Ransomware-as-a-Service (RaaS) is wreaking havoc on critical infrastructure around the world, causing businesses large and small to take major financial hits up to $15 million.
Three U.S. federal agencies have banded together to issue a joint cybersecurity advisory statement about BlackMatter, a RaaS tool cybercriminals have been using to profit. BlackMatter has been operating since July, according to the advisory.
Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), and National Security Agency (NSA) provided information about the techniques BlackMatter is using to hold organization networks for ransom.
“Ransomware attacks against critical infrastructure entities could directly affect consumer access to critical infrastructure services; therefore, CISA, the FBI, and NSA urge all organizations, including critical infrastructure organizations, to implement the recommendations listed in the Mitigations section of this joint advisory. These mitigations will help organizations reduce the risk of compromise from BlackMatter ransomware attacks,” the statement reads.
SecureWorld News digs into BlackMatter’s process and breaks down the risk mitigation tips in this article.
The federal agencies provide a description of how the bad actors are carrying out ransomware attacks. Analysis of BlackMatter’s tactics, techniques, and procedures (TTPs) was gathered from third-party reporting in a “sandbox environment,” which allowed BlackMatter’s process to be surveyed in a safe, monitored environment.
“Using embedded, previously compromised credentials, BlackMatter leverages the Lightweight Directory Access Protocol (LDAP) and Server Message Block (SMB) protocol to access the Active Directory (AD) to discover all hosts on the network. BlackMatter then remotely encrypts the hosts and shared drives as they are found,” reads the statement.
Instead of encrypting backup data, BlackMatter instead wipes it clean in some cases.
“BlackMatter actors use a separate encryption binary for Linux-based machines and routinely encrypt ESXI virtual machines. Rather than encrypting backup systems, BlackMatter actors wipe or reformat
backup data stores and appliances.
In a table provided by the advisory, BlackMatter’s practices are further outlined in accordance with the MITRE ATT&CK for Enterprise framework.
BlackMatter is believed to be a rebranding of DarkSide, a group of malicious hackers that were actively disrupting organizations from September 2020 through May 2021. DarkSide made claims it was shutting down earlier this year.
This group also successfully carried out agricultural supply chain cyberattacks on New Cooperative and Crystal Valley Cooperative back in September.
In the advisory, there were several methods outlined the U.S. agencies urged businesses to implement if they have not already.
CISA Director Jen Easterly took to Twitter and posted four methods to deter bad actors.
Apply these best practices to protect your networks:
(1) Implement and enforce backup procedures;
(2) Use strong, unique passwords;
(3) Use multi-factor authentication; and
(4) Implement network segmentation and traversal monitoring.https://t.co/ayO3bvC2qa
The techniques outlined by Easterly that can be done today to protect against ransomware, according to guidelines by the advisory. Here is a summary of those processes from the advisory.
If you believe your organization has been hit by ransomware, report the incident to CISA, FBI, or U.S. Secret Service immediately using the following websites.
Learn more about the technical details at us-cert.cisa.gov or by downloading the PDF version of the advisory statement here.
[RESOURCE] Join Roger Grimes, KnowBe4’s Data-Driven Defense Evangelist, for the upcoming remote session 5 Things You Should Know About Ransomware Before It’s Too Late.