BlackCat Ransomware Deploys New Signed Kernel Driver

In a new development, attackers deploying the BlackCat ransomware have started using a signed kernel driver to deploy their malicious payloads. This discovery was made by cybersecurity firm MalwareHunterTeam, who noticed that the latest version of BlackCat was now using a signed sys driver, making it easier to bypass security programs.

By utilizing this signed driver, the ransomware is able to bypass user access controls (UAC) to gain privileges without needing to be run as administrator. This makes BlackCat much more effective at infiltrating protected networks and encrypting vulnerable machines. Once inside the network, BlackCat can carry out its payload, encrypting data and making files inaccessible until a ransom is paid.

Unfortunately, this particular type of the ransomware is known for being highly complex and destructive. Fortunately, the MalwareHunterTeam has reported that the driver being used is an old version and is not digitally signed anymore. This means that it is potentially less dangerous than it could have been.

However, it pays to remain vigilant when it comes to cyber threats like ransomware. Network administrators should ensure that their antivirus programs are up to date with the latest signatures and that operations remain secure. It is also advised to make sure critical files and data are backed up in a safe and secure location, so that they can be restored should the situation ever arise.

No one is immune to cyberattacks, but the more prepared you are, the better chance you have of protecting your organization.

In a new development, attackers deploying the BlackCat ransomware have started using a signed kernel driver to deploy their malicious payloads. This discovery was made by cybersecurity firm MalwareHunterTeam, who noticed that the latest version of BlackCat was now using a signed sys driver, making it easier to bypass security programs.

By utilizing this signed driver, the ransomware is able to bypass user access controls (UAC) to gain privileges without needing to be run as administrator. This makes BlackCat much more effective at infiltrating protected networks and encrypting vulnerable machines. Once inside the network, BlackCat can carry out its payload, encrypting data and making files inaccessible until a ransom is paid.

Unfortunately, this particular type of the ransomware is known for being highly complex and destructive. Fortunately, the MalwareHunterTeam has reported that the driver being used is an old version and is not digitally signed anymore. This means that it is potentially less dangerous than it could have been.

However, it pays to remain vigilant when it comes to cyber threats like ransomware. Network administrators should ensure that their antivirus programs are up to date with the latest signatures and that operations remain secure. It is also advised to make sure critical files and data are backed up in a safe and secure location, so that they can be restored should the situation ever arise.

No one is immune to cyberattacks, but the more prepared you are, the better chance you have of protecting your organization.

Need secure managed IT for your business?