:\/\/arstechnica.com\/information-technology\/2020\/01\/unpatched-vpn-makes-travelex-latest-victim-of-revil-ransomware\/\">Travelex<\/a>.<\/p>\n<p>Last year, REvil started <a href=\"https:\/\/arstechnica.com\/information-technology\/2020\/06\/ransomware-gang-is-auctioning-off-victims-confidential-data\/\">auctioning off<\/a> the confidential information of victims who refuse to pay. In March, the group announced a new service that contacts the media and victims\u2019 partners to inform them of a breach. REvil can also threaten victims with DDoS attacks.<\/p>\n<p>REvil first appeared in April 2019 and quickly developed a reputation for&nbsp;<a href=\"https:\/\/securelist.com\/ransomware-world-in-2021\/102169\/\">technical prowess<\/a> when it used legitimate CPU functions to bypass security systems. In April of this year, Kaspersky <a href=\"https:\/\/securelist.com\/ransomware-world-in-2021\/102169\/\">ranked REvil<\/a> as the number-three&nbsp;ransomware group.<\/p>\n<h2>Supply chains under threat<\/h2>\n<p>In April, REvil stole data from manufacturer Quanta Computer and then <a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2021-04-21\/apple-targeted-in-50-million-ransomware-hack-of-supplier-quanta\">demanded $50 million from Apple<\/a> in exchange for not publishing technical data it had obtained for unreleased Apple products. The group went on to publish schematics for two Apple products on the day they were announced. The data has since been removed, for reasons unknown.<\/p>\n<p>This week\u2019s incident came three weeks after ransomware closed down the Colonial Pipeline, an event that <a href=\"https:\/\/arstechnica.com\/gadgets\/2021\/05\/colonial-pipeline-resumes-operations-after-ransomware-prompted-closure\/\">caused shortages<\/a> of gasoline and jet fuel up and down the east coast of the US.<\/p>\n<p>Production began to resume at US-based JBS beef plants on Wednesday, though thousands of JBS workers in the US, Canada, and Australia had shifts adjusted or canceled earlier this week.<\/p>\n<p>Such ransomware attacks continue to expose the fragility of the country\u2019s supply chains as leaders in the private and public sectors struggle, largely in vain, to contain the threat.<\/p>\n<p> READ MORE <a href=\"https:\/\/packetstormsecurity.com\/news\/view\/32342\/Attack-On-Meat-Supplier-Came-From-REvil-Ransomwares-Most-Cut-Throat-Gang.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":41227,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[60],"tags":[1489],"class_list":["post-41226","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-packet-storm","tag-headlinemalwarecybercrimefraudcryptography"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Attack On Meat Supplier Came From REvil, Ransomware&#039;s Most Cut Throat Gang 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/attack-on-meat-supplier-came-from-revil-ransomwares-most-cut-throat-gang\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Attack On Meat Supplier Came From REvil, Ransomware&#039;s Most Cut Throat Gang 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/attack-on-meat-supplier-came-from-revil-ransomwares-most-cut-throat-gang\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-03T14:20:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/06\/attack-on-meat-supplier-came-from-revil-ransomwares-most-cut-throat-gang.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/attack-on-meat-supplier-came-from-revil-ransomwares-most-cut-throat-gang\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/attack-on-meat-supplier-came-from-revil-ransomwares-most-cut-throat-gang\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Attack On Meat Supplier Came From REvil, Ransomware&#8217;s Most Cut Throat Gang\",\"datePublished\":\"2021-06-03T14:20:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/attack-on-meat-supplier-came-from-revil-ransomwares-most-cut-throat-gang\\\/\"},\"wordCount\":602,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/attack-on-meat-supplier-came-from-revil-ransomwares-most-cut-throat-gang\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/attack-on-meat-supplier-came-from-revil-ransomwares-most-cut-throat-gang.jpg\",\"keywords\":[\"headline,malware,cybercrime,fraud,cryptography\"],\"articleSection\":[\"Packet Storm\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/attack-on-meat-supplier-came-from-revil-ransomwares-most-cut-throat-gang\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/attack-on-meat-supplier-came-from-revil-ransomwares-most-cut-throat-gang\\\/\",\"name\":\"Attack On Meat Supplier Came From REvil, Ransomware's Most Cut Throat Gang 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/attack-on-meat-supplier-came-from-revil-ransomwares-most-cut-throat-gang\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/attack-on-meat-supplier-came-from-revil-ransomwares-most-cut-throat-gang\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/attack-on-meat-supplier-came-from-revil-ransomwares-most-cut-throat-gang.jpg\",\"datePublished\":\"2021-06-03T14:20:50+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/attack-on-meat-supplier-came-from-revil-ransomwares-most-cut-throat-gang\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/attack-on-meat-supplier-came-from-revil-ransomwares-most-cut-throat-gang\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/attack-on-meat-supplier-came-from-revil-ransomwares-most-cut-throat-gang\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/attack-on-meat-supplier-came-from-revil-ransomwares-most-cut-throat-gang.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/attack-on-meat-supplier-came-from-revil-ransomwares-most-cut-throat-gang.jpg\",\"width\":800,\"height\":600},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/attack-on-meat-supplier-came-from-revil-ransomwares-most-cut-throat-gang\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"headline,malware,cybercrime,fraud,cryptography\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/headlinemalwarecybercrimefraudcryptography\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Attack On Meat Supplier Came From REvil, Ransomware&#8217;s Most Cut Throat Gang\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Attack On Meat Supplier Came From REvil, Ransomware's Most Cut Throat Gang 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/attack-on-meat-supplier-came-from-revil-ransomwares-most-cut-throat-gang\/","og_locale":"en_US","og_type":"article","og_title":"Attack On Meat Supplier Came From REvil, Ransomware's Most Cut Throat Gang 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/attack-on-meat-supplier-came-from-revil-ransomwares-most-cut-throat-gang\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2021-06-03T14:20:50+00:00","og_image":[{"width":800,"height":600,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/06\/attack-on-meat-supplier-came-from-revil-ransomwares-most-cut-throat-gang.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/attack-on-meat-supplier-came-from-revil-ransomwares-most-cut-throat-gang\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/attack-on-meat-supplier-came-from-revil-ransomwares-most-cut-throat-gang\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Attack On Meat Supplier Came From REvil, Ransomware&#8217;s Most Cut Throat Gang","datePublished":"2021-06-03T14:20:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/attack-on-meat-supplier-came-from-revil-ransomwares-most-cut-throat-gang\/"},"wordCount":602,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/attack-on-meat-supplier-came-from-revil-ransomwares-most-cut-throat-gang\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/06\/attack-on-meat-supplier-came-from-revil-ransomwares-most-cut-throat-gang.jpg","keywords":["headline,malware,cybercrime,fraud,cryptography"],"articleSection":["Packet Storm"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/attack-on-meat-supplier-came-from-revil-ransomwares-most-cut-throat-gang\/","url":"https:\/\/www.threatshub.org\/blog\/attack-on-meat-supplier-came-from-revil-ransomwares-most-cut-throat-gang\/","name":"Attack On Meat Supplier Came From REvil, Ransomware's Most Cut Throat Gang 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/attack-on-meat-supplier-came-from-revil-ransomwares-most-cut-throat-gang\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/attack-on-meat-supplier-came-from-revil-ransomwares-most-cut-throat-gang\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/06\/attack-on-meat-supplier-came-from-revil-ransomwares-most-cut-throat-gang.jpg","datePublished":"2021-06-03T14:20:50+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/attack-on-meat-supplier-came-from-revil-ransomwares-most-cut-throat-gang\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/attack-on-meat-supplier-came-from-revil-ransomwares-most-cut-throat-gang\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/attack-on-meat-supplier-came-from-revil-ransomwares-most-cut-throat-gang\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/06\/attack-on-meat-supplier-came-from-revil-ransomwares-most-cut-throat-gang.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/06\/attack-on-meat-supplier-came-from-revil-ransomwares-most-cut-throat-gang.jpg","width":800,"height":600},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/attack-on-meat-supplier-came-from-revil-ransomwares-most-cut-throat-gang\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"headline,malware,cybercrime,fraud,cryptography","item":"https:\/\/www.threatshub.org\/blog\/tag\/headlinemalwarecybercrimefraudcryptography\/"},{"@type":"ListItem","position":3,"name":"Attack On Meat Supplier Came From REvil, Ransomware&#8217;s Most Cut Throat Gang"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/41226","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=41226"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/41226\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/41227"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=41226"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=41226"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=41226"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}