Over Mother’s Day weekend, we heard of the latest ransomware attack that affected Colonial Pipeline, the IT infrastructure of the pipeline that carries 2.5 million barrels a day, roughly 45% of the United States East Coast's supply of diesel, petrol and jet fuel. On Monday, May 10, the FBI confirmed that the attack on Colonial Pipeline is a ransomware known as DarkSide.
In this blog we consume Cyber Threat Intelligence to understand how the DarkSide ransomware behaves, we create and share an adversary emulation plan so you can quickly test, measure, and improve your people, process, and technology for similar attacks, and we discuss how to detect and respond to DarkSide ransomware.
The DarkSide ransomware has been used for 9-10 months per Catalin Cimpanu which gives us a good foundation of Cyber Threat Intelligence (CTI). This adversary emulation plan is based on Cybereason’s intel from April 2021. We see that DarkSide has evolved like Maze, Ryuk and Egregor to perform double extortion. Double extortion is when the threat group steals files from the victim to post on their website in order to pressure victims into paying as well as encrypting all the files and only offering to unlock them after payment is received.
According to DarkTracer: DarkWeb Criminal Intelligence, DarkSide has attacked 3 other Oil and Gas companies since November 2020.
From the CTI, there are a few things that stick out that we should test our organization’s for:
As usual, we have shared the adversary emulation plan with the community through our GitHub. There is a little bit of setup as this threat actor leverages poor operational security such as direct IP address access and HTTP.
Ensure you have the HTTP relay installed on your SCYTHE server or on a different host and redirecting to your SCYTHE server. Create a new SCYTHE campaign as you would normally do but select HTTP as the communication method. Ensure the parameters are correct for your relay configuration. The Cyber Threat Intelligence shows that “naked IPs” were used so you may want to set the parameters to an IP address instead of a domain name.
In the automation steps screen, import from existing threats: DarkSide. Here are a few steps from the plan we want to call out:
According to the Cyber Threat Intelligence, the threat actor leveraged PowerShell.exe and CertUtil.exe to download and then execute the ransomware.
SCYTHE server will always push you to HTTPS as a method of operational security. However, we can still test by going to a direct IP address:
In an attempt to not sound like a broken record, we will focus on what makes this ransomware different to detect and respond to. As usual, making daily backups and restoring will get you back and running as quickly as possible when the inevitable happens. However, you can detect and respond much earlier by building detection for these TTPs:
We can no longer ignore ransomware as an annoying attack that affects everyone but us. No company is immune to these attacks and therefore needs to be prepared. In this post we leveraged Cyber Threat Intelligence from Cybereason to understand how this adversary behaves, we created and shared an adversary emulation plan so you can quickly test, measure, and improve your people, process, and technology against similar attacks, and we discuss how to detect and respond to DarkSide ransomware.
This Threat Thursday post discusses active research by SCYTHE and other cited third parties into an ongoing threat. The information in this post should be considered preliminary and may be updated as research continues. This information is provided “as-is” without any warranty or condition of any kind, either express or implied.
SCYTHE provides an advanced attack emulation platform for the enterprise and cybersecurity consulting market. The SCYTHE platform enables Red, Blue, and Purple teams to build and emulate real-world adversarial campaigns in a matter of minutes. Customers are in turn enabled to validate the risk posture and exposure of their business and employees and the performance of enterprise security teams and existing security solutions. Based in Arlington, VA, the company is privately held and is funded by Gula Tech Adventures, Paladin Capital, Evolution Equity, and private industry investors. For more information email info@scythe.io, or follow on Twitter @scythe_io.