top of page

BlackMatter Ransomware

  • Nov 15, 2021
  • 2 min read


BlackMatter Screenshot


Ransomware-as-a-service (RaaS) means that any individual or entity can use the services to carry out ransomware attacks, including former employees or an existing disgruntled employee or even competitors.


First seen in July 2021, BlackMatter is ransomware-as-a-service (Raas) tool that allows the ransomware’s developers to profit from cybercriminal affiliates (i.e. BlackMatter actors) who deploy it against victims. It is a ransomware-as-a-service available on the darkweb. It does have political overtones where Black-lives-matter is shortened.BlackMatter is a possible rebrand of DarkSide, a RaaS which was active from September 2020 through May 2021. BlackMatter actors have attacked numerous U.S.-based organizations and have demanded ransom payments ranging from $80,000 to $15,000,000 in Bitcoin and Monero. BalckMatter Ransomeware uses the best of (dirty) practices used by predecessor Rass - DarkSide, REvil, and LockBit RaaS





The services offered by the BlackMatter RaaS are:


  • The victim organisation preferably should be from the United States, Great Britain, Canada or Australia.

  • Organisation dealing in medicine and state institutions are to be avoided.

  • Will not take on networks already attacked by any other ransomware.

  • Victim should have 500 to 15000 host machines

  • Expected revenue $100,000,000+

  • Two different manners of usage of services, buy the service and deploy or BlackMatter will do the deployment.

  • BlackMatter team will check the system after getting the access and confirm the deal.

  • Before start of any work one need to deposit 2 to 4 BTC (bitcoins) about 120K to 250K USD





It has been observed that unlike many Ransomware, BlackMatter does not use Phishing attacks, instead it uses compromised passwords and edge devices vulnerabilities.


Many devices, firmware and software use embedded or hard coded passwords. Sometimes they also have default passwords which a user may not change. The BlackMatter also uses embedded admin or user credentials. BlackMatter then exploits credentials in the LDAP and SMB protocol to discover all hosts in the network. Though BalckMatter presently does not have the capabilities to encrypt the Linux-based machines, therefore instead it simply deletes the complete data and may still demand ransom. Online - Backup may be infected if credentials are compromised.





BlackMatter Negotiation Screen



Mitigation Approach


Following are some of the steps which can be taken to mitigate the BlackMatter threat



  • Isolate infected devices and network segments

  • Implement Detection Signatures

  • Use Strong Passwords

  • Implement Multi-Factor Authentication at least for admin and privileged accounts

  • Patch and Update Systems

  • Limit Access to Resources over the Network

  • Implement Network Segmentation and Traversal Monitoring

  • Use Admin Disabling Tools to Support Identity and Privileged Access Management

    • Implement time-based access for accounts set at the admin level and higher

    • Disable command-line and scripting activities and permissions.

  • Implement and EnforceBackup and Restoration Policies and Procedures

    • Maintain offline backups of data,

    • Ensure all backup data is encrypted, immutable (i.e., cannot be altered or deleted) and covers the entire organization’s data infrastructure.

  • Disable the storage of clear text passwords in LSASS memory

  • Implement Credential Guard for Windows 10 and Server 2016

  • Minimize the AD attack surface to reduce malicious ticket-granting activity

  • Disable or delete all ex-employees and vendors credentials

  • Do not use Admin or privileged password while doing routine work.

  • Log out from Admin or Privileged account as soon as task is completed.




Note: As per latest report, BlackMatter is stopping its Ransomware-as-a-service due to extreme pressure from Law Enforcement Agencies across the world.


Reference: https://us-cert.cisa.gov/ncas/alerts/aa21-291a


Important : If you want Counter-Ransomware-Services ( prior to attack as well as post attack), please contact us.




Commenti


Get Social

  • Grey Twitter Icon
  • Grey LinkedIn Icon
  • Grey YouTube Icon
bottom of page
#google_responsive_slot_preview