BlackCat Ransomware Gang Targets Unpatched Microsoft Exchange Servers

Share post:

BlackCat ransomware gang targets unpatched Microsoft Exchange Server to exploit vulnerabilities and to gain access to targeted networks.

According to the Microsoft 365 Defender Threat Intelligence Team, the attackers, after gaining an entry point, carried out a number of actions, including gathering information about the compromised machines, carrying out credentials thefts and lateral movement activities.

After carrying out the above actions, the attackers then went to harvest intellectual property, while dropping the ransomware payload.

In their analysis, the researchers pointed out how no two BlackCat ‘lives’ or deployment might look the same.

“In another incident we observed, we found that a ransomware affiliate gained initial access to the environment via an internet-facing Remote Desktop server using compromised credentials to sign in,” the researchers said.

Giving further details, Microsoft said that “two of the most prolific” affiliate threat groups associated with several ransomware families such as Hive, Conti, REvil and LockBit 2.0 are now spreading BlackCat.

“Detecting threats like BlackCat, while good, is no longer enough as human-operated ransomware continues to grow, evolve and adapt to the networks they’re deployed on the attackers they work for. These types or attacks continue to take advantage of an organization’s poor credential hygiene and legacy configurations or misconfigurations to succeed,” the researchers said.

The sources for this piece include an article in TheHackerNews.

SUBSCRIBE NOW

Related articles

North Korean hacker infiltrates US security vendor, loads malware

KnowBe4, a US-based security vendor, unknowingly hired a North Korean hacker who attempted to introduce malware into the...

CrowdStrike releases an update from initial Post Incident Review: Hashtag Trending Special Edition for Thursday July 25, 2024

Security vendor CrowdStrike released an update on from their initial Post Incident Review today. The first, and most surprising...

Security vendor CrowdStrike issues an update from their initial Post Incident Review

Security vendor CrowdStrike released an update from their initial Post Incident Review (PIR) today. The company's CEO has...

CrowdStrike CEO summoned by Homeland Security committee over software disaster

CrowdStrike CEO George Kurtz has been called to testify before the U.S. House Committee on Homeland Security following...

Become a member

New, Relevant Tech Stories. Our article selection is done by industry professionals. Our writers summarize them to give you the key takeaways