Cyber Intelligence

Linkedin
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map
Reading: BlackCat sharpens its claws
Share
Cyber IntelligenceCyber Intelligence
Aa
  • News
  • Analysis
  • Expert Opinions
  • Resources
Search
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map

Cyber Intelligence

Linkedin
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map
Reading: BlackCat sharpens its claws
Share
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
LockBitCybercrimeNews

BlackCat sharpens its claws

John Wilkes
August 21, 2023 at 12:15 PM
By John Wilkes John Wilkes
Share
SHARE

The new version of BlackCat ransomware, initially observed by IBM in May, is now reported to be causing chaos worldwide via a previously undiscovered built-in failsafe delivery system.

Microsoft Threat Intelligence discovered that the BlackCat ransomware now being used in recent ransomware attacks is based on the open-source communication tool Impacket, which can be used to spread the ransomware by remote execution. 

Cybersecurity firm Coalfire reports that the ALPHV/BlackCat ransomware gang has been causing mayhem over the past year. In August alone, ALPHV/BlackCat attacked at least four companies. They are understood to have leaked sensitive data about employees and corporate assets from each one. Coalfire suspects that the leaders of BlackCat are affiliated with the top ransomware gang, the infamous LockBit.

To protect themselves in the face of this ongoing cyber onslaught, all companies can do is tighten security where suspicious and unauthorized access is concerned while patching non-watertight systems. Realistically, all organizations should accept the relative inevitability of a successful ransomware attack and have what the cybersecurity industry calls the ‘Doomsday Plan’ ready in advance to reduce damage and ensure a speedy recovery of confidential data.

The innovatory and professional skills now being used by gangs such as LockBit and ALPHV/BlackCat are tough to tackle for even the best-resourced and tech-savvy organizations; note the recent successful hacking of Microsoft cloud service, One Drive. But for most firms, complete security is only a pipe dream when a successful breach can result from a single staff member opening a weaponized link in a well-camouflaged email to downloading a dodgy app on their smartphone. Or, as in the case of ALPHV/BlackCat, the criminals are one step ahead and spotting an unlocked back door.

The ALPHV/BlackCat gang also knows how to play dirty to get what it wants. It has recently adopted a strategy of gradually exposing leaks to facilitate ransom payments from reluctant or law-abiding victims. The process is executed by an application programming interface, which enables different applications to communicate the leaks to each other.

But it is the potential involvement of ransomware giant LockBit that truly heralds a looming ransomware storm. The LockBit ransomware group is a rapidly expanding organization run along corporate lines and believed to be responsible for roughly a third of all successful ransomware attacks worldwide. The new version of BlackCat could help LockBit grow its market share considerably while taking ALPHV/BlackCat along for the ride.

TAGGED: cybercrime, Ransomware, blackcat, lockbit, ibm, microsoft threat intelligence, coalfire
Share This Article
Twitter LinkedIn Email Copy Link Print
Previous Article The Daily Decrypt - One Minute Roundup Weak cyber M&A activity shows significant slowdown – August 21st
Next Article LinkedIn accounts held for ransom in ongoing campaign
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Editor's Pick

You Might Also Like

NewsSpyware

Spyware poses a growing threat

“Lurking in the murky depths of the global marketplace for offensive cyber capabilities sits a particularly dangerous capability—spyware,” warns the Atlantic Council, a Washington, DC-based organization that promotes transatlantic cooperation and global economic prosperity. The number of US-based entities investing in the spyware market is three times greater than in the next three-highest countries with the most investors, according to a report published by the Atlantic Council on September 10: Mythical Beasts: Diving into the depths of the global spyware market.

September 12, 2025
CybergangsNews

Teenage hackers take down JLR

Carmaker Jaguar Land Rover (JLR) has shut down its systems after suffering a cyber-attack. The group claiming responsibility for the attack, The Com, also referred to as Scattered Spider, is a loosely affiliated online community of predominantly teenage English-speaking hackers based in the UK and the US.

September 5, 2025
Cyber EspionageGovernmentGeopoliticsNews

Over half of cyber-attacks are state-sponsored

Over half of cyber-attacks exploiting known vulnerabilities are the work of state-sponsored groups from abroad, mainly from China. According to cybersecurity company Recorded Future’s research arm, Insikt Group, 53 percent of observed exploitation activity in the first half of this year was driven by state-sponsored and suspected state-sponsored actors and conducted for espionage, surveillance, or other geopolitical objectives.

September 2, 2025
ChinaCyber EspionageSurveillanceSpywareNews

China is now spying on you

The Chinese government now has a vast storehouse of confidential information belonging to key industries and individuals in the US and UK and many other countries. According to an urgent joint cybersecurity advisory issued by the US National Security Agency (NSA) and other U.S. and foreign organizations, threat actors sponsored by the Chinese government, notably Salt Typhoon, have been consistently targeting telecommunications, government, transportation, lodging, and military infrastructure networks globally.

August 29, 2025

Cyber Intelligence

We provide in-depth analysis, breaking news, and interviews with some of the leading minds in cybersecurity and distill critical insights that matter to our readers. Daily.

Linkedin

Category

  • Cybercrime
  • News

Quick Links

  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map

© 2023 Cyberintel.media

Welcome Back!

Sign in to your account

Lost your password?