• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
blackbyte 2.0 ransomware: infiltrate, encrypt, and extort in just 5

BlackByte 2.0 Ransomware: Infiltrate, Encrypt, and Extort in Just 5 Days

You are here: Home / General Cyber Security News / BlackByte 2.0 Ransomware: Infiltrate, Encrypt, and Extort in Just 5 Days
July 7, 2023

Ransomware attacks are a main issue for companies in all places, and the severity of this trouble continues to intensify.

A short while ago, Microsoft’s Incident Response workforce investigated the BlackByte 2. ransomware attacks and exposed these cyber strikes’ terrifying velocity and harmful nature.

The conclusions show that hackers can complete the entire attack procedure, from getting original entry to triggering sizeable damage, in just five times. They waste no time infiltrating techniques, encrypting critical info, and demanding a ransom to launch it.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


This shortened timeline poses a considerable problem for companies making an attempt to shield themselves from these destructive operations.

BlackByte ransomware is utilized in the remaining phase of the attack, using an 8-digit amount important to encrypt the details.

To carry out these attacks, hackers use a effective mixture of instruments and strategies. The investigation uncovered that they acquire gain of unpatched Microsoft Exchange Servers—an method that has proven highly profitable. By exploiting this vulnerability, they attain preliminary entry to the concentrate on networks and set the stage for their malicious things to do.

The ransomware even more employs approach hollowing and antivirus evasion approaches to assurance profitable encryption and circumvent detection.

BlackByte 2.0 Ransomware

Additionally, web shells equip them with remote accessibility and regulate, enabling them to maintain a existence inside of the compromised techniques.

The report also highlighted the deployment of Cobalt Strike beacons, which aid command and regulate operations. These complex resources give attackers a vast variety of capabilities, generating it extra difficult for corporations to protect versus them.

Approaching WEBINAR🔐 Privileged Access Management: Study How to Conquer Crucial Worries

Find unique methods to conquer Privileged Account Management (PAM) challenges and stage up your privileged entry security method.

Reserve Your Place

Alongside these tactics, the investigation uncovered quite a few other troubling procedures cybercriminals use. They employ “living-off-the-land” tools to blend in with genuine processes and escape detection.

The ransomware modifies quantity shadow copies on infected machines to stop facts recovery by means of procedure restore points. The attackers also deploy specifically-crafted backdoors, ensuring continued obtain for the attackers even following the preliminary compromise.

The disturbing upsurge in ransomware attacks needs fast motion from organizations around the globe. In reaction to these conclusions, Microsoft has presented some useful suggestions.

Organizations are primarily urged to implement strong patch management procedures, making certain they well timed apply critical security updates. Enabling tamper security is one more important move, as it strengthens security methods from malicious tries to disable or bypass them.

Found this posting appealing? Abide by us on Twitter  and LinkedIn to go through additional special written content we put up.


Some areas of this write-up are sourced from:
thehackernews.com

Previous Post: «google releases android patch update for 3 actively exploited vulnerabilities Google Releases Android Patch Update for 3 Actively Exploited Vulnerabilities
Next Post: Close Security Gaps with Continuous Threat Exposure Management close security gaps with continuous threat exposure management»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Zero-Click Agentic Browser Attack Can Delete Entire Google Drive Using Crafted Emails
  • Critical XXE Bug CVE-2025-66516 (CVSS 10.0) Hits Apache Tika, Requires Urgent Patch
  • Chinese Hackers Have Started Exploiting the Newly Disclosed React2Shell Vulnerability
  • Intellexa Leaks Reveal Zero-Days and Ads-Based Vector for Predator Spyware Delivery
  • “Getting to Yes”: An Anti-Sales Guide for MSPs
  • CISA Reports PRC Hackers Using BRICKSTORM for Long-Term Access in U.S. Systems
  • JPCERT Confirms Active Command Injection Attacks on Array AG Gateways
  • Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China
  • ThreatsDay Bulletin: Wi-Fi Hack, npm Worm, DeFi Theft, Phishing Blasts— and 15 More Stories
  • 5 Threats That Reshaped Web Security This Year [2025]

Copyright © TheCyberSecurity.News, All Rights Reserved.