2022-03-08

Cybereason Analysis of ALPHV/BlackCat Ransomware

Level: 
Tactical
  |  Source: 
Cybereason
Construction
Retail
Telecommunications
Transportation
Share:

Cybereason Analysis of ALPHV/BlackCat Ransomware

Cybereason provides analysis of ALPHV (aka Blackcat) RaaS (Ransomware as a Service), with operators likely associated with Russia. The ransomware strain is written in Rust program language with Windows and Linux variants. The group operates with a double extortion model with some cases observing a triple extortion model, involving DDoS attacks. Organizationally ALPHV/BlackCat operators are affiliates of DarkSide/BlackMatter ransomware, in addition, possess infrastructure and tools that are similar to LockBit ransomware. From its arrival in cyberspace, the ransomware strain has impacted a number of organizations with notable victims mentioned including "German oil companies, an Italian luxury fashion brand and a Swiss Aviation company." Whist having a variety of targets, "BlackCat has attacked various industries, including telecommunication, commercial services, insurance, retail, machinery, pharmaceuticals, transportation, and construction industries." Activity observed from the ransomware execution includes privilege escalation activity, wmic running reconnaissance, executing fsutil to set symbolic links, stopping services, registry modification requests and deleting volume shadow copies.

     

Get trending threats published weekly by the Anvilogic team.

Sign Up Now