# Trellix Global Defenders: Analysis and Protections for BlackByte Ransomware **trellix.com/en-us/about/newsroom/stories/threat-labs/trellix-global-defenders-analysis-and-protections-for-blackbyte-** ransomware.html ## Stories The latest cybersecurity trends, best practices, security vulnerabilities, and more By [Taylor Mullins · February 28, 2022](https://www.trellix.com/en-us/about/newsroom/stories/contributors/taylor-mullins.html) ----- BlackByte Ransomware has been in the news of late due to a successful attack against a National Football League (NFL) Franchise and a Joint Cybersecurity Advisory by the Federal Bureau of Investigation (FBI) and the U.S. Secret Service (USSS) warning on breaches to the networks of at least three organizations from US critical infrastructure sectors in the last three months. BlackByte Ransomware is currently being offered to threat actors as a Ransomware-as-a-Service (RaaS) and makes use of PowerShell and Windows CLI commands to carry out various tasks such as network discovery, task scheduling and to create and disable Windows and security services. BlackByte Ransomware makes files inaccessible by encrypting them and generates a ransom note (the "BlackByte_restoremyfiles.hta" file) that contains instructions on how to contact the attackers for data decryption and other details. Also, BlackByte appends the ".blackbyte" extension to the names of encrypted files. BlackByte does have worming capabilities and can infect additional endpoints on the same network. **Figure 1. MITRE ATT&CK Framework for BlackByte Ransomware** ## Recommended Steps to Prevent Initial Access The Joint Cybersecurity Advisory provides several recommendations to secure your environment against BlackByte that were gathered from their analysis of malware samples discovered in the wild. BlackByte operators have been observed exploiting the following CVEs to gain initial access, patching is recommended to prevent exploitation. [CVE-2021-34473 - Microsoft Exchange Server Remote Code Execution](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34473) Vulnerability [CVE-2021-34523 - Microsoft Exchange Server Elevation of Privilege](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-34523) Vulnerability [CVE-2021-31207 - Microsoft Exchange Server Security Feature Bypass](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31207) Vulnerability ----- Blocking IP Addresses known to download additional payloads in BlackByte attacks prior to encryption: 185.93.6.31 and 45.9.148.114. Disable unused remote access/Remote Desktop Protocol (RDP) ports and monitor remote access/RDP logs for any unusual activity. After gaining access to the service accounts some adversaries have utilized AnyDesk for lateral movement, monitoring for AnyDesk activity can be an early indicator of compromise if AnyDesk is not utilized or allowed by your organization. Review domain controllers, servers, workstations, and active directories for new or unrecognized user accounts. Disable hyperlinks in received emails. Joint Cybersecurity Advisory: Indicators of Compromise Associated with BlackByte Ransomware ## Trellix Protections and Global Detections Trellix Global Threat Intelligence is currently detecting all known analyzed indicators for this campaign. **Figure 2. Trellix Products** **detecting this threat globally. Source: MVISION Insights** ## Blocking BlackByte Attacks with Endpoint Security Trellix ENS is currently detecting BlackByte Indicators of Compromise (IOCs) from the standpoint of signature detections and the malware behavior associated with BlackByte Ransomware attacks. The following Exploit Prevention Rule in ENS has shown success in stopping BlackByte samples due to BlackByte being Script-based. Trellix always recommends testing in Report Only Mode before blocking to confirm no false positives are being detected by this signature rule ----- ### Exploit Prevention Signature ID 6207: ASR : File Download attempt by Scripts **Figure 3. Exploit Prevention Rule in ePolicy Orchestrator/MVISION ePO** **Figure 4. MVISION EDR noting where Endpoint Protection (ENS) could have stopped** **specific techniques** ----- **Figure 5. Ransomware Detection Name and Observed Detections noted in MVISION** **Insights** ## BlackByte Threat Intelligence from the Trellix Advanced Threat Research Team and MVISION Insights MVISION Insights will provide the current threat intelligence and known indicators for BlackByte Ransomware. MVISION Insights will alert to detections and Process Traces that have been observed and systems that require additional attention to prevent widespread infection. MVISION Insights will also include Hunting Rules for threat hunting and further intelligence gathering of the threat activity and adversary. ### MVISION Insights Campaign Names: Cybersecurity Advisory - BlackByte Ransomware and JavaScript Malware Threat Landscape **Figure 6. Campaign Details, Analyzed Indicators of Compromise, and Detections** ----- **Figure 7. Hunting Rules for BlackByte Ransomware in MVISION Insights** ## Detecting Malicious Activity with MVISION EDR MVISION EDR is currently monitoring for the activity associated with BlackByte Ransomware and will note the MITRE techniques and any suspicious indicators related to the adversarial activity. Several of the techniques outlined in the Joint Advisory that are observed with BlackByte are noted below, monitoring for this type of activity can point to activity associated with the Tactics, techniques, and procedures (TTPs) for BlackByte. **Figure 8. Network Connection to Known Malicious IP Address Associated with** **BlackByte** ----- **Figure 9. Enabling of remote registry for possible preparation of Lateral Movement** **Figure 10. Deletion of Shadow Copy to inhibit system recovery** Trellix offers Threat Intelligence Briefings along with Cloud Security and Data Protection workshops to provide customers with best practice recommendations on how to utilize their existing security controls to protect against adversarial and insider threats, please reach out if you would like to schedule a workshop with your organization. ### Featured Content PERSPECTIVES ### Our CEO On Living Security [By Bryan Palma · January 19 2022](https://www.trellix.com/en-us/about/newsroom/stories/contributors/bryan-palma.html) ----- Trellix CEO, Bryan Palma, explains the critical need for security that s always learning. [Read More](https://www.trellix.com/en-us/about/newsroom/stories/perspectives/our-ceo-on-living-security.html) XDR ### Time to Drive Change by Challenging the Challengers By [Michelle Salvado · January 19, 2022](https://www.trellix.com/en-us/about/newsroom/stories/contributors/michelle-salvado.html) Dynamic threats call for dynamic security – the path to resiliency lies in XDR. [Read More](https://www.trellix.com/en-us/about/newsroom/stories/xdr/time-to-drive-change-by-challenging-the-challengers.html) THREAT LABS ### 2022 Threat Predictions By Trellix · January 19, 2022 What cyber security threats should enterprises look out for in 2022? [Read More](https://www.trellix.com/en-us/about/newsroom/stories/threat-labs/2022-threat-predictions.html) ## Get the latest We’re no strangers to cybersecurity. But we are a new company. Stay up to date as we evolve. Please enter a valid email address. Zero spam. Unsubscribe at any time. -----