

Rewterz Threat Alert – Nanocore Rat – Active IOCs
August 16, 2022
Rewterz Threat Advisory – CVE-2022-36010 – Node.js react-editable-json-tree module Vulnerability
August 16, 2022
Rewterz Threat Alert – Nanocore Rat – Active IOCs
August 16, 2022
Rewterz Threat Advisory – CVE-2022-36010 – Node.js react-editable-json-tree module Vulnerability
August 16, 2022Severity
High
Analysis Summary
BlackCat – aka AlphaVM & AlphaV – is a Ransomware family that is deployed as a part of a Ransomware as a Service (RaaS). It is written in the Rust programming language and can run on Windows, Linux-based operating systems (Debian, Ubuntu, ReadyNAS, Synology), and VMWare ESXi.
This ransomware first appeared in November 2021. The majority of the group’s victims have been in the United States, although BlackCat and its associates have also targeted organizations in Europe, the Philippines, and other regions. Construction and engineering, retail, transportation, commercial services, insurance, machinery, professional services, telecommunication, auto components, and medicines are among the targeted sectors of BlackCat ransomware. This ransomware can be set to encrypt files using either the AES or ChaCha20 algorithms. It can destroy volume shadow copies, terminate programs and services, and stop virtual machines on ESXi servers to maximize the quantity of ransomed data.
Researchers have seen a notable rise in the amount demanded as ransom by this Blackcat ransomware group. This ransomware group competes with other renowned ransomware such as Conti and Lockbit 3.0. They included a sophisticated search feature using stolen victim passwords, and private documents exposed on the TOR network.
Impact
- File Encryption
- Data Theft
Indicators Of Compromise
MD5
- 7c3c0c14519ceaee73b3022b71dce22d
SHA-256
- 58f4d90df440bbca9c3aa650b317c7f3d25f1cf5ec4b508c2707cc0433f28892
SHA-1
- 920085f019041ca11e026c813e871e27c7d40dce
Remediation
- Block all threat indicators at your respective controls.
- Search for Indicator of compromise (IOCs) in your environment utilizing your respective security controls
- Maintain cyber hygiene by updating your anti-virus software and implement patch management lifecycle.
- Maintain Offline Backups – In a ransomware attack, the adversary will often delete or encrypt backups if they have access to them. That’s why it’s important to keep offline (preferably off-site), encrypted backups of data and test them regularly.
- Emails from unknown senders should always be treated with caution.
- Never trust or open ” links and attachments received from unknown sources/senders.