BlackSuit Ransomware

Download Now

About This Threat Profile

First Identified: 2023

Operation style:
Private ransomware operation.

Extortion method:
Double extortion – combining the traditional ransomware extortion method (encryption) with exfiltration of victim’s sensitive data; the group threatens to leak the data via a data leak site if the ransom demand is not paid.

Most frequently targeted industry:

  • Industrials (Manufacturing)
  • Industrials (Construction & Engineering)
  • Healthcare

Most frequently targeted victim HQ region: United States, North America

Select MITRE ATT&CK Mappings

    • Initial Access
      • Valid accounts, abuse of external remote services, drive-by compromise, vulnerability exploitation, supply chain attacks, social engineering (MITRE ATT&CK: T1078, T1133, T1189, T1190, T1195, T1566)
    • Persistence
      • Scheduled tasks, valid accounts, boot/logon autostart execution (MITRE ATT&CK: T1053, T1078, T1547)
    • Lateral Movement
      • Abuse of remote services, alternate authentication material, lateral tool transfer (MITRE ATT&CK: T1021, T1550, T1570)

Description

Black Suit Ransomware was first discovered in May 2023 and operates in the double extortion method, where victim data is stolen and leaked via a data leak site if the ransom demand is not paid. Black Suit has been assessed to be a likely rebrand of the Royal ransomware operation due to the similarities in their binaries.

Black Suit operators have been reported to often demand between $1 million and $10 million ransom demands from victims. Black Suit ransomware operators have been observed gaining initial access via social engineering attacks, torrent websites, malicious ads, and deployment via additional malware.

The 32-bit Windows variants of the Black Suit and Royal ransomware variants share a 93.2% similarity in functions, 99.3% similarity in basic blocks, and 98.4% similarity in jumps. Both variants also use OpenSSL’s AES for encryption and leverage similar intermittent encryption techniques. The Black Suit and Royal Linux ransomware share 98% similarity in function, 99.5% similarity in blocks, and 98.9% similarity in jumps.

Black Suit uses OpenSSL’s AES for encryption and uses an intermittent encryption technique to accelerate the encryption process. Black Suit, similar to Royal, prepares the files for encryption by rounding up the file size to the nearest multiple of 16, after which 41 bytes are added. A check is then performed for the file being encrypted to determine if the size is greater than 0x40000h. If the condition is met, it will use the value set using “-percent.” The number of bytes to be used for intermittent encryption is then calculated using the same formula found in the Linux version of Royal ransomware. When files are encrypted, they are appended with the “.blacksuit” extension.

Similar to Royal, Black Suit is not considered to be a ransomware-as-a-service (RaaS); there are no known affiliates of the Black Suit ransomware operation. Additionally, Royal had been tied to the Conti ransomware operation that ended in 2022; it is widely believed the group splintered into multiple smaller groups and rebranded to evade law enforcement detection.

In October 2024, Barracuda researchers reported that the Black Suit operation was likely the sixth generation of the Hermes ransomware. Hermes was first observed being sold on cybercriminal forums in 2016. Hermes was then linked to the Ryuk operation in 2018 based on code similarities. Ryuk was then assessed to operate the Conti Ransomware operation in 2019. Conti operated until 2022 when a Ukrainian researcher with access to Conti resources leaked their operations’ information. Zeon Ransomware was then identified in 2022, the Zeon operation rebranded to Royal Ransomware.

DATE PUBLISHEDDecember 12, 2024
AUTHORBlackpoint Cyber

Subscribe to the Blackpoint Blog

Don’t let a lack of awareness leave the organizations you protect vulnerable to sophisticated and elusive attacks. Subscribe now for a weekly roundup of Blackpoint’s empowering articles.

Subscribe now!