{"id":364,"date":"2024-09-25T10:28:48","date_gmt":"2024-09-25T10:28:48","guid":{"rendered":"https:\/\/cybersecurityinfocus.com\/?p=364"},"modified":"2024-09-25T10:28:48","modified_gmt":"2024-09-25T10:28:48","slug":"best-practices-for-preventing-blacksuit-ransomware-infections","status":"publish","type":"post","link":"https:\/\/cybersecurityinfocus.com\/?p=364","title":{"rendered":"Best Practices for Preventing BlackSuit Ransomware Infections"},"content":{"rendered":"<div class=\"elementor elementor-33796\">\n<div class=\"elementor-element elementor-element-ecddde6 e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-9177483 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>Are you confident that your security tools are foolproof? Think again. BlackSuit ransomware is exploiting overlooked vulnerabilities, slipping through defenses even in <\/span><a href=\"https:\/\/www.globalsecuritymag.com\/new-analysis-of-blacksuit-ransomware-group-from-reliaquest.html\"><span>53 well-protected organizations<\/span><\/a><span>. This isn\u2019t just another cyber threat\u2014it\u2019s a sophisticated adversary that rewrites the rules.<\/span><span>\u00a0<\/span><\/p>\n<p><span>Your firewalls, antivirus, and strict protocols might not be enough to stop it. BlackSuit is engineered to find gaps you didn\u2019t know existed, bypassing even advanced security postures. Are you truly prepared for what\u2019s coming?<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-c5dd837 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">What Is Blacksuit Ransomware?<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-f303654 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW48175400 BCX0\"><span class=\"NormalTextRun SpellingErrorV2Themed SCXW48175400 BCX0\">BlackSuit<\/span><span class=\"NormalTextRun SCXW48175400 BCX0\"> ransomware is a type of malware variant designed to encrypt victim system files, <\/span><span class=\"NormalTextRun SCXW48175400 BCX0\">rendering<\/span><span class=\"NormalTextRun SCXW48175400 BCX0\"> critical data breach. The attackers then demand a ransom in exchange for the decryption key, while some threat actors deploy a double extortion model, with ransomware threats of releasing the stolen data to the public if their demands are not met. The ransomware targets <\/span><span class=\"NormalTextRun SCXW48175400 BCX0\">mainly critical<\/span><span class=\"NormalTextRun SCXW48175400 BCX0\"> sectors: <\/span><span class=\"NormalTextRun SCXW48175400 BCX0\"><a href=\"https:\/\/fidelissecurity.com\/industries\/cybersecurity-for-healthcare\/\">H<\/a><\/span><span class=\"NormalTextRun SCXW48175400 BCX0\"><a href=\"https:\/\/fidelissecurity.com\/industries\/cybersecurity-for-healthcare\/\">ealthcare<\/a>, <\/span><span class=\"NormalTextRun SCXW48175400 BCX0\"><a href=\"https:\/\/fidelissecurity.com\/industries\/cybersecurity-for-government\/\">G<\/a><\/span><span class=\"NormalTextRun SCXW48175400 BCX0\"><a href=\"https:\/\/fidelissecurity.com\/industries\/cybersecurity-for-government\/\">overnment<\/a>, <\/span><span class=\"NormalTextRun SCXW48175400 BCX0\">M<\/span><span class=\"NormalTextRun SCXW48175400 BCX0\">anufacturing, <\/span><a href=\"https:\/\/fidelissecurity.com\/industries\/cybersecurity-for-education\/\"><span class=\"NormalTextRun SCXW48175400 BCX0\">E<\/span><span class=\"NormalTextRun SCXW48175400 BCX0\">ducation<\/span><\/a><span class=\"NormalTextRun SCXW48175400 BCX0\">, and <\/span><a href=\"https:\/\/fidelissecurity.com\/industries\/cybersecurity-for-finance\/\"><span class=\"NormalTextRun SCXW48175400 BCX0\">F<\/span><span class=\"NormalTextRun SCXW48175400 BCX0\">inance<\/span><\/a><span class=\"NormalTextRun SCXW48175400 BCX0\">, which has disastrous results in each of the sectors where disruptions have occurred.<\/span><\/span><span class=\"EOP SCXW48175400 BCX0\">\u00a0<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-8fbce57 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Key Recommendations: CISA and FBI&#8217;s Latest Guidance<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-03666ef elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Employ robust backup and recovery processes: Regularly back up data, keeping those backups disconnected from the main network.<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Enhance Segmenting of Networks: Segment the networks into smaller sections in order to contain the spread of ransomware.<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Regularly Update\/Patch Systems: Keep all software and systems current to close vulnerabilities.<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Regular Security Training: Employee training on how to identify phishing attacks, among other common attack vectors.<\/span><\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-28b7fbb elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Is BlackSuit Ransomware a Rebrand of Another Group?<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-5fa9545 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW179747648 BCX0\"><span class=\"NormalTextRun SpellingErrorV2Themed SCXW179747648 BCX0\">BlackSuit<\/span><span class=\"NormalTextRun SCXW179747648 BCX0\"> is believed to be a rebrand of the Royal <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW179747648 BCX0\">blacksuit<\/span><span class=\"NormalTextRun SCXW179747648 BCX0\"> ransomware gang. Rebranding keeps ransomware groups out of the scrutiny of law enforcement agencies and their identity hidden. It also allows them to continue most of their malicious activities without being recognized by cybersecurity defenses so easily.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-a4181ba elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">What Are the Implications of This Rebranding for Cybersecurity Efforts?<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-eca6d22 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>The rebrand to BlackSuit hints at business as usual from the Royal group, for which readaptation of cybersecurity through updates in threat intelligence and monitoring for new indicators of compromise is required.<\/span><span>\u00a0<\/span><\/p>\n<p><span>The Royal ransomware group, operating now as BlackSuit, continued to target healthcare organizations. This ransomware attack encrypted an entire network of a hospital, which had to divert emergency patients to other facilities.<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-eaede34 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">How Blacksuit ransomware is different from other variants?<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-fe633df elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"NormalTextRun SpellingErrorV2Themed SCXW151961859 BCX0\">BlackSuit<\/span><span class=\"NormalTextRun SCXW151961859 BCX0\"> ransomware, while <\/span><span class=\"NormalTextRun AdvancedProofingIssueV2Themed SCXW151961859 BCX0\">similar to<\/span><span class=\"NormalTextRun SCXW151961859 BCX0\"> other examples of ransomware variants in its primary function of encrypting files and demanding a ransom, <\/span><span class=\"NormalTextRun SCXW151961859 BCX0\">exhibits<\/span><span class=\"NormalTextRun SCXW151961859 BCX0\"> several unique characteristics that set it apart:<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-bb8cc15 elementor-widget elementor-widget-Table\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\tFunctionBlacksuit RansomwareOther Variants\t\t\t\t<\/p>\n<p>\t\t\t\t\t1. Intermittent EncryptionEncrypts files in stages, only encrypting a portion at a time.Often encrypt files in a continuous manner.2. Partial EncryptionEncrypts only a part of each file, not the entire content.Typically encrypt the entire file. 3. Dual-Platform TargetingInfects both Windows and Linux systems.Primarily target Windows or Linux systems.4. Similarities to Royal RansomwareClosely related to the Royal ransomware family.May have different familial ties or be completely unrelated. 5. Evasion TechniquesEmploys techniques like intermittent and partial encryption to avoid detection.May use different evasion tactics, such as obfuscation or encryption of malicious code.6. Ransom NegotiationMay offer discounts or extended payment deadlines.May have different negotiation strategies or terms.7. Exfiltration of DataMay <a href=\"https:\/\/fidelissecurity.com\/threatgeek\/data-protection\/data-exfiltration\/\">exfiltrate sensitive data<\/a> in addition to encrypting files. May or may not exfiltrate data.\t\t\t\t<\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-b9a85d7 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">BlackSuit Ransomware Analysis<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-776860f elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"NormalTextRun SCXW45571386 BCX0\">Let\u2019s<\/span><span class=\"NormalTextRun SCXW45571386 BCX0\"> see what <\/span><span class=\"NormalTextRun SCXW45571386 BCX0\">you need to know about this strain to pre<\/span><span class=\"NormalTextRun SCXW45571386 BCX0\">vent cyber attackers from gaining access to <\/span><span class=\"NormalTextRun SCXW45571386 BCX0\">your critical infrastructure.<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-4e33e50 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">How does Blacksuit Ransomeware work?<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-20677e3 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"NormalTextRun SCXW252358610 BCX0\">Here\u2019s<\/span><span class=\"NormalTextRun SCXW252358610 BCX0\"> a breakdown of how <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW252358610 BCX0\">BlackSuit<\/span><span class=\"NormalTextRun SCXW252358610 BCX0\"> ransomware <\/span><span class=\"NormalTextRun SCXW252358610 BCX0\">operates<\/span><span class=\"NormalTextRun SCXW252358610 BCX0\">:<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-d252b61 e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-d9a33be elementor-widget elementor-widget-eael-feature-list\">\n<div class=\"elementor-widget-container\">\n<div class=\"-icon-position-left -tablet-icon-position-left -mobile-icon-position-left\">\n<p>                                            <span class=\"connector\"><\/span><br \/>\n                        <span class=\"connector connector-tablet\"><\/span><br \/>\n                        <span class=\"connector connector-mobile\"><\/span><\/p>\n<div class=\"eael-feature-list-icon-box\">\n<div class=\"eael-feature-list-icon-inner\">\n<p>\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-0\"><\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/p><\/div>\n<\/div>\n<div class=\"eael-feature-list-content-box\">\n<h4 class=\"eael-feature-list-title\">1. Distribution<\/h4>\n<p class=\"eael-feature-list-content\">BlackSuit ransomware spreads through your several channels such as email attachments carrying viruses, torrent sites, ads with malware, and Trojan horses.<\/p>\n<\/div>\n<p>                                            <span class=\"connector\"><\/span><br \/>\n                        <span class=\"connector connector-tablet\"><\/span><br \/>\n                        <span class=\"connector connector-mobile\"><\/span><\/p>\n<div class=\"eael-feature-list-icon-box\">\n<div class=\"eael-feature-list-icon-inner\">\n<p>\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-1\"><\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/p><\/div>\n<\/div>\n<div class=\"eael-feature-list-content-box\">\n<h4 class=\"eael-feature-list-title\">2. Execution<\/h4>\n<p class=\"eael-feature-list-content\">The ransomware starts encrypting your files after it gets into your system. It uses FindFirstFileW() and FindNextFileW() API functions to list all the files and folders on the computer. <\/p>\n<\/div>\n<p>                                            <span class=\"connector\"><\/span><br \/>\n                        <span class=\"connector connector-tablet\"><\/span><br \/>\n                        <span class=\"connector connector-mobile\"><\/span><\/p>\n<div class=\"eael-feature-list-icon-box\">\n<div class=\"eael-feature-list-icon-inner\">\n<p>\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-2\"><\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/p><\/div>\n<\/div>\n<div class=\"eael-feature-list-content-box\">\n<h4 class=\"eael-feature-list-title\">3. Encryption<\/h4>\n<p class=\"eael-feature-list-content\">BlackSuit ransomware encrypts specific file types using a tough encryption method, like the Advanced Encryption Standard (AES). It changes the names of your encrypted files by adding &#8220;.blacksuit&#8221; at the end. <\/p>\n<\/div>\n<p>                                            <span class=\"connector\"><\/span><br \/>\n                        <span class=\"connector connector-tablet\"><\/span><br \/>\n                        <span class=\"connector connector-mobile\"><\/span><\/p>\n<div class=\"eael-feature-list-icon-box\">\n<div class=\"eael-feature-list-icon-inner\">\n<p>\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-3\"><\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/p><\/div>\n<\/div>\n<div class=\"eael-feature-list-content-box\">\n<h4 class=\"eael-feature-list-title\">4. Ransom note<\/h4>\n<p class=\"eael-feature-list-content\">BlackSuit ransomware leaves a ransom note called &#8220;README.BlackSuit.txt&#8221; in every folder it goes through after encrypting your files. This note is how the attackers tell victims to pay money to get the decryption key.<\/p>\n<\/div>\n<p>                                            <span class=\"connector\"><\/span><br \/>\n                        <span class=\"connector connector-tablet\"><\/span><br \/>\n                        <span class=\"connector connector-mobile\"><\/span><\/p>\n<div class=\"eael-feature-list-icon-box\">\n<div class=\"eael-feature-list-icon-inner\">\n<p>\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-4\"><\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/p><\/div>\n<\/div>\n<div class=\"eael-feature-list-content-box\">\n<h4 class=\"eael-feature-list-title\">5. Desktop wallpaper change<\/h4>\n<p class=\"eael-feature-list-content\">BlackSuit ransomware also changes the infected computer&#8217;s desktop background showing a message or picture about the ransomware attack.<\/p>\n<\/div>\n<p>                                            <span class=\"connector\"><\/span><br \/>\n                        <span class=\"connector connector-tablet\"><\/span><br \/>\n                        <span class=\"connector connector-mobile\"><\/span><\/p>\n<div class=\"eael-feature-list-icon-box\">\n<div class=\"eael-feature-list-icon-inner\">\n<p>\t\t\t\t\t\t\t\t<span class=\"eael-feature-list-icon fl-icon-5\"><\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\n\t\t\t\t\t\t\t<\/p><\/div>\n<\/div>\n<div class=\"eael-feature-list-content-box\">\n<h4 class=\"eael-feature-list-title\">6. Data loss and extortion<\/h4>\n<p class=\"eael-feature-list-content\">You can&#8217;t open or use the encrypted files without the decryption key. The attackers might say they&#8217;ll share or sell the stolen data if they don&#8217;t get paid.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-246251dd e-con-full post-cta-section e-flex e-con e-child\">\n<div class=\"elementor-element elementor-element-26375279 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<div class=\"elementor-heading-title elementor-size-default\">Stop Ransomware: Thwart Attackers with Fidelis<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-42df7c8f elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><em>Don\u2019t Let Ransomware Lock You Down with our advanced solutions<\/em><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-2c201d82 elementor-icon-list--layout-inline elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Reshape the Attack Surface<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">End-to-end Ransomware Protection<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Automate Detection and Response<\/span><\/p><\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-f68f61e elementor-widget elementor-widget-button\">\n<div class=\"elementor-widget-container\">\n<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/fidelissecurity.com\/resource\/solution-brief\/stop-ransomware\/\"><br \/>\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\"><br \/>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">Download Now<\/span><br \/>\n\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-54fe8c4 e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-d4c119f elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">How to identify if your system has been infected with BlackSuit ransomware?<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-986e803 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>If any of these examples of ransomware attack symptoms are felt or noticed, it is highly needed to act immediately by isolating the compromised system from further lateral movement onto your network. Some blacksuit ransomware iocs include:<\/span><span>\u00a0<\/span><\/p>\n<p><span>File Extensions:<\/span><span> Encrypted files by <\/span>BlackSuit ransomware<span> have the extension <em><strong>\u201c.black suit\u201d<\/strong><\/em> appended. A file named <em><strong>\u201cdocument.doc\u201d<\/strong><\/em> would become <em><strong>\u201cdocument.doc.black suit\u201d<\/strong><\/em>.<\/span><span>\u00a0<\/span><span>Ransom Note:<\/span><span> BlackSuit ransomware leaves a ransom note dubbed <em><strong>\u201cREADME.BlackSuit.txt\u201d<\/strong><\/em> in every directory containing encrypted files. This note explains the ransom demands, claiming your files are secured on some remote server.<\/span><span>\u00a0<\/span><span>Inaccessible Files:<\/span><span> If you cannot open or access your files, or they appear corrupted, <\/span>BlackSuit ransomware<span> encryption might be the culprit.<\/span><span>\u00a0<\/span><span>Desktop Changes:<\/span><span> The ransomware might alter your desktop wallpaper with messages related to the attack, indicating system compromise.<\/span><span>\u00a0<\/span><span>Shadow Copy Deletion:<\/span> BlackSuit ransomware<span> attempts to delete Volume Shadow Copies to hinder file recovery. Missing system restore points could be a sign of infection.<\/span><span>\u00a0<\/span><span>\u202f<\/span><span>Unusual Activity:<\/span><span> Monitor for abnormal network traffic or system behavior like unexpected file changes or unauthorized access attempts. These can indicate a ransomware infection.<\/span>\t\t\t\t\t\t<\/p><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-3ab558e e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-75f3bfa elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">What are the latest BlackSuit Ransomware TTPs (Tactics, Techniques, and Procedures)?<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-e4d0995 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h4 class=\"elementor-heading-title elementor-size-default\">1. Initial Access<\/h4>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-ce29c6b elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<span><strong>Phishing Emails:<\/strong> The most common method involves deceiving users into providing passwords or downloading malware.<\/span><span>\u00a0<\/span><span><strong> RDP Compromise:<\/strong> The use of weak or stolen RDP credentials to gain unwanted access, which accounts for around 13.3% of initial access instances.<\/span><span><strong> VPN Brute-Force Attack:<\/strong> Poorly configured VPN configurations allow brute-force attacks to get access using genuine credentials, demonstrating the importance of strong authentication.<\/span><span><strong> Public-Facing Application Exploit:<\/strong> Exploiting vulnerabilities in internet-connected applications.<\/span><span><strong> Initial Access Brokers:<\/strong> Collaborate with third-party sellers to provide access to infiltrated networks.<\/span>\t\t\t\t\t\t<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-7294eab elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h4 class=\"elementor-heading-title elementor-size-default\">2. Data Exfiltration and Double Extortion<\/h4>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-d70bf4d elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<span>Remove sensitive data before spreading ransomware.<\/span><span>\u00a0<\/span><span> Threaten to disclose stolen material on leak sites unless the ransom is paid.<\/span>\t\t\t\t\t\t<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-5ae673f elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">3. Lateral Movement Tools<\/h3>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-0ff595b elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<span>Repurposing legitimate penetration testing tools like Cobalt Strike.<\/span><span>\u00a0<\/span><span>Utilizing tools like PsExec and Rubeus for lateral movement and privilege escalation.<\/span><span>\u00a0<\/span>\t\t\t\t\t\t<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-f2ef4ae elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h4 class=\"elementor-heading-title elementor-size-default\">4. Disabling Security Measures<\/h4>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-7a2abb0 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<span class=\"TextRun SCXW106081444 BCX0\"><span class=\"NormalTextRun SCXW106081444 BCX0\">Disabling antivirus software and other security tools to evade detection.<\/span><\/span>\t\t\t\t\t\t<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-5c661ba elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h4 class=\"elementor-heading-title elementor-size-default\">5. Partial Encryption Technique<\/h4>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-f4b7a1a elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<span class=\"TextRun SCXW120787770 BCX0\"><span class=\"NormalTextRun SCXW120787770 BCX0\">Employing a partial encryption approach to avoid detection and speed up encryption.<\/span><\/span>\t\t\t\t\t\t<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-b0cc703 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h4 class=\"elementor-heading-title elementor-size-default\">6. Command and Control (C2) Communication<\/h4>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-28e390d elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<span class=\"NormalTextRun SCXW66710669 BCX0\">Communicating with their C2 infrastructure to download <\/span><span class=\"NormalTextRun SCXW66710669 BCX0\">additional<\/span><span class=\"NormalTextRun SCXW66710669 BCX0\"> tools and <\/span><span class=\"NormalTextRun SCXW66710669 BCX0\">maintain<\/span><span class=\"NormalTextRun SCXW66710669 BCX0\"> control.<\/span>\t\t\t\t\t\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-ffaea27 e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-5d96aa9 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Victims and Data Leaks: The Toll of BlackSuit Ransomware<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-3983253 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"NormalTextRun SCXW100894153 BCX0\">In the past year, <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW100894153 BCX0\">BlackSuit<\/span><span class=\"NormalTextRun SCXW100894153 BCX0\"> has claimed dozens of victims and has leaked stolen data from attacks against 53 organizations; leaks which may include sensitive personal and financial information that could lead to further harm both for the affected people and organizations.<\/span><\/p>\n<p><span>Data Leak Consequences<\/span><span>\u00a0<\/span><\/p>\n<p><span>Public disclosure of stolen information further coerces blacksuit ransomware victims to pay the ransom. This might be attributed to reputational damage, financial loss, and even legal and regulatory repercussions.<\/span><span>\u00a0<\/span><\/p>\n<p><span>Of particular note, according to a recent report<\/span><span>,<\/span><span> an observed high for BlackSuit of about $18 million, with an average initial demand of about $2.5 million. The average ransom payment facilitated was around $500,000.<\/span><span>\u00a0<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-89cdd1d elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Extortion Tactics: How BlackSuit Ransomware Tightens Its Grip<\/h2>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-40efedf e-grid e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-12ce9b3 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><strong><span class=\"TextRun SCXW75537618 BCX0\"><span class=\"NormalTextRun SCXW75537618 BCX0\">What Extortion Tactics Does <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW75537618 BCX0\">BlackSuit<\/span><span class=\"NormalTextRun SCXW75537618 BCX0\"> Ransomware Use?<\/span><\/span><\/strong><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-5df93a1 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"NormalTextRun SpellingErrorV2Themed SCXW123435450 BCX0\">BlackSuit<\/span><span class=\"NormalTextRun SCXW123435450 BCX0\"> ransomware <\/span><span class=\"NormalTextRun SCXW123435450 BCX0\">operates<\/span><span class=\"NormalTextRun SCXW123435450 BCX0\"> a multi-pronged extortion model: encrypting victim <span class=\"TextRun SCXW123435450 BCX0\">data, exfiltrating sensitive information of the victim, and hosting public data leak sites.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-2c3ed0c elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><strong><span class=\"TextRun SCXW44559357 BCX0\"><span class=\"NormalTextRun SCXW44559357 BCX0\">How Does Encryption Impact the Victims?<\/span><\/span><\/strong><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-9838f7d elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"NormalTextRun SCXW78285059 BCX0\">Encryption <\/span><span class=\"NormalTextRun SCXW78285059 BCX0\">can <\/span><span class=\"NormalTextRun SCXW78285059 BCX0\">render<\/span> <span class=\"NormalTextRun SCXW78285059 BCX0\">the <\/span><span class=\"NormalTextRun SCXW78285059 BCX0\">data <\/span><span class=\"NormalTextRun SCXW78285059 BCX0\">inaccessible<\/span><span class=\"NormalTextRun SCXW78285059 BCX0\">,<\/span> <span class=\"NormalTextRun SCXW78285059 BCX0\">causing significant <\/span><span class=\"NormalTextRun SCXW78285059 BCX0\">operational disruptions<\/span> <span class=\"NormalTextRun SCXW78285059 BCX0\">to <\/span><span class=\"NormalTextRun SCXW78285059 BCX0\">the <\/span><span class=\"NormalTextRun SCXW78285059 BCX0\">affected<\/span> <span class=\"NormalTextRun SCXW78285059 BCX0\">company<\/span><span class=\"NormalTextRun SCXW78285059 BCX0\">.<\/span> <span class=\"NormalTextRun SCXW78285059 BCX0\">This results in considerable downtime<\/span><span class=\"NormalTextRun SCXW78285059 BCX0\">, <\/span><span class=\"NormalTextRun SCXW78285059 BCX0\">leading <\/span><span class=\"NormalTextRun SCXW78285059 BCX0\">to<\/span><span class=\"NormalTextRun SCXW78285059 BCX0\"> massive losses<\/span><span class=\"NormalTextRun SCXW78285059 BCX0\">.<\/span> <span class=\"NormalTextRun SCXW78285059 BCX0\">Victims <\/span><span class=\"NormalTextRun SCXW78285059 BCX0\">are <\/span><span class=\"NormalTextRun SCXW78285059 BCX0\">often <\/span><span class=\"NormalTextRun SCXW78285059 BCX0\">compelled to<\/span> <span class=\"NormalTextRun SCXW78285059 BCX0\">pay the ransom in hopes of recovering <\/span><span class=\"NormalTextRun SCXW78285059 BCX0\">critical<\/span><span class=\"NormalTextRun SCXW78285059 BCX0\"> data.<\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-8a005c7 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><strong><span class=\"TextRun SCXW118157332 BCX0\"><span class=\"NormalTextRun SCXW118157332 BCX0\">What Is the Role of Data Exfiltration in Their Strategy?<\/span><\/span><span class=\"EOP SCXW118157332 BCX0\">\u00a0<\/span><\/strong><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-ee3649f elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW219982180 BCX0\"><span class=\"NormalTextRun SCXW219982180 BCX0\">Data exfiltration involves stealing sensitive information from the victim systems. Later, this is used to further increase pressure by using stolen data to coerce the victims into paying the ransom.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-aafdcd9 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><strong><span class=\"TextRun SCXW83467091 BCX0\"><span class=\"NormalTextRun SCXW83467091 BCX0\">How Do Public Data Leak Sites Contribute to Their Extortion Tactics?<\/span><\/span><span class=\"EOP SCXW83467091 BCX0\">\u00a0<\/span><\/strong><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-7cbe147 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"NormalTextRun SCXW256852800 BCX0\">They publish stolen information on open data leak sites if the victims do not agree to their demands <\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW256852800 BCX0\">on<\/span><span class=\"NormalTextRun SCXW256852800 BCX0\"> ransom. This public exposure could also be worse for the victims\u2019 reputation and operations, further motivating them to pay the ransom.<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-9319f84 e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-94e3306 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><em><strong><span class=\"TextRun SCXW177255555 BCX0\"><span class=\"NormalTextRun SCXW177255555 BCX0\">Case Study: <\/span><\/span><\/strong><\/em><\/p>\n<p><span class=\"TextRun SCXW177255555 BCX0\"><span class=\"NormalTextRun SCXW177255555 BCX0\">In April 2024, a <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW177255555 BCX0\">BlackSuit<\/span><span class=\"NormalTextRun SCXW177255555 BCX0\"> ransomware attack was detected, which started by performing <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW177255555 BCX0\">Kerberoasting<\/span><span class=\"NormalTextRun SCXW177255555 BCX0\">. This was a kind of post-exploitation attack technique intended to capture a password hash of an Active Directory account that <\/span><span class=\"NormalTextRun SCXW177255555 BCX0\">possesses<\/span><span class=\"NormalTextRun SCXW177255555 BCX0\"> a Service Principal Name (\u201cSPN\u201d) within the environment contributed by a customer. The attack thus caused key systems to be encrypted and exfiltration of sensitive data. Poor asset inventory and poor endpoint visibility plagued the organization affected, and this has driven demands for better cybersecurity.<\/span><\/span><span class=\"EOP SCXW177255555 BCX0\">\u00a0<\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-3765c72 e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-0008434 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">How can organizations defend against Black suit Ransomware Attacks?<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-57bd5cc elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span>Here are some of the blacksuit ransomware best practices from infecting your systems:<\/span><span>\u00a0<\/span><\/p>\n<p><span> Back Up Your Data Often<\/span><span>: Save important files to external drives or cloud storage. Make sure these backups aren\u2019t always connected to your network to keep them safe during an attack. This lets you get your data back without paying if you get infected.<\/span><span> Keep Everything Up to Date:<\/span><span> Make sure your operating system, programs, and antivirus are current. Updates often fix security holes that ransomware uses. Turn on automatic updates to get important fixes right away.<\/span><span> Watch Your Network:<\/span><span> Use tools to check your network traffic for weird patterns or talks with known bad servers. Spotting threats can help you stop them.<\/span><span> Train Your Team:<\/span><span> Teach your employees about staying safe online, like how to spot fake emails and avoid clicking on sketchy links or files. Regular training cuts down on successful attacks a lot, since many infections start because of human mistakes.<\/span><span> Use Two-Factor Authentication (2FA):<\/span><span> Adding 2FA makes your system safer by making it harder for attackers to get in even if they have someone\u2019s login info.<\/span><span> Network Segmentation:<\/span><span> Break up networks to stop malware from spreading. Keeping critical systems apart from general access networks helps companies contain infections and stop widespread damage.<\/span><span> Endpoint Detection and Response (EDR):<\/span><span> Put EDR solutions in place to watch network traffic and spot odd behavior right away.<\/span><span> Care with Email Attachments and Links:<\/span><span> Stay alert when opening email attachments or clicking links from people you don\u2019t know. Scam emails often spread ransomware, including BlackSuit ransomware.<\/span><span> Check and Limit User Permissions:<\/span><span> Cut down user access to the systems and data they need for their jobs. This least privilege rule lowers the risk of ransomware spreading through hacked accounts.<\/span><span> Advanced Threat Detection Tools: <\/span><span>Use top-notch threat detection and response tools to spot unusual activity that might signal a ransomware attack. These tools can send alerts and help tackle threats before they get worse.<\/span><span> Create an Incident Response Plan:<\/span><span> Have a clear plan ready that spells out what to do if ransomware hits. This should cover steps like isolating infected systems restoring from backups and telling the right authorities.<\/span>\t\t\t\t\t\t<\/p><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-eff22b7 e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-64b219b elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">How Can You Secure Your RDP Connections to Prevent BlackSuit Access<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-327f057 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW14135756 BCX0\"><span class=\"NormalTextRun SCXW14135756 BCX0\">Here\u2019s<\/span><span class=\"NormalTextRun SCXW14135756 BCX0\"> how to fortify your remote desktop protocol <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW14135756 BCX0\">rdp<\/span><span class=\"NormalTextRun SCXW14135756 BCX0\"> against <\/span><span class=\"NormalTextRun SpellingErrorV2Themed SCXW14135756 BCX0\">BlackSuit<\/span><span class=\"NormalTextRun SCXW14135756 BCX0\"> ransomware attacks:<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-ea683f7 elementor-icon-list--layout-traditional elementor-list-item-link-full_width elementor-widget elementor-widget-icon-list\">\n<div class=\"elementor-widget-container\">\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Configure a VPN and keep RDP traffic unexposed to the internet. Make sure to implement multi-factor authentication in your VPN configuration.<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Use MFA: Utilize multi-factor authentication for further verification of logins. This can be completed through TOTP, push notifications, or even hardware tokens.<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Restrict RDP Access: RDP should be allowed to connect from specific, trusted IP addresses only. One of the options is enforcing a whitelist-a connections permits from permitted devices or networks only.<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Implement Strong Passwords: Use strong, complex passwords that are updated regularly. Passwords should be at least 12 characters and contain a mix of uppercase and lowercase letters, numbers, and special characters.<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Change the Default RDP Port: Change the default RDP port to prevent automated scanning. The problem is that it is not supposed to be used as the only security measure, since attackers can find the service.<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Restrict User Access: Only allow RDP access to users who have an actual business need for it. Users must be granted access on a least privilege basis. Users who no longer require access should be removed from the list of users with permission for RDP access.<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Account Lockout: Enable account lockout to prevent ransomware brute-force attacks. Set a reasonable number of failed login attempts before an account is temporarily locked.<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Firewalls and Intrusion Detection: Include a firewall and intrusion detection to monitor and react to particular network attacks. Stay ahead of firewall rules changes on a regular basis and review IDS alerts for unusual events.<\/span><\/p>\n<p>\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\"><br \/>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span><br \/>\n\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text\">Keep Regular Updates and Patches: Always have your system updated with the latest patches to each software. This secures your server against any vulnerability that might be attacked.<\/span><\/p><\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-8c53a2a e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-b8aa261 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Fidelis Solutions available to Detect Blacksuit Ransomware<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-a092732 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW232531686 BCX0\"><span class=\"NormalTextRun SCXW232531686 BCX0\">Fidelis Security provides a full set of tools to shield against many types of ransomware threats. By zeroing in on early detection quick action, and control, Fidelis tools help protect your network setup and devices from new attacks.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-5b61a7a e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-aa86fc0 e-con-full e-flex e-con e-child\">\n<div class=\"elementor-element elementor-element-3f88e6c elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Fidelis Network\u00ae<\/h3>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-31d1616 e-con-full e-flex e-con e-child\">\n<div class=\"elementor-element elementor-element-009128f elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p>Fidelis\u2019 NDR solution g<span class=\"TextRun SCXW114050594 BCX0\"><span class=\"NormalTextRun SCXW114050594 BCX0\">ives a clear view of your network as it happens spotting odd behaviors that often go hand in hand with ransomware acts.<\/span><\/span><\/p>\n<p><a href=\"https:\/\/fidelissecurity.com\/solutions\/network-and-detection-response-ndr-solution\/\">Explore Fidelis\u2019 NDR Solution Features\u00a0<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-60dbddb e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-2ed0c05 e-con-full e-flex e-con e-child\">\n<div class=\"elementor-element elementor-element-cd6fbd0 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Fidelis Endpoint\u00ae<\/h3>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-69b4711 e-con-full e-flex e-con e-child\">\n<div class=\"elementor-element elementor-element-0db7335 elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p>Fidelis\u2019 EDR solution k<span class=\"NormalTextRun SCXW115026813 BCX0\">eeps an eye on devices non-stop cutting off ransomware-infected machines and stopping <\/span><span class=\"NormalTextRun ContextualSpellingAndGrammarErrorV2Themed SCXW115026813 BCX0\">it<\/span><span class=\"NormalTextRun SCXW115026813 BCX0\"> from spreading.<\/span><\/p>\n<p><a href=\"https:\/\/fidelissecurity.com\/solutions\/endpoint-detection-and-response-edr-solution\/\">Explore Fidelis\u2019 EDR Solution Features\u00a0<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-4b968bf e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-3f67ab9 e-con-full e-flex e-con e-child\">\n<div class=\"elementor-element elementor-element-687e103 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Fidelis Network Segmentation<\/h3>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-9d129b9 e-con-full e-flex e-con e-child\">\n<div class=\"elementor-element elementor-element-910b2cc elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"TextRun SCXW64455634 BCX0\"><span class=\"NormalTextRun SCXW64455634 BCX0\">Helps box in ransomware within your network keeping it in certain areas to cut down on damage.<\/span><\/span><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-6b8a144 e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-d8faeed e-con-full e-flex e-con e-child\">\n<div class=\"elementor-element elementor-element-d89a46d elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h3 class=\"elementor-heading-title elementor-size-default\">Fidelis Advanced Threat Detection<\/h3>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-115bf82 e-con-full e-flex e-con e-child\">\n<div class=\"elementor-element elementor-element-973114b elementor-widget elementor-widget-text-editor\">\n<div class=\"elementor-widget-container\">\n<p><span class=\"NormalTextRun CommentHighlightClicked SCXW3083012 BCX0\">Uses <\/span><span class=\"NormalTextRun CommentHighlightClicked SCXW3083012 BCX0\">machine learning <\/span><span class=\"NormalTextRun CommentHighlightClicked SCXW3083012 BCX0\">and behavior analysis to spot encryption tries and warn you about ransomware threats before they get worse.<\/span><\/p>\n<p><a href=\"https:\/\/fidelissecurity.com\/resource\/datasheet\/active-threat-detection\/\">Explore Fidelis\u2019 Advance Threat Detection features<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-d3b26fe e-flex e-con-boxed e-con e-parent\">\n<div class=\"e-con-inner\">\n<div class=\"elementor-element elementor-element-336fd89 elementor-widget elementor-widget-heading\">\n<div class=\"elementor-widget-container\">\n<h2 class=\"elementor-heading-title elementor-size-default\">Frequently Ask Questions<\/h2>\n<\/div>\n<\/div>\n<div class=\"elementor-element elementor-element-102341e elementor-widget elementor-widget-eael-adv-accordion\">\n<div class=\"elementor-widget-container\">\n<div class=\"eael-adv-accordion\">\n<div class=\"eael-accordion-list\">\n<div class=\"elementor-tab-title eael-accordion-header active-default\">\n<h3 class=\"eael-accordion-tab-title\">How does BlackSuit&#8217;s partial encryption approach help evade detection?<\/h3>\n<\/div>\n<div class=\"eael-accordion-content clearfix active-default\"><span>Reduces the likelihood of sending off any traditional security alerts.<\/span><span>It lets ransomware act quite surreptitiously by the time it becomes too late.<\/span><\/div>\n<\/div>\n<div class=\"eael-accordion-list\">\n<div class=\"elementor-tab-title eael-accordion-header\">\n<h3 class=\"eael-accordion-tab-title\">What steps can I take to protect against phishing emails from BlackSuit?<\/h3>\n<\/div>\n<div class=\"eael-accordion-content clearfix\"><span>Install advanced email filtering solutions.<\/span><span>\u00a0<\/span><span>Carry out regular phishing awareness and training of the staff concerning security.<\/span><span>Apply multi-factor authentication for email accounts.<\/span><span>Make use of threat intelligence in order to stay updated about any new phishing techniques.<\/span><\/div>\n<\/div>\n<div class=\"eael-accordion-list\">\n<div class=\"elementor-tab-title eael-accordion-header\">\n<h3 class=\"eael-accordion-tab-title\">How do BlackSuit actors communicate with their command and control infrastructure?<\/h3>\n<\/div>\n<div class=\"eael-accordion-content clearfix\"><span><strong>Encrypted Channels:<\/strong> Securely communicate with C2 infrastructure (e.g., SSH tunnels).<\/span><span><strong>Legitimate Tools:<\/strong> Blend in with normal network traffic (e.g., remote monitoring and management software).<\/span><span><strong>Penetration Testing Tools:<\/strong> Create backdoor, execute tasks (e.g., Cobalt Strike).<\/span><span><strong>Malware Derivatives:<\/strong> Aggregate and transfer data (e.g., Ursnif, Gozi).<\/span><span><strong>Anonymous Communication:<\/strong> Obscure origin, complicate tracking (e.g., U.S. IP addresses, onion sites like \u201cblacksuitmarket.onion\u201d).<\/span><span><strong>Lateral Movement:<\/strong> Move within network, deploy tools (e.g., RDP, PsExec).<\/span><\/div>\n<\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<p>The post <a href=\"https:\/\/fidelissecurity.com\/threatgeek\/threat-intelligence\/blacksuit-ransomware\/\">Best Practices for Preventing BlackSuit Ransomware Infections<\/a> appeared first on <a href=\"https:\/\/fidelissecurity.com\/\">Fidelis Security<\/a>.<\/p>","protected":false},"excerpt":{"rendered":"<p>Are you confident that your security tools are foolproof? Think again. BlackSuit ransomware is exploiting overlooked vulnerabilities, slipping through defenses even in 53 well-protected organizations. This isn\u2019t just another cyber threat\u2014it\u2019s a sophisticated adversary that rewrites the rules.\u00a0 Your firewalls, antivirus, and strict protocols might not be enough to stop it. BlackSuit is engineered to [&hellip;]<\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-364","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/364"}],"collection":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=364"}],"version-history":[{"count":0,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=\/wp\/v2\/posts\/364\/revisions"}],"wp:attachment":[{"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=364"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=364"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersecurityinfocus.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=364"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}