Back to Resources

SentinelOne Vs. BlackByte Ransomware – Mitigation and Rollback

Watch how SentinelOne mitigates and rolls back BlackByte. BlackByte’s highly-obfuscated JS Loader is delivered via multiple methods (watering hole, exploit kit, other malware/frameworks). The obfuscated JavaScript is typically used to prep the victim for further activity (ex: facilitating the modification of firewall rules for exfiltration) as well as receiving/decoding the main payload (encryptor) for execution. The JS Loader modifies various services and system components that may inhibit the encryption process. This includes the disabling of VSS / Volume Shadow Copies as well as disabling MSQL services.

The Loader also targets the Raccine security product specifically, attempting to shut down or circumvent components of that product. BlackByte ransomware started gaining greater visibility in August of 2021, with the unveiling of their victim “data auction”/blog site.

지금 읽기

세계에서 가장 앞선 사이버 보안 플랫폼 경험하기

지능적인 자율형 사이버 보안 플랫폼이 현재와 미래의 조직을 어떻게 보호할 수 있는지 알아보세요.