BlackSuit ransomware represents the latest evolution of the notorious Royal ransomware family, marking a significant shift in the threat landscape. Identified and confirmed by the FBI and CISA in a joint Cybersecurity Advisory (CSA) updated as recently as July 2024, BlackSuit inherits Royal's core functionalities while demonstrating enhanced capabilities. This article, written from the perspective of a security advisor, provides a technical deep dive into BlackSuit, covering its origins, tactics, targets, attack campaigns, and crucial defense strategies for security professionals. The information herein is based upon recent threat intelligence and incident response efforts.
Royal ransomware first emerged in early 2022, initially utilizing third-party ransomware like BlackCat before developing its own custom-built version. By September 2022, it was considered one of the most prolific ransomware strains, surpassing even Lockbit in activity. The group behind Royal was suspected to be composed of experienced actors, possibly former members of other ransomware groups like Conti, due to observed similarities in ransom notes, attack methodologies, and even decision-making factors in the encryption process.
The transition from Royal to BlackSuit occurred around July 2023. The FBI and CISA's updated advisory confirms that BlackSuit is not merely a rebrand; it's a direct evolution, sharing significant code similarities with Royal. This suggests a deliberate effort to refine existing capabilities, potentially to evade detection mechanisms that had become effective against Royal. While a direct link to Conti has never been definitively proven, the shared characteristics point to a lineage of experienced cybercriminals adapting to the evolving threat landscape. One must understand the evolving threat.
BlackSuit, like its predecessor Royal, operates on a double extortion model: data exfiltration followed by encryption. This section details BlackSuit's Tactics, Techniques, and Procedures (TTPs) based on the MITRE ATT&CK framework (v15) as described in the FBI/CISA advisory, augmented by additional research into Royal.
Initial Access:
Phishing: The most prevalent initial access vector. This includes malicious attachments (often PDFs) and links to malicious websites (malvertising) embedded in emails. To prevent this, consider implementing email authentication.
Remote Desktop Protocol (RDP) Compromise: The second most common vector, accounting for a significant portion of incidents (around 13.3%). This often involves brute-forcing or using stolen RDP credentials.
Public-Facing Application Exploitation: Exploiting vulnerabilities in internet-facing applications.
Initial Access Brokers: BlackSuit actors may leverage initial access brokers to gain initial access. Source traffic has been seen by harvesting VPN credentials from stealer logs. A VPN kill switch can mitigate this risk.
Command and Control (C2):
After gaining access, BlackSuit actors communicate with C2 infrastructure to download additional tools.
Legitimate Windows software is repurposed (e.g., for lateral movement), and open-source projects are used.
Historically, Royal actors have leveraged Chisel, SSH clients (PuTTY, OpenSSH), and MobaXterm to communicate with C2.
Lateral Movement and Persistence:
Lateral Movement: BlackSuit actors, like Royal actors before them, utilize RDP, PsExec and SMB for lateral movement within the compromised network.
Persistence: BlackSuit actors use legitimate remote monitoring and management (RMM) software for maintaining persistence. What are RMM tools?
Additional Malware: Use SystemBC and Gootloader to load addition tools and maintain persistence.
Discovery and Credential Access:
Network Enumeration: BlackSuit actors use tools like SharpShares and SoftPerfect NetWorx for network discovery.
Credential Access: Tools like Mimikatz and password harvesting tools from Nirsoft are often found on compromised systems.
Process Killing: PowerTool and GMER are used to kill system processes.
Exfiltration:
Exfiltration Tools: Legitimate penetration testing tools (e.g., Cobalt Strike) and malware derivatives (e.g., Ursnif/Gozi) are used for aggregating and exfiltrating data. A SIEM can detect this unusual activity.
Hop Point: First hop in exfiltration is usually a U.S. IP address.
Additional Tools BlackSuit actors have used RClone and Brute Ratel for exfiltration. Consider understanding the IOC.
Encryption:
Partial Encryption: BlackSuit utilizes a unique partial encryption approach for speed and evasion. It can encrypt a specific percentage of a file, making detection more challenging.
Windows Restart Manager: Uses the Windows Restart Manager to check if files are in use, similar to Conti, Babuk, and LockBit.
Shadow Copy Deletion: Deletes shadow copies using vssadmin.exe
to prevent easy recovery.
Batch Scripts: Uses batch files to create new administrator users, force group policy updates, set registry keys for auto-extraction, execute the ransomware, monitor the encryption process, and delete event logs.
File Extensions: Encrypted files receive a specific extension (e.g., .royal
for older Royal infections, and a specific extension for BlackSuit – check the latest IOCs).
Malicious File Locations: Malicious files are found in C:\Temp\
, C:\Users\<user>\AppData\Roaming\
, C:\ProgramData\
, and C:\
.
BlackSuit, continuing Royal's trend, exhibits a broad target profile with a particular focus on critical infrastructure. This includes, but is not limited to:
Critical Manufacturing: Disrupting production lines and supply chains.
Healthcare and Public Health: Targeting hospitals, clinics, and public health organizations, potentially endangering patient care.
Commercial Facilities: Impacting businesses and services.
Government Facilities: Targeting government agencies and services.
Education: Targeting schools and universities.
Geographically, while many victims are located in the United States, attacks have a global reach. The financial motivations are clear, with ransom demands typically ranging from $1 million to $10 million USD, paid in Bitcoin. However, total demands have reportedly exceeded $500 million, with single demands reaching as high as $60 million, though the actors are known to negotiate. The targeting of critical infrastructure suggests a willingness to cause significant disruption, potentially beyond purely financial motives. One recent incident was a cybersecurity lapse.
Several significant attack campaigns have been attributed to Royal/BlackSuit:
City of Dallas (May 2023): A high-profile attack attributed to Royal, resulting in significant disruption and recovery costs exceeding $8.5 million.
Silverstone Formula One (Late 2022): Another notable Royal attack, demonstrating the group's global reach.
US Schools and Colleges: BlackSuit has been found targeting schools, colleges and large prominent companies.
Numerous Critical Infrastructure Targets (2023-2024): The FBI/CISA advisory highlights ongoing BlackSuit activity targeting critical infrastructure, underscoring the continued threat.
More recent campaigns (post-July 2023) are specifically attributed to BlackSuit, demonstrating the continued and evolved threat. Details of specific campaigns are often not publicly disclosed, but the ongoing FBI/CISA advisories confirm continued activity.
Combating BlackSuit ransomware requires a multi-layered defense strategy, combining proactive prevention, robust detection, and rapid incident response. Generic defense strategies, while important, must be tailored to address BlackSuit's specific TTPs. A proper vulnerability assessment is vital.
Phishing Prevention:
User Training: Implement comprehensive security awareness training to educate users about phishing techniques, including identifying malicious emails, attachments, and links.
Email Security Gateways: Deploy robust email security gateways with advanced threat detection capabilities, including sandboxing and URL filtering.
Email Authentication: Implement SPF, DKIM, and DMARC to prevent email spoofing. What is SPF?
RDP Security:
Disable RDP if Not Needed: If RDP is not essential, disable it entirely.
Strong Passwords and MFA: Enforce strong, unique passwords for all RDP accounts and mandate multi-factor authentication (MFA), preferably phishing-resistant MFA.
Network Level Authentication (NLA): Enable NLA to require authentication before an RDP session is established.
Account Lockout Policies: Implement strict account lockout policies to prevent brute-force attacks.
Restrict Access: Limit RDP access to specific IP addresses or networks using firewall rules.
Vulnerability Management:
Regular Scanning: Conduct regular vulnerability scans to identify and prioritize vulnerabilities, especially in public-facing applications.
Patching: Implement a robust patch management process, prioritizing the patching of known exploited vulnerabilities (KEVs).
Network Segmentation:
Isolate Critical Systems: Segment the network to limit the lateral movement of attackers. Isolate critical systems and data from less critical parts of the network.
Endpoint Detection and Response (EDR):
Deploy EDR: Deploy an EDR solution on all endpoints to monitor for malicious activity, including ransomware behavior.
Behavioral Analysis: Configure EDR to detect and block anomalous behavior, such as unusual file encryption activity or attempts to delete shadow copies.
Active Directory Security:
Principle of Least Privilege: Enforce the principle of least privilege, granting users only the minimum necessary access rights.
Account Auditing: Regularly audit Active Directory accounts for new or unrecognized accounts and excessive privileges.
Data Backup and Recovery:
Regular Backups: Implement a robust backup and recovery plan, including regular backups of critical data.
Offline Backups: Store backups offline and offsite, preferably encrypted and immutable, to protect them from ransomware attacks.
Test Backups: Regularly test the backup and recovery process to ensure its effectiveness.
Incident Response Plan:
Develop and Test: Develop and regularly test an incident response plan specifically for ransomware attacks. Why do you need a CIRP?
Containment and Eradication: The plan should include procedures for containing the spread of ransomware, eradicating the malware, and recovering data.
Disable Macros:
Disable by Default: Disable macros by default for Microsoft Office applications, permitting them only for trusted sources.
Disable Command-Line and Scripting Activities:
Restrict the use of command-line interfaces and scripting languages to authorized users and specific use cases.
Time-Based Access:
Implement time-based or just-in-time (JIT) access to resources, especially for privileged accounts.
Disable Hyperlinks in Emails
Disable hyperlinks in received emails to prevent users from clicking on potentially dangerous links.
Software Manufacturer Responsibility: Software manufacturers must embed security into the Software Development Life Cycle and enforce MFA.
BlackSuit ransomware represents a significant and evolving threat, building upon the foundation laid by Royal. Its focus on critical infrastructure, coupled with sophisticated TTPs and high ransom demands, makes it a formidable adversary. Organizations must adopt a proactive, multi-layered defense strategy, combining robust prevention measures, advanced detection capabilities, and a well-defined incident response plan. Staying informed about the latest TTPs and IOCs, as provided by sources like the FBI/CISA advisories, is crucial for maintaining a strong security posture against BlackSuit and other advanced ransomware threats. Continuous vigilance and adaptation are essential in the ongoing battle against ransomware. Automating threat detection can assist.
Found this article interesting? Keep visit thesecmaster.com, and our social media page on Facebook, LinkedIn, Twitter, Telegram, Tumblr, Medium, and Instagram and subscribe to receive tips like this.
You may also like these articles:
• Russian Ransomware Hackers Exploit Microsoft Teams as Fake Tech Support Scam
• Ransomware Payments Drop 35% in 2024 as Law Enforcement Disrupts Cybercrime
• International Cybercrime Takedown: Four European Hackers Arrested in Phuket Ransomware Operation
Arun KL is a cybersecurity professional with 15+ years of experience in IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.
“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”
"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.
BurpGPT is a cutting-edge Burp Suite extension that harnesses the power of OpenAI's language models to revolutionize web application security testing. With customizable prompts and advanced AI capabilities, BurpGPT enables security professionals to uncover bespoke vulnerabilities, streamline assessments, and stay ahead of evolving threats.
PentestGPT, developed by Gelei Deng and team, revolutionizes penetration testing by harnessing AI power. Leveraging OpenAI's GPT-4, it automates and streamlines the process, making it efficient and accessible. With advanced features and interactive guidance, PentestGPT empowers testers to identify vulnerabilities effectively, representing a significant leap in cybersecurity.
Tenable BurpGPT is a powerful Burp Suite extension that leverages OpenAI's advanced language models to analyze HTTP traffic and identify potential security risks. By automating vulnerability detection and providing AI-generated insights, BurpGPT dramatically reduces manual testing efforts for security researchers, developers, and pentesters.
Microsoft Security Copilot is a revolutionary AI-powered security solution that empowers cybersecurity professionals to identify and address potential breaches effectively. By harnessing advanced technologies like OpenAI's GPT-4 and Microsoft's extensive threat intelligence, Security Copilot streamlines threat detection and response, enabling defenders to operate at machine speed and scale.