BlackCat ransomware could be about to get a whole lot nastier

Conceptual art of a computer system being hacked.
Due hacker ci hanno mostrato quanto sia semplice attaccare le infrastrutture critiche (Image credit: Getty Images)

Following a spate of recent attacks, the notorious BlackCat ransomware could be about to get a whole lot nastier, new research has claimed.

A report from Sophos has said that the threat actors behind the ransomware now appear to have added the Brute Ratel tool to their arsenal, making the tool that much more dangerous.

Brute Ratel is a penetration testing and attack simulation tool, similar but lesser-known that, for example, Cobalt Strike. 

Targeting outdated systems

“What we’re seeing with BlackCat and other attacks recently is that threat actors are very efficient and effective in their work. They use tried and true methods, like attacking vulnerable firewalls and VPNs, because they know these still work. But they show innovation to avoid security defenses, like switching to the newer post-exploitation C2 framework Brute Ratel in their attacks,” said Christopher Budd, senior manager, threat research, Sophos.

Brute Ratel is not the only tool being used, as when analyzing previous incidents, BlackCat was observed using other open-source and commercially available tools to create additional backdoors and other remote access alternatives, such as TeamViewer, or nGrok. Obviously, Cobalt Strike was also used. 

Usually, BlackCat operators would look for outdated firewalls and unpatched VPN services, as their initial point of entry. Since December 2021, they’ve managed to successfully infiltrate at least four organizations, by exploiting vulnerabilities in firewalls. 

Once they obtain network access, they’ll use the firewalls to extract the credentials, and freely move laterally throughout the system. 

BlackCat doesn’t appear to favor any particular victims, with the threat targeting businesses in the US, Europe, and Asia. 

The only pre-requisite for an attack is that the business operates on systems that have reached end-of-life, don’t have multifactor authentication or VPNs, and use flat networks (where every endpoint has visibility into all other endpoints on the network). 

“The common denominator with all these attacks is that they were easy to carry out. In one instance, the same BlackCat attackers installed cryptominers a month before launching the ransomware. This latest research highlights how important it is to follow established best security practices; they still have a lot of power to prevent and thwart attacks, including multiple attacks against a single network.”

Sead is a seasoned freelance journalist based in Sarajevo, Bosnia and Herzegovina. He writes about IT (cloud, IoT, 5G, VPN) and cybersecurity (ransomware, data breaches, laws and regulations). In his career, spanning more than a decade, he’s written for numerous media outlets, including Al Jazeera Balkans. He’s also held several modules on content writing for Represent Communications.

Read more
person at a computer
Infamous ransomware hackers reveal new tool to brute-force VPNs
A laptop with a red screen with a white skull on it with the message: "RANSOMWARE. All your files are encrypted."
More reports claim 2024 was the worst year for ransomware attacks yet
Ransomware attack on a computer
Ransomware attacks surged in 2024 as hackers looked to strike faster than ever
ransomware avast
“Every organization is vulnerable” - ransomware dominates security threats in 2024, so how can your business stay safe?
A person at a laptop with a cybersecure lock symbol floating above it.
Cybercrime gang targets victims with "triple threat" attacks
ransomware avast
Hackers spotted using unsecured webcam to launch cyberattack
Latest in Security
NordProtect logo
Standalone identity theft protection from Nord Security is now available
A man holds a smartphone iPhone screen showing various social media apps including YouTube, TikTok, Facebook, Threads, Instagram and X
Ofcom cracks down on UK tech firms, will issue sanctions for illegal content
3d rendering of a submarine power cable on the seabed
Subsea internet cables can now ‘listen’ for sabotage using irregular pulses of light
Dark Web monitoring
A worrying critical security flaw in Apache Tomcat could let hackers take over servers with ease
A graphic showing someone on a tablet working through a supply chain.
Security issue in open source software leaves businesses concerned for systems
ransomware avast
One of the most powerful ransomware hacks around has been cracked using some serious GPU power
Latest in News
A woman sitting in a chair looking at a Windows 11 laptop
Microsoft is supercharging Windows 11’s voice commands on Copilot+ PCs with Snapdragon CPUs, and fine-tuning a few Recall features
MacBook Air M4
Apple's rumored foldable iPad tipped to launch sooner than expected with an exciting software twist
A phone displaying the Google Messages logo
Google Messages could finally be getting this WhatsApp-style group chat feature
The Future Games Show Spring Showcase
The Future Games Show returns this week for its Spring Showcase, here's how to watch and what games to expect
NordProtect logo
Standalone identity theft protection from Nord Security is now available
A man holds a smartphone iPhone screen showing various social media apps including YouTube, TikTok, Facebook, Threads, Instagram and X
Ofcom cracks down on UK tech firms, will issue sanctions for illegal content