BlackByte blends tried-and-true tradecraft with newly disclosed vulnerabilities to support ongoing attacks

Aug. 28, 2024, 2:35 p.m.

Description

The BlackByte ransomware group continues leveraging established tactics and vulnerable drivers to bypass security controls, while also incorporating newly disclosed vulnerabilities and using stolen credentials for propagation. A new iteration of their encryptor appends the 'blackbytent_h' extension to encrypted files, drops four vulnerable drivers, and employs Active Directory credentials for self-propagation. The group appears more active than its data leak site suggests, rapidly adapting its techniques.

Date

  • Created: Aug. 28, 2024, 2:04 p.m.
  • Published: Aug. 28, 2024, 2:04 p.m.
  • Modified: Aug. 28, 2024, 2:35 p.m.

Indicators

  • 31f4cfb4c71da44120752721103a16512444c13c2ac2d857a7e6f13cb679b427
  • 0296e2ce999e67c76352613a718e11516fe1b0efc3ffdb8918fc999dd76a73a5
  • 01aa278b07b58dc46c84bd0b1b5c8e9ee4e62ea0bf7a695862444af32e87f1fd
  • 543991ca8d1c65113dff039b85ae3f9a87f503daec30f46929fd454bc57e5a91

Attack Patterns

Additional Informations

  • Technical Services
  • Professional Services
  • Manufacturing