BlackCat Ransomware group attacks on the rise

Threat Level – Amber | Vulnerability Report
Download PDF

For a detailed advisory, download the pdf file here

The Blackcat Ransomware gang also known as ALPHV has targeted around 25 organizations belonging to multiple sectors globally since November 2021. The group has claimed responsibility for the recent cyber attack on Swissport which resulted in aircraft delays and service disruptions.

The current attack was carried out by first acquiring access via either leaked credentials or exposed vulnerable software. The attackers then disable defenses such as Windows Defender and increase the connection limit on remote connections for better data exfiltration. The Blackcat ransomware then terminates a series of pre-defined processes before beginning the encryption process with either AES or ChaCha20 encryption. Encrypted files have the extension “.sykffle” attached to them. Blackcat uses 7zip and Rclone to exfiltrate data, which is subsequently put on their website for sale if the ransom is not paid.

The notable capabilities of the ransomware written in rust include embedded PsExec, Powershell process migration capabilities, ability to infect VMWare ESXi service and also has built-in anti-recovery method that deletes the shadow volume copy using “vssadmin.exe”.

The user can mitigate the risk by following the recommendations: •Monitor the use of stolen credentials. •Have an effective backup strategy that ensures the backup are inaccessible from the endpoint. •Keep all operating systems and software up to date. •Implement a user training program and phishing exercises. •

The Techniques commonly used by Blackcat are:

TA0001: Initial Access

TA0002: Execution

TA0007: Discovery

TA0005: Defense Evasion

TA0040: Impact

TA0003: Persistence

TA0004: Privilege Escalation

TA0006: Credential Access

TA0011: Command and Control

TA0010: Exfiltration

T1027: Obfuscated Files or Information

T1007: System Service Discovery

T1059: Command and Scripting Interpreter

T1082: System Information Discovery

T1490: Inhibit System Recovery

T1485: Data Destruction

T1078: Valid Accounts

T1486: Data Encrypted For Impact

T1140: Encode/Decode Files or Information

T1202: Indirect Command Execution

T1543.003: Create or Modify System Process: Windows Service

T1550.002: Use Alternate Authentication Material: Pass the Hash

T1027.002: Obfuscated Files or Information: Software Packing

Actor Details

Indicators of Compromise (IoCs)

Recent Breaches

What’s new on HivePro

Get through updates and upcoming events, and more directly in your inbox