HomeCII/OTBlackCat Spinoff Cicada3301 Utilizes Stolen Credentials Without Detection, Avoids EDR

BlackCat Spinoff Cicada3301 Utilizes Stolen Credentials Without Detection, Avoids EDR

Published on

spot_img

The ransomware landscape continues to evolve, with the emergence of a new and highly sophisticated threat known as Cicada3301. This malicious tool, named after the infamous 4chan puzzle project from the early 2010s, is a Rust-based ransomware variant that has been causing havoc since its debut on June 18. According to reports from its leak site, Cicada3301 has already compromised 21 companies within just two and a half months of its existence. The victims range from large enterprises to small businesses, spanning across various industries like healthcare, manufacturing, retail, and hospitality, primarily in Europe and North America.

Unlike its innocuous namesake, Cicada3301 is a serious cyber threat that closely resembles the BlackCat ransomware-as-a-service (RaaS) operation. This ransomware tool comes with advanced features aimed at making the encryption process smoother and more deliberate, setting it apart from other similar malware strains. Michael Gorelik, CTO of Morphisec, noted that Cicada3301 incorporates elements never seen before in ransomware, marking a significant advancement in cybercriminal tactics.

With the spotlight on the BlackCat RaaS, which has been under increased scrutiny from law enforcement, it’s not surprising to see offshoots like Cicada3301 emerge in the cyber threat landscape. While there is no concrete evidence linking the creators of Cicada3301 to BlackCat, the similarities in their malware suggest a shared knowledge base or possibly a derivative relationship between the two.

Cicada3301 distinguishes itself with its advanced tactics, such as customizable encryption processes that allow users to tailor the attack according to their specific objectives. Moreover, the ransomware leverages stolen credentials to penetrate deeper into targeted systems, employing sophisticated techniques like manipulating the legitimate tool “psexec” to escalate privileges and move laterally within victim networks.

Researchers have discovered that Cicada3301 is being delivered using EDRSandBlast, a C-based open-source tool that bypasses endpoint detection and response (EDR) protections. This strategic choice demonstrates the malware authors’ commitment to evading security measures and maximizing the impact of their attacks.

In a bid to enhance its obfuscation capabilities, Cicada3301 has undergone continuous improvements, resulting in newer versions that evade detection by antivirus software. Recent samples of the ransomware have evolved to bypass antivirus detection entirely, underscoring the need for enhanced cybersecurity measures to combat this emerging threat.

While the origins of Cicada3301 remain shrouded in mystery, it is crucial for companies to remain vigilant and safeguard their systems against this potent ransomware strain. By understanding the advanced tactics and techniques employed by Cicada3301, organizations can better prepare themselves to defend against the evolving landscape of cyber threats and protect their valuable data from falling into the hands of malicious actors.

Source link

Latest articles

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...

Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

 Fortinet on Wednesday said it observed "recent abuse" of a five-year-old security flaw in FortiOS...

More like this

MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors

 The Iranian threat actor known as MuddyWater has been attributed to a spear-phishing campaign targeting...

Meta denies viral claims about data breach affecting 17.5 million Instagram users, but change your password anyway

 Millions of Instagram users panicked over sudden password reset emails and claims that...

E-commerce platform breach exposes nearly 34 million customers’ data

 South Korea's largest online retailer, Coupang, has apologised for a massive data breach...