The BlackByte Ransomware group has Compromised entities in at least Three U.S. Critical Infrastructure Sectors, according to a Joint Warning issued by the FBI and the U.S. Secret Service on February 11th.
Days after that, right before the Super Bowl, the Group has also Infiltrated Servers owned by the San Francisco 49ers. The Team's Representatives have Confirmed the Hack after BlackByte posted a File that it supposedly Stole from the 49ers on its Website, according to Ars Technica. That 379MB File reportedly contained Billing Statements sent by the Team to its Partners that include AT&T and Pepsi.
The 49ers' Reps said they believe "the incident is limited to [their] corporate IT network" and has No Indication that it involved Outside systems, such as those "connected to Levi's Stadium Operations or ticket holders."
They've notified Law Enforcement and are working with Third-Party Cybersecurity firms to Investigate the Incident.
"We are working diligently to restore involved systems as quickly and as safely as possible," the Reps said. As for the Critical Infrastructures that were affected, the FBI and the Secret Service didn't name them, but they did say they're Government Facilities and in the Financial and Food & Agriculture sectors.
BlackByte is a Ransomware-as-a-Service (RaaS) Operation that allows Affiliates to use its Ransomware for a Percentage of the Proceeds. It first surfaced in July last year, but a Flaw in its system allowed Security Firm Trustwave to release a Decryption Tool that Victims were able to use for free instead of Paying the group to have their Files Unlocked. An Updated Version of the Ransomware patched that Flaw.
In their Warning, the Authorities said some Victims reported that the Bad Actors used a known Microsoft Exchange Server Vulnerability to gain access to their Networks. The Authorities have also released Filenames, Indicators of Compromise and Hashes that IT Personnel can use to Check their Networks for Presence of the Ransomware.
NYC Wins When Everyone Can Vote! Michael H. Drucker
No comments:
Post a Comment