Зарегистрируйтесь сейчас для лучшей персонализированной цитаты!

BlackCat ransomware targeting US, European retail, construction and transportation orgs

28 января 2022 г Hi-network.com

Palo Alto Networks' Unit 42 released a deep-dive into the BlackCat ransomware, which emerged in mid-November 2021 as an innovative ransomware-as-a-service (RaaS) group leveraging the Rust programming language and offering affiliates 80-90% of ransom payments.

Recommends

  • Best VPN services
  • Best security keys
  • Best antivirus software
  • The fastest VPNs

In December, the ransomware family, also known as ALPHV, racked up at least 10 victims, giving it the seventh-largest number of victims listed on their leak site among ransomware groups tracked by Unit 42. 

Doel Santos, threat intelligence analyst with Unit 42, toldZDNetthe group has already attacked a wide range of industries, including construction and engineering, retail, transportation, commercial services, insurance, machinery, professional services, telecommunication, auto components and pharmaceuticals. 

Last week, Italian fashion brand Moncler was revealed to be a BlackCat victim from December. 

In addition to being written in Russian and coded in the Rust programming language, the malware stood out to Santos for a number of other reasons.

"What makes Blackcat standout is the use of their private access-key token. Most of the groups we have looked at in the past include a direct link and the keys embedded in the samples, which makes it easy to look at and confirm the ransomware victims," Santos said.

Also: White House, EPA release 100-day cybersecurity plan for water utility operators 

"Blackcat ransomware samples don't include the keys. Instead, they need to be submitted by the operator. Without it, there is no way for an external entity to get access to their negotiation site or identify the victim unless they have an exact copy of a ransom note with the exact key used for executing the ransomware."

Unit 42 noted that the affiliates of the group have "taken an aggressive approach to naming and shaming victims, listing more than a dozen on their leak site in a little over a month." 

"The largest number of the group's victims so far are US organizations, but BlackCat and its affiliates have also attacked organizations in Europe, the Philippines and other locations," the report noted. 

Unit 42

"Use of BlackCat ransomware has grown quickly for a variety of reasons (for comparison, AvosLocker had only listed a handful of victims publicly within two months of becoming known). Effective marketing to affiliates is a likely factor. In addition to offering an enticing share of ransom payments, the group has solicited affiliates by posting ads on forums such as Ransomware Anonymous Market Place (RAMP)," the report added. 

"Though this is not the first piece of malware to use Rust, it is one of the first, if not the first, piece of ransomware to use it. By leveraging this programming language, the malware authors can easily compile it against various operating system architectures. Given its numerous native options, Rust is highly customizable, which facilitates the ability to pivot and individualize attacks."

Also: QNAP warns NAS users of DeadBolt ransomware, urges customers to update

The group also extorts victims by stealing their data before deploying the ransomware, threatening to leak the data and launch distributed denial-of-service (DDoS) attacks.

BlackCat has been seen targeting both Windows and Linux systems, according to Unit 42, which added that it has observed affiliates asking for ransom amounts of up to$14 million. In some instances, affiliates have offered discounts of$9 million if the ransom is paid before the established time. They allow ransom to be paid in Bitcoin and Monero.

"In some cases, BlackCat operators use the chat to threaten the victim, claiming they will perform a DDoS attack on the victims' infrastructure if the ransom is not paid. When it appears in addition to the use of a leak site, this practice is known as triple extortion, a tactic that was observed being used by groups like Avaddon and Suncrypt in the past," Unit 42 explained. 

"One unique feature of BlackCat ransomware is that negotiation chats can only be accessed by those holding an access token key or ransom note -- the group has made efforts to avoid third-party snooping."

Recorded Future ransomware expert Allan Liska said that based on a couple of factors, including the use of the Rust programming language, Black Cat/ALPHV appears to be a well-sourced group. 

Liska said the fact that the group started with ransomware variants targeting Windows, Linux and ESXi systems "shows a level of sophistication."

"They have quickly become one of the top tier ransomware groups. This is credited, in part, to the fact that their RaaS offering is very aggressive, offering affiliates the ability 80%-90% of ransom paid, an unusually high percentage. Despite some early success, not every affiliate has been impressed, as this very negative review shows," Liska said, sharing a screenshot of an affiliate who complained about being banned by BlackCat for targeting an organization in Turkmenistan.

While Turkmenistan is not in CIS, it does have close ties to Russia.

A prolific#ransomware operator known as FishEye aka bassterlord has come out of deep waters after a month off and posted a very negative review of the#ALPHA (#BlackCat) ransomware. 1/5 pic.twitter.com/k1Wl1liljO

- Azim Khodjibaev (@AShukuhi) January 19, 2022

"Their public targets have been larger organizations, and they appear to be very aggressive when dealing with negotiators and their affiliates (e.g. a ban from the affiliate program after 2 weeks of inactivity). We'll see whether their penchant for being overbearing outweighs the attractive percentages they are offering," Liska added. 

Security

8 habits of highly secure remote workersHow to find and remove spyware from your phoneThe best VPN services: How do the top 5 compare?How to find out if you are involved in a data breach -- and what to do next
  • 8 habits of highly secure remote workers
  • How to find and remove spyware from your phone
  • The best VPN services: How do the top 5 compare?
  • How to find out if you are involved in a data breach -- and what to do next

tag-icon Горячие метки: Технологии и оборудование Безопасность и охрана

Copyright © 2014-2024 Hi-Network.com | HAILIAN TECHNOLOGY CO., LIMITED | All Rights Reserved.