Description

On August 17, 2023, Microsoft revealed the discovery of a new iteration of the BlackCat ransomware (also known as ALPHV and Noberus) that incorporates tools like Impacket and RemCom to streamline lateral movement and remote code execution. BlackCat ransomware may be deployed widely in target environments with the Impacket tool, which extracts credentials and executes remote services. Additionally, the new BlackCat version integrates the RemCom hacktool for remote code execution and contains hardcoded compromised credentials for lateral movement and further ransomware dissemination. Microsoft's threat intelligence team identified this variant in attacks carried out by a BlackCat affiliate in July 2023. Moreover, this development follows over two months after IBM Security X-Force shared information about an updated BlackCat version called Sphynx, which emerged in February 2023 with enhanced encryption speed and stealth capabilities. This ongoing evolution underscores threat actors' continuous efforts to refine and adapt the ransomware. The BlackCat ransomware demonstrates functionality beyond ransomware and acts as a versatile toolkit, with some aspects based on tools from Impacket, according to IBM Security X-Force's observations in late May 2023. BlackCat, active since November 2021, has demonstrated a propensity for adaptation and innovation. The group recently introduced a data leak API to amplify the impact of its attacks. Another ransomware threat group, Cuba (aka COLDRAW), has exhibited comprehensive attack capabilities involving various tools such as BUGHATCH, BURNTCIGAR, Wedgecut, Metasploit, and Cobalt Strike frameworks. BURNTCIGAR features modifications to terminate specific targeted processes, possibly aimed at thwarting analysis. The group utilized exploits like CVE-2020-1472 (Zerologon) and CVE-2023-27532 for initial access, indicating their increasing sophistication. Ransomware continues to evolve as a lucrative avenue for financially motivated threat actors. Some groups are transitioning from encryption-based attacks to pure exfiltration and ransom, while others engage in triple extortion by combining data encryption, theft, employee/customer blackmail, and DDoS attacks. Encryptionless Extortion attacks are gaining traction due to their speed, profitability, and lower disruption compared to traditional encryption-based attacks. Additionally, ransomware actors are adopting intermittent encryption to expedite the process and evade detection by security solutions. An emerging tactic involves targeting managed service providers (MSPs) as entry points to infiltrate downstream corporate networks. A Play ransomware campaign targeted various industries and government entities across different countries by exploiting Remote Monitoring and Management (RMM) software used by service providers, bypassing existing defenses. The U.S. government has responded by releasing a Cyber Defense Plan to counter threats to the RMM ecosystem, highlighting the cascading impacts of such attacks on small and medium-sized organizations.