BlackByte-Ransomware nutzt neues Datendiebstahl-Tool für doppelte Erpressung

Teilen:

A BlackByte ransomware affiliate is using a new custom data stealing tool called ‘ExByte’ to steal data from compromised Windows devices quickly.

Data exfiltration is believed to be one of the most important functions in double-extortion attacks, with BleepingComputer told that companies are more commonly paying ransom demands to prevent the leak of data than to receive a decryptor.

Due to this, ransomware operations, including ALPHV und LockBit, are constantly working on improving their data theft tools.

Top-GeschichtenREAD MOREMicrosoft fixes Windows vulnerable driverblocklist sync issue

At the same time, other threat actors, like Karakurt, don’t even bother to encrypt local copies, solely focusing on data exfiltration.

The Exbyte data exfiltration tool

Exbyte was discovered by security researchers at Symantec, who say that the threat actors use the Go-based exfiltration tool to upload stolen files directly to the Mega cloud storage service.

Upon execution, the tool performs anti-analysis checks to determine if it’s running on a sandboxed environment and checks for debuggers and anti-virus processes.

The processes Exbyte checks are:

  • MegaDumper 1.0 by CodeCracker / SnD
  • Import reconstructor
  • x64dbg
  • x32dbg
  • OLLYDBG
  • WinDbg
  • The Interactive Disassembler
  • Immunity Debugger – [CPU]

Also, the malware checks for the presence of the following DLL files:

  • avghooka.dll
  • avghookx.dll
  • sxin.dll
  • sf2.dll
  • sbiedll.dll
  • snxhk.dll
  • cmdvrt32.dll
  • cmdvrt64.dll
  • wpespy.dll
  • vmcheck.dll
  • pstorec.dll
  • dir_watch.dll
  • api_log.dll
  • dbghelp.dll

The BlackByte ransomware binary also implements these same tests, but the exfiltration tool needs to run them independently since data exfiltration takes place before file encryption.

If the tests are clean, Exbyte enumerates all document files on the breached system and uploads them to a newly-created folder on Mega using hardcoded account credentials.

“Next, Exbyte enumerates all document files on the infected computer, such as .txt, .doc, and .pdf files, and saves the full path and file name to %APPDATA%dummy,” explains the report by Symantec.

“The files listed are then uploaded to a folder the malware creates on Mega.co.nz. Credentials for the Mega account used are hardcoded into Exbyte.”

BlackByte is still going strong

BlackByte launched operations in the summer of 2021, and by February 2022, the gang had breached many private and public organizations, including critical infrastructure in the United States.

Symantec analysts report that recent BlackByte attacks rely on exploiting last year’s ProxyShell and ProxyLogon flaw sets in Microsoft Exchange servers.

Moreover, the intruders use tools such as AdFind, AnyDesk, NetScan, and PowerView to move laterally.

Recent attacks employ version 2.0 of the ransomware, removing Kernel Notify Routines to bypass EDR protections, as Sophos analyzed in an October report.

Like other ransomware operations, BlackByte deletes volume shadow copies to prevent easy data restoration, modifies firewall settings to open up all remote connections, and eventually injects itself in a “scvhost.exe” instance for the encryption phase.

BlackByte’s commands to configure firewall on host (Symantec)

According to an Intel 471 report published yesterday, in Q3 2022, BlackByte targeted primarily organizations in Africa, likely to avoid provoking Western law enforcement.

https://www.bleepingcomputer.com/news/security/blackbyte-ransomware-uses-new-data-theft-tool-for-double-extortion/

Kommentar verfassen

Deine E-Mail-Adresse wird nicht veröffentlicht. Erforderliche Felder sind mit * markiert

lade-bild
London, GB
2:15 pm, Juli 7, 2025
Wetter-Symbol 20°C
L: 19° | H: 21°
broken clouds
Luftfeuchtigkeit: 50 %
Druck: 1012 mb
Wind: 11 mph NNW
Windböe: 0 mph
UV-Index: 0
Niederschlag: 0 mm
Wolken: 60%
Regen Chance: 0%
Sichtbarkeit: 10 km
Sonnenaufgang: 4:52 am
Sonnenuntergang: 9:18 pm
TäglichStündlich
Tägliche VorhersageStündliche Vorhersage
Today 10:00 pm
Wetter-Symbol
19° | 21°°C 0 mm 0% 13 mph 51 % 1014 mb 0 mm/h
Tomorrow 10:00 pm
Wetter-Symbol
12° | 24°°C 0 mm 0% 12 mph 76 % 1019 mb 0 mm/h
Mi. Juli 09 10:00 pm
Wetter-Symbol
15° | 25°°C 0.2 mm 20% 5 mph 68 % 1023 mb 0 mm/h
Do. Juli 10 10:00 pm
Wetter-Symbol
19° | 29°°C 0 mm 0% 6 mph 74 % 1024 mb 0 mm/h
Fr. Juli 11 10:00 pm
Wetter-Symbol
19° | 30°°C 0 mm 0% 11 mph 60 % 1023 mb 0 mm/h
Today 4:00 pm
Wetter-Symbol
20° | 21°°C 0 mm 0% 13 mph 47 % 1013 mb 0 mm/h
Today 7:00 pm
Wetter-Symbol
21° | 21°°C 0 mm 0% 10 mph 42 % 1013 mb 0 mm/h
Today 10:00 pm
Wetter-Symbol
17° | 17°°C 0 mm 0% 10 mph 51 % 1014 mb 0 mm/h
Tomorrow 1:00 am
Wetter-Symbol
15° | 15°°C 0 mm 0% 11 mph 65 % 1014 mb 0 mm/h
Tomorrow 4:00 am
Wetter-Symbol
12° | 12°°C 0 mm 0% 12 mph 76 % 1015 mb 0 mm/h
Tomorrow 7:00 am
Wetter-Symbol
15° | 15°°C 0 mm 0% 10 mph 72 % 1016 mb 0 mm/h
Tomorrow 10:00 am
Wetter-Symbol
18° | 18°°C 0 mm 0% 10 mph 46 % 1017 mb 0 mm/h
Tomorrow 1:00 pm
Wetter-Symbol
22° | 22°°C 0 mm 0% 8 mph 35 % 1018 mb 0 mm/h
Name Preis24H (%)
Bitcoin(BTC)
€92,331.06
0.06%
Ethereum(ETH)
€2,173.73
1.20%
Fesseln(USDT)
€0.85
-0.02%
XRP(XRP)
€1.94
-0.04%
Solana(SOL)
€129.26
1.97%
USDC(USDC)
€0.85
0.01%
Dogecoin(DOGE)
€0.144557
1.63%
Shiba Inu(SHIB)
€0.000010
-0.31%
Pepe(PEPE)
€0.000009
0.16%
Nach oben scrollen