Tuesday, January 31, 2023
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Cybersecurity

New Data Exfiltration Tool Seen in BlackByte Ransomware Attacks

Researcher by Researcher
October 22, 2022
in Cybersecurity
0
CISA Warns of Intensifying Ransomware Threat
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


Researchers have uncovered a new custom data exfiltration tool being used by at least one BlackByte affiliate in their ransomware attacks.

Researchers with Symantec on Friday said that they discovered the tool, Exbyte, in September, and that it has been utilized in at least two BlackByte ransomware attacks to date. While the tool has been used in conjunction with BlackByte attacks, it’s still too early to say whether Exbyte was developed by the group behind BlackByte or developed by another threat actor, said researchers.

“In terms of functionality, it’s pretty similar to other custom exfiltration tools we’ve seen but there are a few interesting details,” said Dick O’Brien, principal intelligence analyst for the Symantec Threat Hunter Team. “Unlike similar tools, this one is written in Go. It has somewhat more elaborate anti-detection features built in, such as the checks it runs for sandboxed environments or debugging or anti-virus software. It’s also a little bit more customizable and each example we’ve seen has been pre-configured for the victim, with files uploaded to a specified file path for that organization.”

After it has been executed, Exbyte checks for any indicators that it is running in a sandbox environment by calling the IsDebuggerPresent and CheckRemoteDeBuggerPresent APIs, as well as checking for running processes from an array of applications, antivirus and sandbox-related files. The tool then enumerates document files on the infected computers (including .txt, .doc and .pdf files) and uploads them to a folder created on Mega[.]co[.]nz with credentials for the Mega account hardcoded into Exbyte.

“The fact that actors are now creating custom tools for use in BlackByte attacks suggests that it may be on the way to becoming one of the dominant ransomware threats.”

Exbyte joins a number of custom data exfiltration tools being used by ransomware families, including the Exmatter exfiltration tool discovered in November 2021 used by BlackMatter ransomware attackers, and StealBit, which has been linked to the LockBit ransomware. The main motivation for creating these new customized exfiltration tools is increased speed for ransomware attacks, said O’Brien.

“There are lots of ways to potentially exfiltrate data that don’t require a custom tool but attackers are always looking at ways to reduce their ‘dwell time,’ the time between the initial intrusion and completion of encryption,” said O’Brien. “The longer it takes, the greater the risk of discovery. Automating one aspect of the attack will potentially speed things up.”

The BlackByte ransomware-as-a-service has previously been highlighted by the FBI due to its targeting of organizations across at least three U.S. critical infrastructure sectors.

As previously seen by the FBI, Symantec researchers said that BlackByte actors have been relying on known Microsoft Exchange Server vulnerabilities – including ProxyShell and ProxyLogon – to gain initial access. Researchers said attackers also used an array of tools, including AdFind, AnyDesk, NetScan and PowerView, before deploying version 2.0 of the BlackByte payload.

“Following the departure of a number of major ransomware operations such as Conti and Sodinokibi, BlackByte has emerged as one of the ransomware actors to profit from this gap in the market,” said Symantec researchers. “The fact that actors are now creating custom tools for use in BlackByte attacks suggests that it may be on the way to becoming one of the dominant ransomware threats.”



Source link

Related articles

Novel Malware Installed in VMware ESXi Attacks

VMware Fixes vRealize Log Insight RCE Bugs

January 31, 2023
Securing CI/CD. There are many organizations moving to… | by Binu Panicker | Jan, 2023

Securing CI/CD. There are many organizations moving to… | by Binu Panicker | Jan, 2023

January 30, 2023
Tags: AttacksBlackByteDataExfiltrationRansomwaretool
Share76Tweet47

Related Posts

Novel Malware Installed in VMware ESXi Attacks

VMware Fixes vRealize Log Insight RCE Bugs

January 31, 2023
0

VMware has released updates for a group of four vulnerabilities in its vRealize Log Insight logging platform, three of which...

Securing CI/CD. There are many organizations moving to… | by Binu Panicker | Jan, 2023

Securing CI/CD. There are many organizations moving to… | by Binu Panicker | Jan, 2023

January 30, 2023
0

There are many organizations moving to the cloud every day. Some are developing software at a fast pace, some are...

The Effect of Cybersecurity Layoffs on Cybersecurity Recruitment

The Effect of Cybersecurity Layoffs on Cybersecurity Recruitment

January 30, 2023
0

On Friday, January 20, 2023, Google announced it would lay off 12,000 employees. Amazon and Microsoft have laid off a...

How IT Budgets Should Fill Cybersecurity Moats in 2023

How IT Budgets Should Fill Cybersecurity Moats in 2023

January 30, 2023
0

TechRepublic speaks with Carlos Morales of Neustar Security Services on the best ways for companies to spend on cybersecurity —...

Boosting Data Security with AI and Blockchain | by Binu Panicker | Jan, 2023

Boosting Data Security with AI and Blockchain | by Binu Panicker | Jan, 2023

January 30, 2023
0

Today, data is considered the new oil and rightly so because the amount and type of data collected on people...

Load More
  • Trending
  • Comments
  • Latest
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
Supply chain efficiency starts with securing port operations

Supply chain efficiency starts with securing port operations

March 15, 2022
A first look at threat intelligence and threat hunting tools

A first look at threat intelligence and threat hunting tools

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
Novel Malware Installed in VMware ESXi Attacks

VMware Fixes vRealize Log Insight RCE Bugs

January 31, 2023
KITMEK Launches $1 Digital Only School for Children Across MENA

KITMEK Launches $1 Digital Only School for Children Across MENA

January 31, 2023
Whole-Network Visualization With Meraki Dashboard

Whole-Network Visualization With Meraki Dashboard

January 31, 2023
Securing CI/CD. There are many organizations moving to… | by Binu Panicker | Jan, 2023

Securing CI/CD. There are many organizations moving to… | by Binu Panicker | Jan, 2023

January 30, 2023

Recent Posts

Novel Malware Installed in VMware ESXi Attacks

VMware Fixes vRealize Log Insight RCE Bugs

January 31, 2023
KITMEK Launches $1 Digital Only School for Children Across MENA

KITMEK Launches $1 Digital Only School for Children Across MENA

January 31, 2023
Whole-Network Visualization With Meraki Dashboard

Whole-Network Visualization With Meraki Dashboard

January 31, 2023

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • Malware
  • Networking
  • Protection

Tags

Access attack Attacks banking BiWeekly bug Cisco cloud code critical Cybersecurity Data Digital exploited financial Finds Fintech Flaw flaws Google Group Hackers Krebs Latest launches malware Microsoft million Network News open patches Payments platform Ransomware RoundUp security Software TFT Threat Top vulnerabilities vulnerability warns Week

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved