BlackSuit ransomware - what you need to know

What's going on? A cybercriminal group calling itself BlackSuit has claimed responsibility for a series of ransomware attacks, including breaches at schools in central Georgia. And earlier in the year, a zoo in Tampa Bay was targeted by the same hacking gang. Meanwhile, liberal arts college DePauw University in Indiana says that it was recently targeted, and a \"limited amount of data on specific individuals was accessed.\" 214GB of stolen data has since been made available for download on BlackSuit's extortion site on the dark web. How come I haven't heard of BlackSuit before? Chances are that if you're interested in cybersecurity, you're not a complete stranger to BlackSuit. Although BlackSuit first appeared in May 2023, it appears to have strong links to the Royal ransomware gang, which itself was born out of the remains of the notorious Conti group. Are you suggesting that BlackSuit is a rebranding of the Royal and Conti ransomware groups? It's not just me. Last month the US Department of Health and Human Services (HHS) issued an advisory to the healthcare and public health sector about BlackSuit that described its \"striking parallels\" to Royal, and said it was the \"direct successor to the notorious Russian-linked Conti operation.\" The HHS warned that BlackSuit was \"a threat actor to be closely watched in the near future\". So is BlackSuit another ransomware-as-a-service (RaaS) operation? Not presently. Right now, it cannot be considered ransomware-as-a-service as there aren't any known affiliates of BlackSuit. Of course, that might change in the future - but it's possible that the malicious hackers behind BlackSuit are happy keeping their weapon (and the profits it generates) to themselves. How will I know that my organisation has been hit by BlackSuit? BlackSuit encrypts files on your Linux and Windows systems and appends a \".blacksuit\" extension to affected files. It also changes your desktop wallpaper, and drops a ransom note (named \"README.BlackSuit.txt\". Should I pay the ransom? That's the six million dollar question. Or should that be the 139 Bitcoins question? :) It's true to say that paying ransoms encourages ransomware attackers. If no organisations ever paid up, there would not be ransomware attacks. So, paying the malicious people attempting to extort your company is deeply unattractive. However, not paying is not an easy decision for any victim to make. Even if they have a secure, unencrypted backup of their important data to rebuild their systems from, they will still have to handle the possible fall-out when sensitive information about their business, their employees, their suppliers, and their customers is released into the public domain by the criminals. The repercussions of a data leak are not just potentially legal, but a company's public image and brand reputation may be seriously tarnished by hackers that publish exfiltrated data. Ultimately, there is no good decision - only a choice between two unpleasant options. So, what action should I take right now? The best thing to do is to ensure that you have hardened defences in place before a ransomware attack, to reduce the chances of it succeeding and limiting any potential impact on your business. The FBI and CISA have published mitigation guidance and a range of IOCs for both the Royal and BlackSuit ransomware families. In addition, it would be wise to follow our recommendations on how to protect your organisation from other ransomware. Those include: making secure offsite backups. running up-to-date security solutions and ensuring that your computers are protected with the latest security patches against vulnerabilities. Restrict an attacker's ability to spread laterally through your organisation via network segmentation. using hard-to-crack unique passwords to protect sensitive data and accounts, as well as enabling multi-factor authentication. encrypting sensitive data wherever possible. reducing the attack surface by disabling functionality that your company does not need. educating and informing staff about the risks and methods used by cybercriminals to launch attacks and steal data. Stay safe, and don't allow your organisation to be the next victim to fall foul of the BlackSuit ransomware group. Editor’s Note: The opinions expressed in this guest author article are solely those of the contributor, and do not necessarily reflect those of Tripwire.

This Cyber News was published on www.tripwire.com. Publication date: Thu, 07 Dec 2023 17:13:38 +0000


Cyber News related to BlackSuit ransomware - what you need to know

BlackSuit ransomware - what you need to know - What's going on? A cybercriminal group calling itself BlackSuit has claimed responsibility for a series of ransomware attacks, including breaches at schools in central Georgia. And earlier in the year, a zoo in Tampa Bay was targeted by the same ...
6 months ago Tripwire.com
BlackSuit ransomware gang claims attack on KADOKAWA corporation - The BlackSuit ransomware gang claimed a recent cyberattack on KADOKAWA corporation and is now threatening to publish stolen data if a ransom is not paid. KADOKAWA is a Japanese media conglomerate that operates numerous companies in film, publishing, ...
5 days ago Bleepingcomputer.com
BlackSuit ransomware gang claims attack on KADOKAWA corporation - The BlackSuit ransomware gang claimed a recent cyberattack on KADOKAWA corporation and is now threatening to publish stolen data if a ransom is not paid. KADOKAWA is a Japanese media conglomerate that operates numerous companies in film, publishing, ...
5 days ago Bleepingcomputer.com
Royal ransomware may soon rebrand, BlackSuit links confirmed The Register - The FBI and the US govt's Cybersecurity and Infrastructure Security Agency have released fresh guidance on the Royal ransomware operation, saying that evidence suggests it may soon undergo a long-speculated rebrand. The agencies didn't specify a ...
7 months ago Theregister.com
FBI: Royal ransomware asked 350 victims to pay $275 million - The FBI and CISA revealed in a joint advisory that the Royal ransomware gang has breached the networks of at least 350 organizations worldwide since September 2022. In an update to the original advisory published in March with additional information ...
7 months ago Bleepingcomputer.com
What is Word Unscrambler In Gaming? - Are you tired of getting stuck on those tricky word puzzles in your favourite mobile game? Have you ever wished for a tool to help unscramble those seemingly impossible words? Look no further because the word unscrambler is here to save the day! This ...
1 year ago Hackread.com
CDK Global says all dealers will be back online by Thursday - CDK Global says that its dealer management system, impacted by a massive IT outage following a June 18th ransomware attack, will be back online by Thursday for all car dealerships. The company is also working on restoring access to other affected ...
1 day ago Bleepingcomputer.com
Hive Ransomware: A Detailed Analysis - This past week, on January 26th, to be exact, the FBI successfully shut down the Hive ransomware group and saved victims over a hundred million dollars in ransom payments and remediation costs. As ransomware continues to be a national security threat ...
1 year ago Heimdalsecurity.com
The dark side of Optimize Mac Storage: What you need to know if you rely on it - During the course of the past few days, it's become clear to me that there is a serious architectural problem with how Apple manages files on the Mac with iCloud, and that design flaw can lead to extensive data loss. If you have more data in your ...
1 year ago Zdnet.com
How to Set Up a VLAN in 12 Steps: Creation & Configuration - Each VLAN configuration process will look a little different, depending on the specifications you bring to the table, and some of these steps - particularly steps five through eight - may be completed simultaneously, in a slightly different order, or ...
6 months ago Esecurityplanet.com
Medusa Ransomware Turning Your Files into Stone - Unit 42 Threat Intelligence analysts have noticed an escalation in Medusa ransomware activities and a shift in tactics toward extortion, characterized by the introduction in early 2023 of their dedicated leak site called the Medusa Blog. The Unit 42 ...
5 months ago Unit42.paloaltonetworks.com
How to lock a file or folder in MacOS Finder - Of course, when you have those types of sensitive documents, you'd want them stored more securely than within a locked file. If the files are less sensitive yet you still don't want anyone monkeying with them, MacOS Finder has a feature that can help ...
5 months ago Zdnet.com
VMware vCenter RCE Vulnerability: What You Need to Know - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
5 days ago Securityboulevard.com
Ransomware Roundup - The Ransomware Roundup report aims to provide readers with brief insights into the evolving ransomware landscape and the Fortinet solutions that protect against those variants. This edition of the Ransomware Roundup covers the 8base ransomware. 8base ...
6 months ago Feeds.fortinet.com
The Top 10 Ransomware Groups of 2023 - This article takes an in-depth look at the rise in ransomware attacks over the past year and the criminal groups driving the surge in cyber extortion. LockBit has established itself as one of the most notorious ransomware operations since emerging on ...
5 months ago Securityboulevard.com
Should I get CISSP Certified? - CISSP's reputation as a certification is for being 'a mile wide and an inch deep'. That's a limitation too - CISSP means you understand something, but not that you know how to do it. But the exam is a six-hour marathon consisting of a vast array of ...
4 months ago Securityboulevard.com
What is Lockbit Ransomware? The Most Essential Things You Need to Know - Lockbit ransomware is one of the latest malware threats to hit the cybersecurity world. It has been seen in several major ransomware attacks, including the attack on the software maker Nuance Communications. Lockbit is a particularly dangerous strain ...
1 year ago Tripwire.com
5 Types of Crypto You Didn't Know Existed - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
3 months ago Hackread.com
How to Protect Your Business from Ransomware Attacks – Insights from a KFC & Pizza Hut Attack in the UK - This summer, ransomware attackers successfully hacked into the computer systems of KFC and Pizza hut stores in the UK. ...
1 year ago Bitdefender.com
Cyber Security Managed Services 101 - Benefits of an MSP. Maximizing efficiency. Cyber threats and cyberattacks like ransomware targeting SMBs continue to increase in part because malicious actors realize these organizations don't have the means or manpower for security teams. Even ...
1 year ago Trendmicro.com
Ransomware trends and recovery strategies companies should know - Ransomware attacks can have severe consequences, causing financial losses, reputational damage, and operational disruptions. The methods used to deliver ransomware vary, including phishing emails, malicious websites, and exploiting vulnerabilities in ...
6 months ago Helpnetsecurity.com
The Evolving Landscape of Ransomware Attacks - 1.7 million ransomware attacks are happening every day. Many people think the virus has locked their computer, but it is actually the ransomware that has locked all their files. As the name ransomware suggests they are after ransom. Stealing or ...
6 months ago Cyberdefensemagazine.com
Scattered Spider: Evolving & Resilient Group Proves Need for Constant Defender Vigilance - Advertising presented to you on this service can be based on limited data, such as the website or app you are using, your non-precise location, your device type or which content you are interacting with. Information about your activity on this ...
6 days ago Securityboulevard.com
Spider-Man 2 Developer Insomniac Games Hit by Rhysida Ransomware - Cookies, device or similar online identifiers together with other information can be stored or read on your device to recognise it each time it connects to an app or to a website, for one or several of the purposes presented here. Advertising ...
6 months ago Hackread.com
China Arrests 4 Who Weaponized ChatGPT for Ransomware Attacks - Cookies, device or similar online identifiers together with other information can be stored or read on your device to recognise it each time it connects to an app or to a website, for one or several of the purposes presented here. Advertising ...
6 months ago Hackread.com

Cyber Trends (last 7 days)


Trending Cyber News (last 7 days)