Wednesday, August 10, 2022
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Cybersecurity

Novel BlackCat Ransomware Tactic Speeds Up Encryption Process

Researcher by Researcher
April 26, 2022
in Cybersecurity
0
Novel BlackCat Ransomware Tactic Speeds Up Encryption Process
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


The BlackCat ransomware was recently observed leveraging a local socket to coordinate the execution of several instances of the ransomware, which may be run with different privileges. Researchers said this newly discovered tactic, which has not been previously observed in attacks by the ransomware, helps the attackers speed up the encryption process.

In a March 17 incident, Forescout researchers observed BlackCat actors setting up a local UDP server that communicated with port 61069, a dynamic port that was likely chosen by the ransomware attackers because it is not commonly used and would be free in most targets. The ransomware leveraged the port to establish a server to listen to the requests of other instances running on the same machine.

The new tactic “helps by increasing the speed and efficiency of the encryption process,” said Daniel dos Santos, Forescout’s head of research. “The several instances will encrypt different parts of the disk, thus finishing faster. At the same time, an instance launched with lower privileges can enjoy the privileges of another instance to encrypt files that the first one could not access.”

Attackers first launched several processes (i.e. instances) that ran the ransomware in the same victim machine. The first instance to be launched became a server, and the next ones became clients after they detected that a server was already running. The server instance then received messages from the other instances.

“All instances attempt to encrypt the disk but whenever a client cannot encrypt a specific folder because it lacks permissions, it will ask the server to try that by sending a message ‘TryPath,’” said dos Santos. “There are also some messages to establish a connection between client and server (‘Handshake’), check that a client is still running (‘HealthCheck’) and kill a socket (‘Shutdown’).”

“The several instances will encrypt different parts of the disk, thus finishing faster. At the same time, an instance launched with lower privileges can enjoy the privileges of another instance to encrypt files that the first one could not access.”

In the incident observed by Forescout, the ransomware adversary achieved initial access by leveraging a SQL injection flaw impacting SonicWall Secure Remote Access 4600 devices (CVE-2019-7481) in order to harvest credentials. The attacker then downloaded and installed SonicWall’s Virtual Assist module, which is used for remote access and file transfer between technicians and customers, in order to execute code that in turn waited for a legitimate user to connect and then hijacked the existing session. The attacker then changed the password for the account and gained access to VMware ESXi servers to manually launch the ransomware attack.

The ransomware has previously targeted the ESXi platform, as it has supported Windows and Linux variants with specific capabilities for VMware ESXi hosts that were used in this attack, like stopping or deleting virtual machines and deleting snapshots.

Researchers also found an error-handling bug in the malware sample, which can prevent encryption by the ransomware of Linux targets when a dummy “esxcli” executable is created. When the malware runs with this “esxcli” binary on the system, it reaches an internal error state and finishes execution before it reaches the file encryption functionality.

“To sum it up: if a dummy esxcli binary is present on a Linux system, no file will ever be encrypted when one runs this malware… this can be a workaround to prevent file encryption by this sample for other Linux systems that don’t require the presence of the legitimate esxcli binary,” said researchers.

Previously labeled as “the most sophisticated ransomware of 2021,” this latest communication tactic shows how BlackCat continues to evolve its techniques. The ransomware-as-a-service is known to have successfully infected dozens of targets using Rust, and also for using a binary payload that is specially crafted for each specific target, making detection harder. The FBI and researchers have also pointed to a connection between BlackCat and the BlackMatter (a potential partial reincarnation of the DarkSide group) ransomware groups.

BlackCat (also known as ALPHV) first appeared in late November and has since then been attacking targets in multiple countries, including the U.S., Australia and India. Last week, the FBI sent out a flash alert saying that the ransomware has compromised at least 60 entities globally as of March.



Source link

Related articles

Musk Threatens to Walk Away From Twitter Deal

Jury Finds Ex-Twitter Worker Spied for Saudi Royals

August 10, 2022
How to reset your Windows 10 password when you forget it

How to reset your Windows 10 password when you forget it

August 10, 2022
Tags: BlackCatencryptionProcessRansomwarespeedsTactic
Share76Tweet47

Related Posts

Musk Threatens to Walk Away From Twitter Deal

Jury Finds Ex-Twitter Worker Spied for Saudi Royals

August 10, 2022
0

A former Twitter worker was found guilty on Tuesday of spying for Saudi officials keen to unmask critics on the...

How to reset your Windows 10 password when you forget it

How to reset your Windows 10 password when you forget it

August 10, 2022
0

Learn how to reset your Windows 10 password whether you use a Microsoft Account or a local account. Uh-oh, you’ve...

VMware Warns of Critical Authentication Bypass Flaw

Exploit Available for Critical VMware Bug CVE-2022-31656

August 9, 2022
0

The researcher who discovered two critical vulnerabilities in VMware ONE Workspace Access has released a proof-of-concept exploit for one of...

High-Severity Flaw in Argo CD is Information Leak Risk

Privya Emerges From Stealth With Data Privacy Code Scanning Platform

August 9, 2022
0

Privya emerged from stealth mode on Tuesday with a data privacy-focused code scanning platform and $6 million in seed funding....

How older security vulnerabilities continue to pose a threat

How older security vulnerabilities continue to pose a threat

August 9, 2022
0

Security flaws dating back more than 10 years are still around and still pose a risk of being freely exploited,...

Load More
  • Trending
  • Comments
  • Latest
Brave browser’s Tor mode exposed users’ dark web activity

Brave browser’s Tor mode exposed users’ dark web activity

February 18, 2022
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
A first look at threat intelligence and threat hunting tools

A first look at threat intelligence and threat hunting tools

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
Musk Threatens to Walk Away From Twitter Deal

Jury Finds Ex-Twitter Worker Spied for Saudi Royals

August 10, 2022
MAS Confirms the Return of Singapore Fintech Festival 2022 as an In-Person Event

MAS Confirms the Return of Singapore Fintech Festival 2022 as an In-Person Event

August 10, 2022
How to reset your Windows 10 password when you forget it

How to reset your Windows 10 password when you forget it

August 10, 2022
Quantum networking: Defining the next wave of networking and communications

Quantum networking: Defining the next wave of networking and communications

August 9, 2022

Recent Posts

Musk Threatens to Walk Away From Twitter Deal

Jury Finds Ex-Twitter Worker Spied for Saudi Royals

August 10, 2022
MAS Confirms the Return of Singapore Fintech Festival 2022 as an In-Person Event

MAS Confirms the Return of Singapore Fintech Festival 2022 as an In-Person Event

August 10, 2022
How to reset your Windows 10 password when you forget it

How to reset your Windows 10 password when you forget it

August 10, 2022

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • Malware
  • Networking
  • Protection

Tags

Access Android attack Attacks banking BiWeekly bug Cisco critical Cyber Cybersecurity Data devices Digital exploited financial Finds Fintech Flaw flaws Google Group Hackers Krebs Latest malware Microsoft million Network News open Payments phishing Ransomware RoundUp scams security Software TFT Threat vulnerability warns Week Windows zeroday

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved