Cyber Intelligence

Linkedin
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map
Reading: BlackCat sharpens its claws
Share
Cyber IntelligenceCyber Intelligence
Aa
  • News
  • Analysis
  • Expert Opinions
  • Resources
Search
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map

Cyber Intelligence

Linkedin
  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map
Reading: BlackCat sharpens its claws
Share
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
CybercrimeLockBitNews

BlackCat sharpens its claws

John Wilkes
August 21, 2023 at 12:15 PM
By John Wilkes John Wilkes
Share
SHARE

The new version of BlackCat ransomware, initially observed by IBM in May, is now reported to be causing chaos worldwide via a previously undiscovered built-in failsafe delivery system.

Microsoft Threat Intelligence discovered that the BlackCat ransomware now being used in recent ransomware attacks is based on the open-source communication tool Impacket, which can be used to spread the ransomware by remote execution. 

Cybersecurity firm Coalfire reports that the ALPHV/BlackCat ransomware gang has been causing mayhem over the past year. In August alone, ALPHV/BlackCat attacked at least four companies. They are understood to have leaked sensitive data about employees and corporate assets from each one. Coalfire suspects that the leaders of BlackCat are affiliated with the top ransomware gang, the infamous LockBit.

To protect themselves in the face of this ongoing cyber onslaught, all companies can do is tighten security where suspicious and unauthorized access is concerned while patching non-watertight systems. Realistically, all organizations should accept the relative inevitability of a successful ransomware attack and have what the cybersecurity industry calls the ‘Doomsday Plan’ ready in advance to reduce damage and ensure a speedy recovery of confidential data.

The innovatory and professional skills now being used by gangs such as LockBit and ALPHV/BlackCat are tough to tackle for even the best-resourced and tech-savvy organizations; note the recent successful hacking of Microsoft cloud service, One Drive. But for most firms, complete security is only a pipe dream when a successful breach can result from a single staff member opening a weaponized link in a well-camouflaged email to downloading a dodgy app on their smartphone. Or, as in the case of ALPHV/BlackCat, the criminals are one step ahead and spotting an unlocked back door.

The ALPHV/BlackCat gang also knows how to play dirty to get what it wants. It has recently adopted a strategy of gradually exposing leaks to facilitate ransom payments from reluctant or law-abiding victims. The process is executed by an application programming interface, which enables different applications to communicate the leaks to each other.

But it is the potential involvement of ransomware giant LockBit that truly heralds a looming ransomware storm. The LockBit ransomware group is a rapidly expanding organization run along corporate lines and believed to be responsible for roughly a third of all successful ransomware attacks worldwide. The new version of BlackCat could help LockBit grow its market share considerably while taking ALPHV/BlackCat along for the ride.

TAGGED: blackcat, coalfire, cybercrime, ibm, lockbit, microsoft threat intelligence, Ransomware
John Wilkes September 18, 2023 August 21, 2023
Share This Article
Twitter LinkedIn Email Copy Link Print
Previous Article The Daily Decrypt - One Minute Roundup Weak cyber M&A activity shows significant slowdown – August 21st
Next Article LinkedIn accounts held for ransom in ongoing campaign
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Editor's Pick

You Might Also Like

CryptocurrencyNewsNorth Korea

Bogus IT workers are defrauding US businesses

The US government has seized over $7.74 million in illegal funds, allegedly siphoned off by illegitimate North Korean Information Technology (IT) workers for the benefit of the North Korean government. The US Department of Justice (DOJ) has filed a civil forfeiture complaint alleging that the IT workers secured employment in the US illegally, racking up millions of dollars in cryptocurrency and bypassing US sanctions placed against North Korea. According to the US Federal Bureau of Investigation (FBI), the use of North Korean IT workers to defraud the US is now taking place on a massive scale.

June 13, 2025
NewsOne Minute RoundupOne Minute Roundup

UK backs AI and intelligence modernization – June 12th

The UK government has announced its plans to invest in digital and artificial intelligence (AI) in public services, including the NHS, aiming to build strong technology foundations and tackle urgent cybersecurity risks.

June 12, 2025
NewsOne Minute RoundupOne Minute Roundup

Cyera secures $540 million in funding – June 11th

Cybersecurity firm Cyera has raised $540 million in a Series E funding round, bringing its total to over $1.3 billion. Cyera’s valuation has surged to $6 billion in six months, reporting a 353 percent year-over-year growth. 

June 11, 2025
One Minute RoundupOne Minute Roundup

Honeywell kicks off AI tools to accelerate industrial autonomy – June 10th

Honeywell has debuted a series of AI-powered tools that intend to boost industrial autonomy, introducing a suite of AI cybersecurity solutions designed to ramp up Operation Technology defenses against the ever-evolving cyberthreat landscape.

June 10, 2025

Cyber Intelligence

We provide in-depth analysis, breaking news, and interviews with some of the leading minds in cybersecurity and distill critical insights that matter to our readers. Daily.

Linkedin

Category

  • Cybercrime
  • News

Quick Links

  • News
    • Aerospace
    • Apple
    • Arrest
    • Automotive
    • Big Tech
    • Breaking News
    • Business Email Compromise
    • China
    • Chip Technology
    • Cryptocurrency
    • Cyber Budget
    • Cyber Espionage
    • Cyber M&A
    • cybercrime
    • Data Leak
    • deepfake
    • Energy Sector
    • Ethiopia
    • Finance
    • France
    • Geopolitics
    • Government
    • Hacktivism
    • Healthcare
    • Human Error
    • Investment Scam
    • Iran
    • Israel Conflict
    • Malicious Bots
    • Malware
    • North Korea
    • Norton
    • One Minute Roundup
    • ransomware
    • SEC
    • SMB
    • Social Media
    • Sri Lanka
    • Taiwan
    • VPN
    • Wire Fraud
    • Workforce Cyber
  • Analysis
  • Expert Opinions
  • Resources
    • Conferences
    • Glossary of terms
    • Awards
    • Ecosystem map

© 2023 Cyberintel.media

Welcome Back!

Sign in to your account

Lost your password?