In its aim to take down the BlackCat ransomware gang, the US Justice Department successfully seized the malicious websites controlled by Russian threat actors.

Operating under Noberus or sometimes ALPHV, this group of cybercriminals are globall known for million dollar extortion.

US Rolls Out Decryption Tool For BlackCat Ransomware

Russian Ransomware Group BlackCat Seized by US: Decryption Tool Distributed to Over 500 Victims
(Photo : Christian Wiediger from Unsplash)
BlackCat, a notorious group of Russian hackers has been caught red-handed by the US officials. The gang was responsible for hacking high-profile organizations in the US and Europe through its websites.

The website of the extortion group BlackCat conveyed a message on Tuesday, Dec. 26, revealing that US officials had taken control of the page. 

As part of this strategic move, the FBI developed a decryption tool, empowering US and international law enforcement agencies to assist over 500 victims in restoring their computer systems, as confirmed by the Justice Department.

Related Article: Akira Ransomware Gang Takes Responsibility for Recent Nissan Cyberattack

FBI Goes After BlackCat

In addition to website seizures and decryption tools, the FBI secured a search warrant, enhancing visibility into BlackCat's operations. Despite the significant disruption caused, there have been no reported arrests associated with this operation.

BlackCat's Notorious Hacks

As per Insurance Journal, BlackCat gained infamy through a series of high-profile cyber attacks targeting US and European companies and organizations. 

Notable incidents include cyberattacks on Las Vegas casinos, impacting major entities such as MGM Resorts International and Caesars Entertainment Inc. The group was also implicated in a breach affecting the UK's Barts Health NHS Trust.

Rise to Notoriety 

The gang garnered attention in 2022 with disruptive attacks on the energy sector, specifically targeting Luxembourg-based Creos Luxembourg and its parent company Encevo SA. 

The impact extended to companies like Mabanaft GmbH & Co. KG and Oiltanking GmbH Group, causing payment disruptions at filling stations and forcing firms to declare force majeure on supplies.

Significant Victory For Cybersecurity

Charles Carmakal, Consulting Chief Technology Officer at Mandiant's consulting arm, emphasized the magnitude of this achievement, calling it a "huge win for law enforcement and the community." 

While acknowledging the possibility of BlackCat's associates continuing hacking activities, Carmakal stressed that the takedown sends a robust message about police action.

"In disrupting the BlackCat ransomware group, the Justice Department has once again hacked the hackers. With a decryption tool provided by the FBI to hundreds of ransomware victims worldwide, businesses and schools were able to reopen, and health-care and emergency services were able to come back online," Deputy Attorney General Lisa Monaco said in a statement. 

BlackCat's Modus Operandi

Known for their sophistication and innovation, BlackCat's members operated in Russia and recruited affiliates on cybercrime forums. These associates rented out the ransomware to hacking companies, installing malware that encrypted files, demanded cryptocurrency payments, and threatened to publish stolen internal documents if payment was not received.

Speaking of BlackCat ransomware, our previous report in August indicated that a new variant dubbed "Sphynx" had been exploiting Remcom and Impacket. These are two tools that help the hackers compromise the networks.

Read Also: Barracuda ESG Attack: Chinese Hackers Exploit Zero Day to Launch Data-Stealing Malware

Joseph Henry

ⓒ 2024 TECHTIMES.com All rights reserved. Do not reproduce without permission.
Join the Discussion