Researchers link BlackCat Ransomware to Past BlackMatter Malware Activity

ransomware gato negro News

Cybersecurity researchers have uncovered further links between BlackCat (aka AlphaV) and BlackMatter ransomware families, the former of which emerged as a replacement following international scrutiny last year.

“At least some members of the new BlackCat group have links to the BlackMatter group, because they modified and reused a custom exfiltration tool […] and which has only been observed in BlackMatter activity,” Kaspersky researchers said in a new analysis.

The tool, called Fendr by the gang, was not only upgraded to support more file types, but it has also been extensively used by them to steal data from corporate networks between December 2021, and January 2022 before encryption. This is a well-known tactic known as double extortion.

The findings come less than a month after Cisco Talos researchers identified overlaps in the tactics, techniques, and procedures (TTPs) between BlackCat and BlackMatter, describing the new ransomware variant as a case of “vertical business expansion. “

BlackCat Ransomware

BlackCat is notable for two reasons. It’s an affiliate actor who has used BlackMatter previously. The malware it uses in Rust. This indicates how threat actors increasingly turn to cross-compilation languages.

The group “provides infrastructure, malware samples, ransom negotiations, and probably cash-out,” the researchers noted. “Anyone who already has access to compromised environments can use BlackCat’s samples to infect a target. “

Once executed, the malware gets the Windows system’s MachineGuid from the registry — a unique key generated during the installation of the operating system — as well as its UUID, before proceeding to bypass User Account Control (UAC), delete shadow backups, and start the encryption process.

“This use of a modified Fendr, also known as ExMatter, represents a new data point connecting BlackCat with past BlackMatter activity,” the researchers said.

“The modification of this reused tool demonstrates a more sophisticated planning and development regimen for adapting requirements to target environments, characteristic of a maturing criminal enterprise. “

Rate author