Researchers found evidence that the DarkSide ransomware gang has rebranded as a new BlackMatter ransomware operation.
BleepingComputer found evidence that after the clamorous Colonia Pipeline attack, the DarkSide ransomware gang has rebranded as a new BlackMatter ransomware operation. The experts analyzed encryption algorithms in a decryptor used by BlackMatter, which is actively attacking corporate entities.
BleepingComputer became aware of a victim that paid a $4 million ransom to BlackMatter gang. The company received by the cybercriminals gang both Windows and Linux ESXi decryptors.
BleepingComputer shared a decryptor from a BlackMatter victim with Emisosft CTO Fabian Wosar who confirmed that the new ransomware gang is using the same unique encryption methods (a custom implementation of Salsa20 matrix) implemented by the DarkSide.https://platform.twitter.com/embed/Tweet.html?creatorScreenName=securityaffairs&dnt=true&embedId=twitter-widget-0&features=eyJ0ZndfZXhwZXJpbWVudHNfY29va2llX2V4cGlyYXRpb24iOnsiYnVja2V0IjoxMjA5NjAwLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X2hvcml6b25fdHdlZXRfZW1iZWRfOTU1NSI6eyJidWNrZXQiOiJodGUiLCJ2ZXJzaW9uIjpudWxsfSwidGZ3X3NwYWNlX2NhcmQiOnsiYnVja2V0Ijoib2ZmIiwidmVyc2lvbiI6bnVsbH19&frame=false&hideCard=false&hideThread=false&id=1421504819890634754&lang=en&origin=https%3A%2F%2Fsecurityaffairs.co%2Fwordpress%2F120732%2Fcyber-crime%2Fdarkside-blackmatter-ransomware-similarities.html&sessionId=7c77807bb59d88e774e0da347f770e8831a99b8d&siteScreenName=securityaffairs&theme=light&widgetsVersion=1890d59c%3A1627936082797&width=500px
DarkSide also used an RSA-1024 implementation unique to their encryptor, which is the same used by BlackMatter.
The above and other similarities, such as the similar text on the leak sites, suggest that BlackMatter rebrand from DarkSide.
On its leak site BlackMatter states that it doesn’t attack:
- Critical infrastructure facilities (nuclear power plants, power plants, water treatment facilities).
- Oil and gas industry (pipelines, oil refineries).
- Defense industry.
- Non-profit companies.
[출처 : SecurityAffairs / 8.3.]