Blacksuit is a private ransomware/extortion group that surfaced in early April/May of 2023. It bears numerous similarities to Royal Ransomware, suggesting it may be a spinoff or a rebranding effort.
Blacksuit is a private ransomware/extortion group that emerged in early April/May of 2023. The group shares various similarities with Royal Ransomware, leading experts to speculate that Blacksuit may be a spinoff or a rebranding of the earlier group.
Royal Ransomware, itself a reboot of Conti, gained notoriety for its highly targeted attacks on critical infrastructure sectors and its sophisticated methods of gaining initial access, elevating privileges, and evading detection.
Building on this foundation, Blacksuit appears to continue the legacy with refined techniques and a focused approach to extortion, targeting similar high-value industries and leveraging advanced tactics to breach and encrypt the networks of their victims.
Cartography: OCD
BlackSuit operates on a global scale, with significant activity reported in:
Source: SOCradar
According to SOCradar, Blacksuit predominantly targets the following industries:
According to SOCradar, Blacksuit predominantly targets the following industries:
Blacksuit targeted more than 96 victims. High-profile victims of Blacksuit include major educational institutions, government agencies, construction companies, professional service firms, and healthcare providers. These attacks often result in significant operational disruptions and data breaches.
Image: ransomware.live
Blacksuit often gains initial access through phishing emails, exploiting vulnerabilities in public-facing applications, and employing malicious attachments or links.
Once inside the network, the attackers exploit vulnerabilities to elevate their privileges, often using tools like Mimikatz to obtain higher-level access.
The group employs various techniques to avoid detection, including disabling security tools, using obfuscated code, and leveraging trusted system processes.
Blacksuit uses keyloggers, credential dumping tools, and brute force attacks to gather usernames and passwords.
They conduct extensive reconnaissance within the network to understand its structure, identifying critical systems and sensitive data.
Utilizing legitimate administrative tools and compromised credentials, the attackers move laterally across the network to infect more systems.
Blacksuit collects and exfiltrates sensitive data to pressure victims into paying the ransom. This often includes financial data, personal information, and proprietary business information.
The ransomware is deployed and executed to encrypt the files on the compromised systems.
Data is exfiltrated to external servers controlled by the attackers, often using encrypted channels to avoid detection.
The final stage involves encrypting the victim's data and systems, rendering them unusable. A ransom note is then presented, demanding payment in cryptocurrency to decrypt the files.
Blacksuit often gains initial access through phishing emails, exploiting vulnerabilities in public-facing applications, and employing malicious attachments or links.
Once inside the network, the attackers exploit vulnerabilities to elevate their privileges, often using tools like Mimikatz to obtain higher-level access.
The group employs various techniques to avoid detection, including disabling security tools, using obfuscated code, and leveraging trusted system processes.
Blacksuit uses keyloggers, credential dumping tools, and brute force attacks to gather usernames and passwords.
They conduct extensive reconnaissance within the network to understand its structure, identifying critical systems and sensitive data.
Utilizing legitimate administrative tools and compromised credentials, the attackers move laterally across the network to infect more systems.
Blacksuit collects and exfiltrates sensitive data to pressure victims into paying the ransom. This often includes financial data, personal information, and proprietary business information.
The ransomware is deployed and executed to encrypt the files on the compromised systems.
Data is exfiltrated to external servers controlled by the attackers, often using encrypted channels to avoid detection.
The final stage involves encrypting the victim's data and systems, rendering them unusable. A ransom note is then presented, demanding payment in cryptocurrency to decrypt the files.
Blacksuit is a ransomware group known for targeting critical infrastructure sectors and using advanced tactics to breach and encrypt victim networks.
They often use phishing emails, exploit vulnerabilities in public-facing applications, and send malicious attachments or links.
Educational services, public administration, construction, professional and technical services, wholesale trade, and manufacturing are primary targets.
They exploit software vulnerabilities and use tools like Mimikatz to gain higher-level access.
They use techniques such as disabling security tools, obfuscating code, and leveraging trusted system processes.
They employ keyloggers, credential dumping tools, and brute force attacks.
By using legitimate administrative tools and compromised credentials to access additional systems.
Financial data, personal information, and proprietary business information are commonly exfiltrated.
The ransomware is deployed and executed to encrypt files on the compromised systems.
Implementing strong phishing defenses, regular vulnerability patching, robust credential management, and extended detection and response (XDR) solutions are crucial.