Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Facebook X (Twitter) Instagram
    Tech Empire Solutions
    • Home
    • Cloud
    • Cyber Security
    • Technology
    • Business Solution
    • Tech Gadgets
    Tech Empire Solutions
    Home » BlackCat ransomware group disappears after paying $22 million
    Cyber Security

    BlackCat ransomware group disappears after paying $22 million

    techempireBy techempireNo Comments3 Mins Read
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest Telegram Email

    ReportMarch 6, 2024Editorial DepartmentCybercrime/Ransomware

    Black Cat Ransomware

    The threat actors behind the BlackCat ransomware have taken down their darknet site and may have carried out an exit scam after uploading a fake law enforcement seizure banner.

    Security researcher Fabian Wosar said: “ALPHV/BlackCat has not been detected. They are defrauding their affiliates.” explain. “This is very apparent when you examine the source code of the new takedown notices.”

    “There is absolutely zero reason for law enforcement to place only a saved version of a takedown notice during a seizure rather than the original takedown notice.”

    Britain’s National Crime Agency (NCA) told Reuters it was not involved in any disruption to BlackCat’s infrastructure.

    Recorded Future security researcher Dmitry Smilyanets release Screenshot from social media platform

    The company allegedly received $22 million in ransom from UnitedHealth’s Change Healthcare unit (Optum) and refused to share the proceeds with the affiliate that carried out the attack.

    Internet security

    The company did not comment on the alleged ransom payment, saying it was only focusing on the investigation and recovery aspects of the incident.

    According to DataBreaches, the disgruntled affiliate made the accusation on the RAMP cybercrime forum and the affiliate’s account has been suspended by administrators. “They emptied their wallets and took all the money,” they said.

    This sparked speculation that BlackCat staged an exit scam to evade scrutiny and resurface under a new brand in the future. A former administrator of a ransomware group said that “the rebranding is pending.”

    Black Cat Ransomware

    BlackCat’s infrastructure was seized by law enforcement in December 2023, but the electronic criminal gang managed to seize control of the servers and restart operations without any major consequences. The organization has previously carried out activities under the names “DarkSide” and “BlackMatter”.

    Malachi Walker, a security consultant at DomainTools, said: “BlackCat may have internal concerns about a mole within its organization, so preemptively shutting down the store may prevent an attack before it occurs.”

    “On the other hand, this exit scam could just be an opportunity for BlackCat to take the cash and run away. With cryptocurrencies once again reaching all-time highs, the gang can get away with selling their products at a ‘high price’. In the world of cybercrime, reputation is everything, and BlackCat appears to be severing ties with its affiliates through these actions. “

    As malware research group VX-Underground emerges, the group apparently dies and abandons its infrastructure report LockBit ransomware operations no longer support Lockbit Red (also known as Lockbit 2.0) and StealBit (a custom tool used by threat actors for data exfiltration).

    Internet security

    LockBit has also attempted to save face by moving some of its activities to a new darknet portal after a coordinated law enforcement operation dismantled its infrastructure last month following a months-long investigation.

    At the same time, Trend Micro revealed that a ransomware family called RA World (formerly RA Group) has successfully penetrated healthcare, financial and insurance companies in the United States, Germany, India, Taiwan and other countries since its emergence in April 2023. .

    The cybersecurity firm noted that the group’s attacks “involved multi-stage components designed to ensure the maximum impact and success of the group’s operations.”

    Did you find this article interesting?follow us Twitter  and LinkedIn to read more exclusive content from us.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    techempire
    • Website

    Related Posts

    Ongoing campaign bombards businesses with spam emails and phone calls

    6 common mistakes organizations make when deploying advanced authentication

    New Chrome zero-day vulnerability CVE-2024-4761 is being actively exploited

    Microsoft patches 61 flaws, including two actively exploited zero-day vulnerabilities

    Dutch court sentences Tornado Cash co-founder to 5 years in prison for money laundering

    Migrate from VMware vSphere to Microsoft Azure

    Leave A Reply Cancel Reply

    Top Reviews
    Editors Picks

    Chuzo Login

    Top Cooking Websites For Food Bloggers

    Katy Perry Goes To Space!

    Mr. Meowski’s Bakery To Re-Locate In St. Charles MO

    Legal Pages
    • About Us
    • Disclaimer
    • DMCA
    • Privacy Policy
    Our Picks

    Gateway Studios High-Tech Recording Studio To Open In Chesterfield, Missouri

    Edufox

    Emerging Academic Education Platforms – Sponsored By Edufox

    Top Reviews

    Type above and press Enter to search. Press Esc to cancel.