Skip to main content
Skip to main content
Microsoft Security Intelligence
Published Jul 15, 2020 | Updated Jul 02, 2021

Ransom:Win32/Sodinokibi

Summary

This ransomware encrypts the data on your disk and can stop you from using your device or accessing your data. It encrypts files, renders them inaccessible, and demands payment for the decryption key. Sodinokibi, also known as REvil, is deployed during human-operated ransomware campaigns. The attackers have been observed using the following methods to enter the network:

  • Email messages containing a malicious attachment or a link to a malicious file
  • Exploitation of vulnerabilities in web browsers, VPN appliances, and other services
After entering the network, attackers steal credentials, elevate their privileges, and move laterally across compromised networks to establish persistence before deploying this ransomware or other malware payloads.

For information about Sodinokibi and other human-operated ransomware campaigns, read these blog posts:

There is no one-size-fits-all response if you have been victimized by ransomware. To recover files, you can restore backups. There is no guarantee that paying the ransom will give you access to your files.

Microsoft Defender Antivirus automatically removes threats as they are detected. However, many infections can leave remnant files and system changes. Updating your antimalware definitions and running a full scan might help address these remnant artifacts.

You can also visit our advanced troubleshooting page or search the Microsoft virus and malware community for more help.

Follow us