• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

BlackMatter Ransomware Reportedly Shutting Down; Latest Analysis Released

You are here: Home / Cyber Security News / BlackMatter Ransomware Reportedly Shutting Down; Latest Analysis Released

An assessment of new samples of BlackMatter ransomware for Windows and Linux has exposed the extent to which the operators have continuously extra new characteristics and encryption abilities in successive iterations in excess of a three-month interval.

No much less than 10 Windows and two Linux variations of the ransomware have been noticed in the wild to date, Group-IB risk researcher Andrei Zhdanov claimed in a report shared with The Hacker Information, pointing out the modifications in the implementation of the ChaCha20 encryption algorithm employed to encrypt the contents of the documents.

BlackMatter emerged in July 2021 boasting of incorporating the “most effective capabilities of DarkSide, REvil, and LockBit” and is considered the successor to DarkSide, which has considering the fact that shut down alongside REvil in the wake of legislation enforcement scrutiny. Operating as a ransomware-as-a-support (RaaS) product, the BlackMatter is considered to have strike more than 50 companies in the U.S., Austria, Italy, France, Brazil, amid some others.

What is far more, the risk actor generates a exceptional Tor chat space for interaction for each and every target, a backlink to which is connected to the textual content file containing the ransom need. BlackMatter is also recognized to double the ransom total when the ultimatum expires, before going to publish the stolen paperwork in the event the target refuses to fork out up.

In accordance to security scientists from Microsoft’s counter-ransomware unit, DarkSide and its BlackMatter rebrand is the handiwork of a cybercrime group tracked as FIN7, which was a short while ago unmasked functioning a entrance enterprise named Bastion Safe to entice tech specialists with the goal of launching ransomware attacks.

“When other parameters are established or any parameters are absent, the technique is thoroughly encrypted according to the configuration configurations,” Zhdanov mentioned. “On completing the encryption, the ransomware produces a BMP graphic alerting that files have been encrypted, which it then sets as the desktop wallpaper. Starting off from version 1.4, the ransomware can also print the textual content of the need for ransom on the victim’s default printer.”

The Linux variants, on the other hand, are created to concentrate on VMware ESXi servers, featuring the skill to terminate digital machines and kill distinct procedures, which include the firewall, prior to commencing info encryption.

The results come as VX-Underground, a portal that hosts malware resource code, samples and papers, revealed that the group is pulling the plug on its operations “next tension from area authorities.” The write-up shared on the RaaS web page also noted that a “section of the crew is no extended out there, after the most current information.”

It is really not straight away obvious what the “most recent information” could be referring to, but it implies a strong url to the coordinated international legislation enforcement operation late past month that observed 12 people arrested for orchestrating ransomware attacks versus 1,800 victims throughout 71 nations considering that 2019.

In an advisory issued on Oct 18, 2021, the Cybersecurity and Infrastructure Security Company (CISA), the Federal Bureau of Investigation (FBI), and the Nationwide Security Company (NSA) warned that the BlackMatter ransomware group has specific “a number of” companies considered critical infrastructure, like two entities in the U.S. food and agriculture sector.

Identified this article appealing? Abide by THN on Facebook, Twitter  and LinkedIn to read through a lot more special written content we submit.

Some parts of this article are sourced from:
thehackernews.com

Previous Post: « Product Overview – Cynet Centralized Log Management
Next Post: Government action needed to ensure insurance against major hacking of driverless vehicles, experts warn AllTech.News»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Hazy Hawk Exploits DNS Records to Hijack CDC, Corporate Domains for Malware Delivery
  • 100+ Fake Chrome Extensions Found Hijacking Sessions, Stealing Credentials, Injecting Ads
  • South Asian Ministries Hit by SideWinder APT Using Old Office Flaws and Custom Malware
  • AWS Default IAM Roles Found to Enable Lateral Movement and Cross-Service Exploitation
  • The Crowded Battle: Key Insights from the 2025 State of Pentesting Report

Copyright © 2025 · AllTech.News, All Rights Reserved.