Snynet Solution Logo
MON - SUN: 10 AM - 6 PM
+60 11 5624 8319

Blog

FBI sounds the alarm over virulent new ransomware strain

Image Description

A virulent new ransomware strain has infected at least 60 different organizations in the last two months, the FBI has warned.

In a Flash report, published late last week, the intelligence agency said that BlackCat, a known ransomware-as-a-service actor, compromised these organizations using a strain written in RUST.

This is somewhat unusual given that most ransomware is written in C or C++. However, the FBI believes these particular threat actors opted for RUST as it’s considered to be a “more secure programming language that offers improved performance and reliable concurrent processing.”

Share your thoughts on Cybersecurity and get a free copy of the Hacker's Manual 2022. Help us find how businesses are preparing for the post-Covid world and the implications of these activities on their cybersecurity plans. Enter your email at the end of this survey to get the bookazine, worth $10.99/£10.99.

Mitigations and defenses

BlackCat, also known as ALHPV, usually demands payment in Bitcoin and Monero in exchange for the decryption key, and although the demands are usually “in the millions”, has often accepted payments below the initial demand, the FBI says.

BlackCat also has strong ties to Darkside (aka Blackmatter), the FBI further explains, suggesting that the group has “extensive networks and experience” in operating malware and ransomware attacks. 

The attack usually starts with an already compromised account, which gives the attackers initial access to the target endpoint. The group then compromises Active Directory user and administrator accounts, and uses Windows Task Scheduler to configure malicious Group Policy Objects (GPOs), to deploy the ransomware.

Initial deployment uses PowerShell scripts, in conjunction with Cobalt Strike, and disables security features within the victim’s network.

The attackers are then said to download as much data as possible, before locking up the systems. And they even look to pull data from any cloud hosting providers they could find. 

Finally, with the help of Windows scripting, the group seeks to deploy ransomware onto additional hosts.

The FBI has also created a comprehensive list of recommended mitigations, which include reviewing domain controllers, servers, workstations, and active directories for new or unrecognized user accounts; regularly backing up data, reviewing Task Scheduler for unrecognized scheduled tasks, and requiring admin credentials for any software installation processes.

Date

25 Apr 2022

Sources


Share


Other Blog

  • Okay Google! Get set for the new Driving Assistant

    For close to a year, Google has been toying around with the idea of removing Android Auto and replacing it with a more engaging experience as part of its efforts to create an impact with automakers.

    Read More
  • Best Ultrabooks 2021: the top thin and light laptops reviewed

    We've put together a definitive list of the best Ultrabooks, or thin and light Windows laptops.

    Read More
  • Apple snafu disables printing on macOS Catalina and Mojave devices

    Mac users with HP printers were unable to print due to a driver certificate being revoked but there is now a fix for the issue.

    Read More
  • Internet Explorer voted the worst thing about using the web

    Internet Explorer tops the list of online pain points, Mozilla developer survey finds.

    Read More

Find Out More About Us

Want to hire best people for your project? Look no further you came to the right place!

Contact Us