BlackByte Ransomware Exploits New VMware ESXi Vulnerability in Latest Attack

On August 28, 2024, Cisco Talos Incident Response (Talos IR) released a detailed threat spotlight report on the BlackByte ransomware group, revealing the group's adaptation of newly disclosed vulnerabilities to enhance their attack capabilities.

BlackByte Ransomware Exploits New VMware ESXi Vulnerability in Latest Attack
The original image was generated by OpenAI's DALL-E and edited by the author. Source: OpenAI (August 2024)

Introduction

On August 28, 2024, Cisco Talos Incident Response (Talos IR) released a detailed threat spotlight report on the BlackByte ransomware group, revealing the group's adaptation of newly disclosed vulnerabilities to enhance their attack capabilities. The report highlights BlackByte's use of an authentication bypass vulnerability, CVE-2024-37085, in VMware ESXi to propagate their ransomware alongside their established methods of bypassing security protections through vulnerable drivers.

Report Overview

BlackByte, a ransomware-as-a-service (RaaS) group believed to be an offshoot of the notorious Conti group, has been active since mid-2021. The group is known for strategically using vulnerable drivers to evade security controls, deploying self-propagating ransomware, and leveraging legitimate system binaries as part of its attack chain. Over time, BlackByte has consistently refined its tradecraft, incorporating a mix of Go, .NET, and C++ languages in their ransomware binaries to improve resilience against detection.

In a recent investigation by Talos IR, BlackByte attackers gained initial access to a victim's network using valid credentials via the organization's VPN. While telemetry limitations obscured the exact method used to obtain these credentials, Talos IR speculates that brute-force attacks or previously compromised credentials might have played a role. The compromised account, featuring a weak password and primary naming convention, lacked multi-factor authentication (MFA), facilitating the attack.

After establishing initial access, the attackers escalated privileges by compromising Domain Admin-level accounts. These accounts were used to gain control over VMware ESXi hypervisors by exploiting CVE-2024-37085. This authentication bypass vulnerability allows attackers to elevate privileges on ESXi hosts. Within days of the vulnerability's disclosure, BlackByte had incorporated it into their attack arsenal, demonstrating their agility in adapting to new opportunities.

Talos IR observed that BlackByte's ransomware binary, now updated to append the file extension "blackbytent_h" to encrypted files, deploys four vulnerable drivers during execution. This marks an increase from the previously observed two or three drivers, highlighting the group's ongoing efforts to enhance their ransomware's propagation capabilities.

The BlackByte group's attacks pose a significant threat to organizations, particularly those in the manufacturing sector, which accounted for over 32% of the group's known victims. Using a newly disclosed vulnerability in VMware ESXi underscores the broader risk of ransomware groups quickly adopting emerging exploits, leading to potentially severe consequences for unpatched or misconfigured systems.

Insights and Analysis

Cisco Talos' analysis emphasizes the importance of swift and comprehensive vulnerability management to mitigate the risks posed by groups like BlackByte. Incorporating newly disclosed vulnerabilities into ransomware operations is a stark reminder of the dynamic nature of cyber threats and the need for organizations to stay ahead of attackers through proactive security measures.

To defend against the evolving tactics of ransomware groups like BlackByte, organizations should consider the following measures as a baseline in defence in depth.

  1. Implement Multi-Factor Authentication (MFA)
  2. Audit and Harden VPN Configurations
  3. Monitor Privileged Accounts
  4. Limit NTLM Usage
  5. Disable SMBv1 and Enforce SMB Signing
  6. Deploy and Secure EDR

The BlackByte ransomware group's rapid exploitation of newly disclosed vulnerabilities like CVE-2024-37085 highlights the critical need for organizations to maintain a robust and adaptive security posture. By implementing proactive measures and staying vigilant against emerging threats, organizations can reduce their risk of falling victim to increasingly sophisticated ransomware attacks.

Indicators of Compromise (IOCs)

IndicatorTypeDescription
01aa278b07b58dc46c84bd0b1b5c8e9ee4e62ea0bf7a695862444af32e87f1fdFile HashHash of the vulnerable driver file RtCore64.sys.
0296e2ce999e67c76352613a718e11516fe1b0efc3ffdb8918fc999dd76a73a5File HashHash of the vulnerable driver file DBUtil_2_3.sys.
543991ca8d1c65113dff039b85ae3f9a87f503daec30f46929fd454bc57e5a91File HashHash of the vulnerable driver file zamguard64.sys.
31f4cfb4c71da44120752721103a16512444c13c2ac2d857a7e6f13cb679b427File HashHash of the vulnerable driver file gdrv.sys.

MITRE ATT&CK Mapping

TacticTechniqueIDDescription
Initial AccessValid Accounts: Domain AccountsT1078.002Compromise of valid domain accounts for initial access to the environment.
Initial AccessValid Accounts: Local AccountsT1078.003Compromise of valid local accounts for initial access to the environment.
DiscoveryRemote System DiscoveryT1018Adversary attempts to discover remote systems within the network.
DiscoveryFile and Directory DiscoveryT1083Adversary searches through directories and files to find critical information.
PersistenceCreate Account: Domain AccountT1136.002Adversary creates a new domain account for persistence in the environment.
ExecutionUser ExecutionT1204Adversary executes malicious code via user interactions.
ExecutionSystem Services: Service ExecutionT1569.002Adversary executes code by creating or modifying system services.
Privilege EscalationCreate or Modify System ProcessT1543Adversary escalates privileges by modifying system processes.
Privilege EscalationDomain Policy ModificationT1484.001Adversary modifies domain policies to escalate privileges.
Privilege EscalationDomain ModificationT1484Adversary makes modifications to the domain infrastructure.
Privilege EscalationAccount ManipulationT1098Adversary manipulates account settings for privilege escalation.
Lateral MovementRemote Services: SMB/Windows Admin SharesT1021.002Adversary uses SMB or Windows Admin Shares for lateral movement.
Lateral MovementRemote Services: Remote Desktop ProtocolT1021.001Adversary uses Remote Desktop Protocol for lateral movement.
Lateral MovementExploitation of Remote ServicesT1210Adversary exploits vulnerabilities in remote services to move laterally.
Resource DevelopmentStage CapabilitiesT1608Adversary stages capabilities for further attacks.
Defense EvasionImpair Defenses: Disable or Modify ToolsT1562.001Adversary disables or modifies security tools to evade defenses.
Defense EvasionModify RegistryT1112Adversary modifies the system registry for evasion or persistence.
Defense EvasionIndicator Removal: File DeletionT1070.004Adversary deletes files to remove indicators of compromise.
Defense EvasionExploitation for Defense EvasionT1211Adversary exploits vulnerabilities to evade defenses.
ImpactSystem Shutdown/RebootT1529Adversary causes a system shutdown or reboot to interrupt operations.
ImpactData Encrypted for ImpactT1486Adversary encrypts data to render it inaccessible and demand a ransom.

References

BlackByte blends tried-and-true tradecraft with newly disclosed vulnerabilities to support ongoing attacks
In recent investigations, Talos Incident Response has observed the BlackByte ransomware group using techniques that depart from their established tradecraft. Read the full analysis.
NVD - CVE-2024-37085