Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
Rewterz penetration testing services help organizations determine if a cyber attacker can gain access to their critical assets while giving them detailed insights of the overall business impact of a cyber attack.
Before Rewterz got its start, the market was in dire need of a specialized and dedicated information security company. It was nearly impossible for businesses to find a trustworthy provider that could truly cover all of their bases. We wanted to meet this need, giving companies across the globe a chance to get ahead while knowing that their data is in good hands.
High
Ransomware attacks are on the rise, posing significant challenges for organizations worldwide. A recent investigation by the Incident Response team into the BlackByte 2.0 ransomware attacks exposed the speed and impact of these cyber attacks. The threat actor progressed through the entire attack chain, from initial access to causing disruption, in just five days, severely impacting the victim organization’s operations.
The finding indicates that the threat actor utilized various tools and techniques, ultimately deploying the BlackByte 2.0 ransomware. The techniques involved exploiting unpatched Microsoft Exchange Servers exposed on the internet, deploying web shells for remote access, using living-off-the-land tools for persistence and reconnaissance, employing Cobalt Strike beacons for command and control, process hollowing, and utilizing custom-developed backdoors and data collection tools for persistence and exfiltration.
The forensic analysis revealed the attacker’s approach at each stage of the attack chain. They gained initial access by exploiting ProxyShell vulnerabilities in unpatched Exchange Servers, eventually obtaining system-level privileges and creating web shells for control. They maintained persistence through backdoor registry run keys and utilized the AnyDesk remote administration tool to blend into the network.
The threat actor engaged in reconnaissance using tools like NetScan and AdFind to enumerate the network and collect credentials via likely usage of Mimikatz. After lateral movement through RDP and PowerShell remoting, they staged and exfiltrated data using a custom tool called ExByte. The ransomware itself, BlackByte 2.0, exhibited capabilities such as antivirus bypass, process hollowing, modification of Windows Firewall, and destruction of volume shadow copies.
The increasing surge in ransomware attacks calls for immediate action from organizations worldwide. In response to the investigation’s findings, Microsoft offers practical recommendations. Organizations are urged to implement robust patch management procedures, ensuring critical security updates are applied promptly. Enabling tamper protection is also essential as it strengthens security solutions against malicious attempts to disable or bypass them.
By taking these measures, organizations can bolster their defenses and mitigate the risks posed by ransomware attacks, helping protect their valuable data and systems from these cyber threats.