Ransom.BlackByte

ThreatDown is now the name of the Malwarebytes line of business products. References to Malwarebytes below reflect the amazing technology used to first identify the threat.

Short bio

Ransom.BlackByte is Malwarebytes’ detection name for a a Ransomware-as-a-Service (RaaS) group that encrypts files on compromised systems.

Type of infection

Ransom.BlackByte is ransomware as a service. Ransomware in general makes files on the victims system unusable until the ransom is paid. Ransomware as a service can be delivered in many ways, which depend on the affiliate that is deploying the ransomware. For now, Ransom.BlackByte seems to use a known Microsoft Exchange Server vulnerability to establish a first base and use worm like capabilities to spread across a network.

Malicious behavior

The BlackByte executable leaves a ransom note in all directories where encryption occurs. The ransom note includes the .onion site that contains instructions for paying the ransom and receiving a decryption key.

Protection

Malwarebytes blocks Ransom.BlackByte

Home remediation

You can use the Malwarebytes Anti-Malware Nebula console to scan endpoints.

Nebula endpoint tasks menu

Choose the Scan + Quarantine option. Afterwards you can check the Detections page to see which threats were found.

On the Quarantine page you can see which threats were quarantined and restore them if necessary.

All component/technology detections are passed to the remediation engine for complete removal from infected systems. This industry leading technology uses patented techniques in identifying all cohorts or associated files for a single threat and removes them all together to prevent malware from resuscitating itself. If you are using Malwarebytes Ransomware Rollback technology, it allows you to wind back the clock to negate the impact of ransomware by leveraging just-in-time backups. If not, for older variants of Ransom.BlackByte there is a decryptor avvailable.