BlackByte ransomware uses new data theft tool for double-extortion

Share:

A BlackByte ransomware affiliate is using a new custom data stealing tool called ‘ExByte’ to steal data from compromised Windows devices quickly.

Data exfiltration is believed to be one of the most important functions in double-extortion attacks, with BleepingComputer told that companies are more commonly paying ransom demands to prevent the leak of data than to receive a decryptor.

Due to this, ransomware operations, including ALPHV and LockBit, are constantly working on improving their data theft tools.

Top StoriesREAD MOREMicrosoft fixes Windows vulnerable driverblocklist sync issue

At the same time, other threat actors, like Karakurt, don’t even bother to encrypt local copies, solely focusing on data exfiltration.

The Exbyte data exfiltration tool

Exbyte was discovered by security researchers at Symantec, who say that the threat actors use the Go-based exfiltration tool to upload stolen files directly to the Mega cloud storage service.

Upon execution, the tool performs anti-analysis checks to determine if it’s running on a sandboxed environment and checks for debuggers and anti-virus processes.

The processes Exbyte checks are:

  • MegaDumper 1.0 by CodeCracker / SnD
  • Import reconstructor
  • x64dbg
  • x32dbg
  • OLLYDBG
  • WinDbg
  • The Interactive Disassembler
  • Immunity Debugger – [CPU]

Also, the malware checks for the presence of the following DLL files:

  • avghooka.dll
  • avghookx.dll
  • sxin.dll
  • sf2.dll
  • sbiedll.dll
  • snxhk.dll
  • cmdvrt32.dll
  • cmdvrt64.dll
  • wpespy.dll
  • vmcheck.dll
  • pstorec.dll
  • dir_watch.dll
  • api_log.dll
  • dbghelp.dll

The BlackByte ransomware binary also implements these same tests, but the exfiltration tool needs to run them independently since data exfiltration takes place before file encryption.

If the tests are clean, Exbyte enumerates all document files on the breached system and uploads them to a newly-created folder on Mega using hardcoded account credentials.

“Next, Exbyte enumerates all document files on the infected computer, such as .txt, .doc, and .pdf files, and saves the full path and file name to %APPDATA%dummy,” explains the report by Symantec.

“The files listed are then uploaded to a folder the malware creates on Mega.co.nz. Credentials for the Mega account used are hardcoded into Exbyte.”

BlackByte is still going strong

BlackByte launched operations in the summer of 2021, and by February 2022, the gang had breached many private and public organizations, including critical infrastructure in the United States.

Symantec analysts report that recent BlackByte attacks rely on exploiting last year’s ProxyShell and ProxyLogon flaw sets in Microsoft Exchange servers.

Moreover, the intruders use tools such as AdFind, AnyDesk, NetScan, and PowerView to move laterally.

Recent attacks employ version 2.0 of the ransomware, removing Kernel Notify Routines to bypass EDR protections, as Sophos analyzed in an October report.

Like other ransomware operations, BlackByte deletes volume shadow copies to prevent easy data restoration, modifies firewall settings to open up all remote connections, and eventually injects itself in a “scvhost.exe” instance for the encryption phase.

BlackByte’s commands to configure firewall on host (Symantec)

According to an Intel 471 report published yesterday, in Q3 2022, BlackByte targeted primarily organizations in Africa, likely to avoid provoking Western law enforcement.

https://www.bleepingcomputer.com/news/security/blackbyte-ransomware-uses-new-data-theft-tool-for-double-extortion/

Leave a Comment

Your email address will not be published. Required fields are marked *

loader-image
London, GB
8:50 am, Jul 7, 2025
weather icon 14°C
L: 13° | H: 15°
broken clouds
Humidity: 88 %
Pressure: 1010 mb
Wind: 9 mph N
Wind Gust: 0 mph
UV Index: 0
Precipitation: 0 mm
Clouds: 75%
Rain Chance: 0%
Visibility: 10 km
Sunrise: 4:52 am
Sunset: 9:18 pm
DailyHourly
Daily ForecastHourly Forecast
Today 10:00 pm
weather icon
13° | 15°°C 1 mm 100% 11 mph 89 % 1014 mb 0 mm/h
Tomorrow 10:00 pm
weather icon
13° | 24°°C 0.2 mm 20% 11 mph 76 % 1020 mb 0 mm/h
Wed Jul 09 10:00 pm
weather icon
15° | 24°°C 0.35 mm 35% 5 mph 68 % 1023 mb 0 mm/h
Thu Jul 10 10:00 pm
weather icon
18° | 30°°C 0 mm 0% 6 mph 70 % 1024 mb 0 mm/h
Fri Jul 11 10:00 pm
weather icon
19° | 30°°C 0 mm 0% 11 mph 58 % 1023 mb 0 mm/h
Today 10:00 am
weather icon
14° | 16°°C 1 mm 100% 11 mph 89 % 1011 mb 0 mm/h
Today 1:00 pm
weather icon
17° | 23°°C 0.7 mm 70% 11 mph 73 % 1011 mb 0 mm/h
Today 4:00 pm
weather icon
18° | 21°°C 0 mm 0% 10 mph 56 % 1012 mb 0 mm/h
Today 7:00 pm
weather icon
21° | 21°°C 0 mm 0% 6 mph 41 % 1013 mb 0 mm/h
Today 10:00 pm
weather icon
17° | 17°°C 0 mm 0% 10 mph 51 % 1014 mb 0 mm/h
Tomorrow 1:00 am
weather icon
16° | 16°°C 0.2 mm 20% 10 mph 72 % 1015 mb 0 mm/h
Tomorrow 4:00 am
weather icon
13° | 13°°C 0 mm 0% 11 mph 76 % 1015 mb 0 mm/h
Tomorrow 7:00 am
weather icon
13° | 13°°C 0 mm 0% 9 mph 73 % 1017 mb 0 mm/h
Name Price24H (%)
Bitcoin(BTC)
€92,488.30
0.81%
Ethereum(ETH)
€2,184.74
2.13%
Tether(USDT)
€0.85
-0.01%
XRP(XRP)
€1.93
1.89%
Solana(SOL)
€128.92
2.54%
USDC(USDC)
€0.85
-0.01%
Dogecoin(DOGE)
€0.146931
5.57%
Shiba Inu(SHIB)
€0.000010
2.10%
Pepe(PEPE)
€0.000008
3.46%
Scroll to Top