Red Hot Cyber

Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Search

BlackByte: The Return of the Gang after a few months of inactivity

Pietro Melillo : 24 June 2024 14:58

In recent years, the cybersecurity landscape has been marked by ongoing ransomware attacks , with criminal groups constantly evolving to evade defenses. One such group, known as BlackByte, recently returned to action after months of inactivity, reviving its double extortion strategy and introducing a new Data Leak Site (DLS).

Origins and Operational Methods of BlackByte

Blackbyte DLS

BlackByte emerged as a significant threat in July 2021, quickly attracting the attention of authorities such as the FBI and the US Secret Service. This group is known to exploit vulnerabilities in computer systems to gain unauthorized access and distribute their ransomware. One of the most common techniques used by BlackByte is the use of known vulnerabilities in Microsoft Exchange servers, a method that has also been exploited by other ransomware groups​​​​.

Business Model: Ransomware-as-a-Service (RaaS)

Sei un Esperto di Formazione?
Entra anche tu nel Partner program!
Accedi alla sezione riservata ai Creator sulla nostra Academy e scopri i vantaggi riservati ai membri del Partner program.
Per ulteriori informazioni, scrivici ad [email protected] oppure su Whatsapp al 379 163 8765 

Supporta RHC attraverso:


Ti piacciono gli articoli di Red Hot Cyber? Non aspettare oltre, iscriviti alla newsletter settimanale per non perdere nessun articolo

Support Red Hot Cyber ​​through

BlackByte operates under a Ransomware-as-a-Service (RaaS) model, which allows affiliates to use ransomware in exchange for a percentage of profits. This business model allows for a wider spread of ransomware and greater difficulty in tracing and stopping the group’s operations. BlackByte affiliates can customize attacks and leverage ransomware to target specific targets.

Ransomnote by the Blackbyte group

Infiltration and Attack Techniques

BlackByte uses a variety of techniques to infiltrate victims’ systems. These include:

  • Phishing : Sending phishing emails to trick users into obtaining login credentials.
  • Living-off-the-Land Binaries (LoLBins) : Using tools already present in operating systems to avoid detection.
  • AnyDesk : A remote management software often used for control of infected systems and for lateral movement within the network​​​​​​.

Evolution and Improvements

After an initial period of activity, the gang made significant changes to their ransomware. For example, an initial version of the ransomware had a vulnerability that allowed victims to decrypt their files without paying the ransom. This vulnerability was quickly patched in subsequent releases, which introduced more complex encryption methods and the use of multiple encryption keys for each attack​​.

Double Extortion

A distinctive feature of BlackByte attacks is double extortion. In addition to encrypting victims’ data, the gang threatens to publish the stolen data on a Data Leak Site (DLS) accessible via Tor. This approach puts double pressure on victims, forcing them to pay to avoid both data loss and reputational damage.

A new beginning

After the last known attack in March 2024, BlackByte disappeared from the radar, leading many to think the group had been dismantled or had ceased operations.

Post appeared on the blackbyte DLS of the last victim of March 2024

However, a recent announcement about their new DLS suggests otherwise. The message (see image) informs that it is now possible to download company files via Tor addresses, with a revamped system that promises to make it easier to view and download stolen data.

Banner “new info”

Details of the New DLS

BlackByte’s new DLS represents a significant evolution from their previous attempts. The updated platform allows for more intuitive navigation and access to a list of companies with their compromised files. This system, which uses the Tor network to ensure anonymity, allows criminals to operate with greater security and reach a wider audience of potential buyers of sensitive data.

Known victims

Over the course of its activity, BlackByte has targeted several notable organizations, including:

  1. Manufacturing Companies : Industrial companies have suffered severe operational disruptions due to encryption of their control systems.
  2. Healthcare Institutions : Hospitals and clinics have been forced to suspend operations due to inaccessibility of patient data, putting lives at risk.
  3. Government Agencies : Government agencies have seen sensitive and classified data compromised, with potentially devastating consequences for national security.

Implications and Defense Measures

BlackByte’s return with a revamped strategy highlights the importance of a proactive approach to cybersecurity. Organizations must invest in advanced security solutions, such as network segmentation, continuous anomaly monitoring, and employee training on cybersecurity practices . Furthermore, it is essential to have well-defined and regularly tested incident response plans to minimize damage in the event of an attack.

Conclusion

BlackByte represents one of many threats in the ever-evolving world of cybersecurity. Their return and adoption of a new DLS demonstrates how ransomware groups continue to innovate to maximize their profits. For organizations, threat awareness and taking appropriate security measures are crucial to defend against these increasingly sophisticated attacks.

It remains to be seen how the situation will evolve and what other surprises BlackByte will reserve in the near future. In the meantime, the global cybersecurity community must remain vigilant and collaborate to counter these persistent threats.

Pietro Melillo
Head of the Dark Lab group. A Computer Engineer specialised in Cyber Security with a deep passion for Hacking and technology, currently CISO of WURTH Italia, he was responsible for Cyber Threat Intelligence & Dark Web analysis services at IBM, carries out research and teaching activities on Cyber Threat Intelligence topics at the University of Sannio, as a Ph.D, author of scientific papers and development of tools to support cybersecurity activities. Leads the CTI Team "RHC DarkLab"