Threat Actor Characterization
You’re viewing the read-only version.
Sign in for analyst tools (editors, promote draft, file/relations management, etc.)
BlackByte
ID: 3f0e519a5487a9347e8e043504a42bc066612
Cybercrime
Cybercriminal
Threat types: Ransomware, Data Leak, Intrusion
Progress: 35%
Completeness: 28%
Freshness: 50%
Operation zone: UNKNOWN
Aliases
Limited alias preview
No aliases registered.
Actor Network Graph
Open Network GraphMITRE ATT&CK®
confidence: medium
BlackByte is a ransomware threat actor operating since at least 2021. BlackByte is associated with several versions of ransomware also labeled BlackByte Ransomware. BlackByte ransomware operations initially used a common encryption key allowing for the development of a universal decryptor, but subsequent versions such as BlackByte 2.0 Ransomware use more robust encryption mechanisms. BlackByte is notable for operations targeting critical infrastructure entities among other targets across North America. Ref: https://attack.mitre.org/groups/G1043/
| Technique | Technique name | Tactics | Evidence |
|---|---|---|---|
| T1021.001 | Remote Desktop Protocol | TA0008 |
|
| T1021.002 | SMB/Windows Admin Shares | TA0008 |
|
| T1036.008 | Masquerade File Type | TA0005 |
|
| T1053.005 | Scheduled Task | TA0002 TA0003 TA0004 |
|
| T1055.012 | Process Hollowing | TA0004 TA0005 |
|
| T1059.001 | PowerShell | TA0002 |
|
| T1059.003 | Windows Command Shell | TA0002 |
|
| T1070.004 | File Deletion | TA0005 |
|
| T1071.001 | Web Protocols | TA0011 |
|
| T1078.002 | Domain Accounts | TA0001 TA0003 TA0004 TA0005 |
|
| T1087.002 | Domain Account | TA0007 |
|
| T1134.003 | Make and Impersonate Token | TA0004 TA0005 |
|
| T1136.002 | Domain Account | TA0003 |
|
| T1491.001 | Internal Defacement | TA0040 |
|
| T1505.003 | Web Shell | TA0003 |
|
| T1518.001 | Security Software Discovery | TA0007 |
|
| T1543.003 | Windows Service | TA0003 TA0004 |
|
| T1547.001 | Registry Run Keys / Startup Folder | TA0003 TA0004 |
|
| T1562.001 | Disable or Modify Tools | TA0005 |
|
| T1562.004 | Disable or Modify System Firewall | TA0005 |
|
| T1569.002 | Service Execution | TA0002 |
|
| T1583.003 | Virtual Private Server | TA0042 |
|
| T1608.001 | Upload Malware | TA0042 |
|
| T1614.001 | System Language Discovery | TA0007 |
|
Executive brief
now
Saved successfully.
Hunting Playbook
now
Saved successfully.
IOC Appendix
now
Saved successfully.
OSINT Library
now
Saved successfully.