Tactic;Technique;Description
TA0001 Initial Access;T1190 Exploit Public-Facing Application;In a number of attacks, the threat actors used ProxyShell vulnerablilities (CVE-2021-34473, CVE-2021-34523, CVE-2021-31207).
;T1133 External Remote Services;As an initial attack vector, insecure RDP and VPNs may be used.
;T1078 Valid Accounts;BlackCat affiliates may purchase access to their victim’s network infrastructure on underground forums.
TA0002 Execution;T1106 Native API;BlackCat ransomware uses Native API.
;T1053 Scheduled Task/Job;When deploying ransomware in the victim’s network infrastructure, BlackCat affiliates may exploit group policies, which results in a scheduled task being created (on each host) that launches the ransomware.
;T1059.001 Command and Scripting Interpreter: PowerShell;The attackers may use PowerShell scripts when deploying ransomware in the victim’s network, disabling security tools, and encrypting files.
;T1059.003 Command and Scripting Interpreter: Windows Command Shell;For stopping IIS, deleting Volume Shadow Copies, disabling recovery, clearing Windows event logs, etc., the BlackCat ransomware uses the command shell to run appropriate commands.
;T1047 Windows Management Instrumentation;The attackers may use wmic to obtain information and run various commands, including to delete Volume Shadow Copies. They may also use the wmiexec module from Impacket to execute commands and move across the network.
;T1569.002 System Services: Service Execution;The BlackCat ranswomare for Windows can self-propagate in the local area network using the legitimate PsExec utility (contained in its body), which creates a temporary system service.
TA0003 Persistence;T1505 Server Software Component;Successfully exploiting ProxyShell vulnerabilities enabled the attackers to place a web shell on a vulnerable Microsoft Exchange server.
;T1078 Valid Accounts;Legitimate accounts obtained by the attackers can be used to ensure persistence in the compromised infrastructure.
TA0004 Privilege Escalation;T1078 Valid Accounts;To escalate privileges, BlackCat may use stolen legitimate accounts specified in the configuration data.
;T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control;To bypass UAC, BlackCat ransomware may escalate privileges using the ICMLuaUtil COM interface, as well as use the Masquerade PEB method.
;T1134.002 Access Token Manipulation: Create Process with Token;To escalate privileges, the BlackCat ransomware can launch its process using stolen authentication data and the function CreateProcessWithLogonW.
TA0005 Defense Evasion;T1548.002 Abuse Elevation Control Mechanism: Bypass User Account Control;The attackers may bypass UAC using the ICMLuaUtil COM interface, as well as use the Masquerade PEB method.
;T1140 Deobfuscate/Decode Files or Information;BlackCat decrypts configuration data as well as decrypts and unpacks the legitimate PsExec utility and an additional BAT file contained in the body of the ransomware.
;T1027 Obfuscated Files or Information;BlackCat ransomware uses obfuscation.
;T1562.001 Impair Defenses: Disable or Modify Tools;To prevent being detected, the attackers end processes and services related to security and antivirus software.
;T1497 Virtualization/Sandbox Evasion;To counter analysis (including in a sandbox), ALPHV MORPH checks the value of the command line parameter access-token. Its value must contain correct first 16 characters used to decrypt BlackCat configuration data.
;T1070.001 Indicator Removal on Host: Clear Windows Event Logs;By using wevtutil, BlackCat can clear all Windows event logs on a compromised host.
;T1036 Masquerading;The attackers use a SoftPerfect Network Scanner executable renamed to svchost.exe.
;T1112 Modify Registry;To propagate, BlackCat uses PsExec to modify the system registry parameter MaxMpxCt to increase the number of failed network requests for each client.
TA0006 Credential Access;T1003.001 OS Credential Dumping: LSASS Memory;To obtain authentication data, the attackers may dump the LSASS process using legitimate tools (procdump, comsvcs.dll).
;T1552 Unsecured Credentials;To obtain authentication data from the registry and files, the attackers may use NirSoft utilities.
;T1555 Credentials from Password Stores;To extract authentication data from web browsers and other storage spaces the attackers may use NirSoft utilities.
TA0007 Discovery;T1018 Remote System Discovery;To enumerate domain hosts, the attackers used the ADRecon tool.
;T1069.002 Permission Groups Discovery: Local Groups;To obtain information about local and domain user groups, the attackers used the ADRecon tool.
;T1069.002 Permission Groups Discovery: Local Groups;
;T1069.002 Permission Groups Discovery: Domain Groups;
;T1087.001 Account Discovery: Local Account;To obtain information about local and domain accounts, the attackers used the ADRecon tool.
;T1087.002 Account Discovery: Domain Account;
;T1482 Domain Trust Discovery;To obtain information about domain trust, the attackers used the ADRecon tool.
;T1046 Network Service Scanning;To scan the target network, the attackers use the open-source utility SoftPerfect Network Scanner.
;T1135 Network Share Discovery;To search for network shares, the attackers use the open-source utility SoftPerfect Network Scanner.
;T1016 System Network Configuration Discovery;For network reconnaissance, the attackers use the open-source utility SoftPerfect Network Scanner.
;T1082 System Information Discovery;BlackCat uses wmic to obtain the UUID of the compromised host.
;T1057 Process Discovery;BlackMatter enumerates all running processes to search for ones relating to security, backups, databases, email systems, office programs, etc.
;T1007 System Service Discovery;BlackCat enumerates system services to search for ones relating to security, backups, and databases.
;T1083 File and Directory Discovery;The attackers enumerate drives, directories, and files to search for sensitive information for exfiltration purposes.
TA0008 Lateral Movement;T1021.001 Remote Services: Remote Desktop Protocol;The attackers may use RDP to move across the network.
;T1021.002 Remote Services: SMB/Windows Admin Shares;After obtaining privileged authentication data, in order to spread over the local area network and access network resources, the attackers may use the PsExec utility, as well as the psexec, wmiexec and smbexec modules from Impacket.
;T1021.004 Remote Services: SSH;To access parts of the infrastructure running on Linux, the attackers use the PuTTY utility.
;T1570 Lateral Tool Transfer;Moving across the victim’s network and deploying ransomware involves copying related tools to the host. The BlackCat ransomware can self-propagate in the network by using the legitimate PsExec utility contained in its body.
TA0009 Collection;T1560.001 Archive Collected Data: Archive via Utility;Before being exfiltrated, data may be put in archives using 7-Zip.
;T1005 Data from Local System;The attackers collect information from the local system for exfiltration purposes.
;T1039 Data from Network Shared Drive;The attackers collect information from available network resources for exfiltration purposes.
;T1074 Data Staged;Before exfiltration, the attackers may put collected data in 7Zip archives.
;T1119 Automated collection;The attackers use ExMatter, a tool for automated collection of sensitive information.
TA0011 Command and Control;T1071 Application Layer Protocol;Remote access tools used by the attackers may use application layer protocols (HTTP, HTTPS, DNS).
;T1105 Ingress Tool Transfer;After gaining initial access, the attackers copy tools necessary for deployment to the compromised host.
;T1572 Protocol Tunneling;To access the compromised system, the attackers may use tunnels built using ngrok or gost.
;T1573 Encrypted Channel;To remotely access the compromised infrastructure, the attackers may use Cobalt Strike, TeamViewer and ScreenConnect, which perform asymmetric/symmetric encryption of the C&C server communication channel.
;T1219 Remote Access Software;To remotely access the compromised infrastructure, the attackers may use the legitimate tools TeamViewer and ScreenConnect.
TA0010 Exfiltration;T1041 Exfiltration Over C2 Channel;When the attackers use Cobalt Strike, the collected information may be sent via Cobalt Strike server communication channels.
;T1048.002 Exfiltration Over Alternative Protocol: Exfiltration Over Asymmetric Encrypted Non-C2 Protocol;The attackers may use the ExMatter exfiltration tool, which sends stolen data to SFTP and WebDav resources specified in the ExMatter configuration.
;T1567.002 Exfiltration Over Web Service: Exfiltration to Cloud Storage;The attackers use the Rclone synchronization utility to upload stolen data to the legitimate cloud storage service MEGA.
;T1020 Automated Exfiltration;After access has been gained, files from target hosts are automatically uploaded to the legitimate cloud storage service MEGA using the Rclone utility.
;T1030 Data Transfer Size Limits;To prevent exceeding the size limits of the data being sent and triggering security controls, the stolen data may be sent in fixed-size blocks.
TA0040 Impact;T1486Data Encrypted for Impact ;BlackCat encrypts the contents of files in the local system as well as on available network resources.
;T1489 Service Stop;BlackCat stops security, backup, database, email and other services specified in the configuration.
;T1490 Inhibit System Recovery;BlackCat deletes Windows Volume Shadow Copies using vssadmin and wmic, disables recovery in the Windows boot menu using bccedit, and empties Recycle Bin. BlackCat can stop backup services. BlackCat can destroy virtual machine snapshots.
;T1485Data Destruction ;If credentials for accessing a chat with the victim are leaked, BlackCat affiliates may delete encryption keys, which will render decrypting the files impossible.
;T1498 Network Denial of Service ;If the victim refuses to pay a ransom, BlackCat may carry out DDoS attacks against the victim’s infrastructure.