Researchers Connect BlackCat Ransomware with Past BlackMatter Malware Activity
source link: https://thehackernews.com/2022/04/researchers-connect-blackcat-ransomware.html?m=1
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.
Researchers Connect BlackCat Ransomware with Past BlackMatter Malware Activity
Cybersecurity researchers have uncovered further links between BlackCat (aka AlphaV) and BlackMatter ransomware families, the former of which emerged as a replacement following international scrutiny last year.
"At least some members of the new BlackCat group have links to the BlackMatter group, because they modified and reused a custom exfiltration tool [...] and which has only been observed in BlackMatter activity," Kaspersky researchers said in a new analysis.
The tool, dubbed Fendr, has not only been upgraded to include more file types but also used by the gang extensively to steal data from corporate networks in December 2021 and January 2022 prior to encryption, in a popular tactic called double extortion.
The findings come less than a month after Cisco Talos researchers identified overlaps in the tactics, techniques, and procedures (TTPs) between BlackCat and BlackMatter, describing the new ransomware variant as a case of "vertical business expansion."
BlackCat stands out for two reasons: it's an affiliate actor that has deployed BlackMatter in the past and its malware is written in Rust, indicating how threat actors are increasingly pivoting to programming languages with cross-compilation capabilities.
The group "provides infrastructure, malware samples, ransom negotiations, and probably cash-out," the researchers noted. "Anyone who already has access to compromised environments can use BlackCat's samples to infect a target."
Once executed, the malware gets the Windows system's MachineGuid from the registry — a unique key generated during the installation of the operating system — as well as its UUID, before proceeding to bypass User Account Control (UAC), delete shadow backups, and start the encryption process.
"This use of a modified Fendr, also known as ExMatter, represents a new data point connecting BlackCat with past BlackMatter activity," the researchers said.
"The modification of this reused tool demonstrates a more sophisticated planning and development regimen for adapting requirements to target environments, characteristic of a maturing criminal enterprise."
Recommend
-
7
NEW KIDS ON THE BLOCK — Haron and BlackMatter are the latest groups to crash the ransomware party The additions come as the number of high-severity ransomware attacks ratchet up....
-
3
Executive Summary CISA has issued a
-
3
Swissport遭受BlackCat勒索攻击 - FreeBuf网络安全行业门户 限时体验 编组备份 4 网页灯泡...
-
2
复杂危险的勒索软件 BlackCat 或将开启新的攻击模式-51CTO.COM 复杂危险的勒索软件 BlackCat 或将开启新的攻击模式 作者:咪贝2019 2022-03-22 10:00:03
-
7
美国FBI提醒各组织警惕「BlackCat」勒索软件 • 9 小时前...
-
3
BlackCat宣布对Creos攻击事件负责-51CTO.COM BlackCat宣布对Creos攻击事件负责 作者:Euclid 2022-08-02 20:02:00 安全
-
3
News BlackCat group releases screenshots of stolen Western Digital data The scre...
-
4
Home Ransomware group BlackCat demands payment from Reddit, threatens data leak ...
-
3
Japanese watchmaker Seiko struck by BlackCat/ ALPHV ransomware attack
-
6
BlackCat Ransomware Raises Ante After FBI Disruption – Krebs on Security The U.S. Federal Bureau of Investigation (FBI) disclosed today that it infiltrated the world’s secon...
About Joyk
Aggregate valuable and interesting links.
Joyk means Joy of geeK