BlackLock is a sophisticated cross-platform ransomware strain that emerged in 2024, initially under the name “El Dorado” before rebranding in September. It is Go-based, targets Windows, Linux, and VMware ESXi systems, significantly expanding its attack surface. Operating under a Ransomware-as-a-Service model, BlackLock recruits affiliates through Russian-speaking forums like RAMP and has claimed victims globally, including public institutions, manufacturing, education, and more. Its developers, likely Russian-speaking, combine advanced cryptographic techniques with psychological pressure tactics to maximize ransom payments. The ransomware initiates infection by scanning networks using open-source tools like go-smb2 to access SMB shares across Windows environments. Using command-line arguments such as -path, -delay, -threads, -perc, and -sort to fine-tune the encryption process. Once deployed, it creates unique ChaCha20 keys and nonces for each file, encrypting them via Go’s crypto package. These keys are then protected using Elliptic Curve Diffie-Hellman (ECDH) key exchange, and encrypted metadata is appended to each file using secretbox.Seal(), ensuring decryption is impossible without the attacker’s tools. The ransom notes titled HOW_RETURN_YOUR_DATA.TXT in each encrypted directory, warns business disruption and data leaks if demands are not met. BlackLock deepens its hold by erasing recovery options. It deletes Volume Shadow Copy Service (VSS) data and Recycle Bin contents using stealthy WMI queries via shellcode executed directly in memory, bypassing typical detection methods. It also attempts lateral movement across corporate networks using NTLM hashes or plaintext credentials provided via command-line options. Although an -esxi option exists, it is not yet functional in current samples, indicating future expansion to VMware environments. To mitigate the threat, organizations must deploy layered defenses: segment networks, enforce strong authentication, monitor SMB traffic, and maintain frequent offline backups. Endpoint protection, prompt patching, and regular incident response drills are critical. With BlackLock's advanced encryption and stealth tactics, prevention and preparation remain the most effective defenses.
Researchers at Cofense Intelligence found the campaign of group Lone None distributing advanced malware in the form of spoofed copyright takedown notices. The campaign delivers the...
A widespread security issue has been uncovered in mobile apps using Firebase, where misconfigured services expose sensitive user data to unauthenticated attackers. First disclosed ...
A new phishing campaign is targeting PyPI maintainers using deceptive emails that mimic official PyPI communications. These emails, crafted to look like account verification reques...