Beware of the black cat ransomware: Dangerous and on the prowl
Black Cat Ransomware: During February 2022, Swissport was hit by a ransomware attack and the consequence of this led to flight delays and service disruption. BlackCat ransomware has now claimed they were behind the attack and stole data containing images of passports, internal business memos and personal information of job candidates.
Dubbed by some security analysts to be the “most sophisticated” ransomware group of 2021, BlackCat ransomware has already become quite infamous within the cybersecurity community. Earlier in February, some of its members confirmed the group was linked to the notorious BlackMatter operation. After this attack, it is likely the group will continue to strike, aiming for larger corporations or even government organizations.
Commenting on the activities of this group for Digital Journal is JP Perez-Etchegoyen, CTO at Onapsis. Perez-Etchegoyen outlines some of the possible methods of future attacks.
Perez-Etchegoyen considers the nature and complexity of the recent attack: “This attack further confirms that BlackCat ransomware is a highly sophisticated threat group that has become increasingly dangerous. Now with access to sensitive data like passports numbers, full names, and emails, it’s highly likely that BlackCat will be conducting additional malicious activities for monetary gain.”
Perez-Etchegoyen adds that one reason why the attacks are successful is based on the detailed knowledge that the group members possess about business information technology. According to the analyst: “Recent research shows that BlackCat ransomware incorporates knowledge about SAP business applications to properly function. This is of particular concern, as business-critical applications, like those from SAP, contain vital data (financial, customer, product, employee, etc.) that keep enterprises running.”
Whilst these applications have transformed the way businesses operate, they can also introduce unnecessary risk if not properly managed and secured. Here Perez-Etchegoyen points out an additional vulnerability connected to updating SAP and other important systems: “Organizations are not purposeful when it comes to securing these applications, opening significant security gaps. This makes threats like ransomware far more dangerous, as attackers often seek to exploit unpatched business-critical applications to steal valuable data.”
There are different measures that can be adopted, and Perez-Etchegoyen presents these as: “To protect their mission-critical applications and their business from sophisticated ransomware groups like BlackCat, it’s crucial for enterprises to assess all systems in their SAP landscape for any cyber threats, including missing patches, broad authorizations, insecure integrations or misconfigurations, and immediately apply all relevant mitigations.” Lastly, Perez-Etchegoyen recommends: “Furthermore, they must incorporate a business-critical application security program into their overall cybersecurity strategy to ensure these applications are effectively and comprehensively protected.”
What is Ransomware & How Does It Work?
You may also enjoy reading, CVEs You May Have Missed While Log4J Stole The Headlines
Stay informed of the latest Cybersecurity trends, threats and developments. Sign up for RiSec Weekly Cybersecurity Newsletter Today
Remember, CyberSecurity Starts With You!
- Globally, 30,000 websites are hacked daily.
- 64% of companies worldwide have experienced at least one form of a cyber attack.
- There were 20M breached records in March 2021.
- In 2020, ransomware cases grew by 150%.
- Email is responsible for around 94% of all malware.
- Every 39 seconds, there is a new attack somewhere on the web.
- An average of around 24,000 malicious mobile apps are blocked daily on the internet.
- Twitter discontinues text message two-factor authentication for non-Blue subscribers - 26 March 2023
- A Beginner’s Guide to Visual Studio Code: Interface, Features, Keyboard Shortcuts and More - 25 March 2023
- A Lesson in Privacy: The ChatGPT Bug and Its Implications for AI Conversations - 24 March 2023