Summary: BlackCat ransomware gang is targeting and exploiting the unpatched Exchange Servers with remote code execution (RCE) vulnerabilities. In this blog, we have explained how the BlackCat ransomware is exploiting the Exchange Servers. We’ve also discussed the steps to safeguard your Exchange Server and network from such malicious attacks.
BlackCat, also known as ALPHV or Noberus, was first observed in November 2021. It is one of the first ransomware developed with the Rust programming language. Modern programming helps the ransomware evade detection from specific security solutions that may fail to parse or analyze the RUST binaries (payloads).
Known for targeting and encrypting Windows, Linux, and VMWare instances, the BlackCat ransomware group is now exploiting the unpatched and vulnerable Microsoft Exchange Servers to gain access to the targeted organizations’ networks.
In this blog, you will learn the tactics and techniques used by the BlackCat ransomware to target and exploit vulnerable Exchange Servers and how to safeguard your servers or networks from the ransomware.
BlackCat ransomware gang runs Ransomware-as-a-Service (RaaS) scheme, providing other attackers access to their malicious code and infrastructure to exploit the targeted networks or servers. In return, the gang negotiates the ransom with the victims and shares a specific ransom amount with the attackers. Thus, anyone accessing a compromised Exchange Server environment can use the BlackCat ransomware samples to infect the server and encrypt the data for a ransom.
The BlackCat ransomware group claims to be the rebranded successor to the notorious BlackMatter and REvil ransomware groups. It uses several similar tactics and techniques to attack and infiltrate Exchange Servers.
There is at least one known BlackCat ransomware attack incident on a vulnerable Exchange Server observed by Microsoft’s security researchers. The attackers moved slowly into the victims’ network, stole the credentials, and exfiltrated the information to use it for extortion or ransom.
Later, the threat actor deployed the BlackCat ransomware payload using the PsExec tool. Although the threat actors used the entry vectors, such as remote desktop applications and stolen credentials, they also exploited the Exchange Server vulnerabilities to gain access to the target network.
To protect and safeguard your Exchange Server and network infrastructure from such ransomware, follow the best security practices and policies with advanced Exchange-aware protection capabilities to detect and block such attacks. Most importantly, upgrade your Exchange Server to the latest Cumulative Updates and install the latest Security Updates to patch the vulnerabilities. If you are running an older Exchange version, such as 2010, it is recommended that you immediately upgrade to a latest version, preferably Exchange Server 2016 or 2019.
In addition, follow the below steps to check the server health, find vulnerabilities, and patch them.
You can download the Microsoft Exchange Server Health Checker Script or HealthChecker.ps1 script from the official GitHub page and follow the steps below to execute it on your Exchange Server 2013, 2016, or 2019 to find health issues and vulnerabilities and fix or patch them to safeguard the server.
Set-ExecutionPolicy -Scope Process -ExecutionPolicy Bypass
If the report shows vulnerabilities, use the links in the HTML report to download and install the updates. You can also refer to our detailed guide to download and install the latest Cumulative Updates and Security Updates on your Exchange Server.
Ransomware gangs often target unpatched and vulnerable Microsoft Exchange Servers to compromise the network and encrypt the devices or data to extort ransom. For example, BlackCat is a ransomware group that deploys ransomware on compromised networks. According to Microsoft 365 Defender Threat Intelligence Team, the threat actors leverage the Exchange Server vulnerabilities to gain access to the target network.
Thus, the best defense against BlackCat and similar malicious attacks is to install the latest Cumulative and Security updates released by Microsoft as soon as possible. However, if your server is compromised or crashed due to BlackCat or any other ransomware attack, set up a new Exchange Server and restore the mailbox databases from the backup.
If the backup isn’t available, recover the mailboxes from the databases on the compromised server with the help of Exchange recovery software, such as Stellar Repair for Exchange, and restore them to the newly setup server.
To stay updated on newer Exchange Server threats, vulnerabilities, and updates, follow our consistently updated blog on Microsoft Exchange RCE Vulnerability Flaws and Their Fixes.
Ravi Singh is a Senior Writer at Stellar®. He is an expert Tech Explainer, IoT enthusiast, and a passionate nerd with over 7 years of experience in technical writing. He writes about Microsoft Exchange, Microsoft 365, Email Migration, Linux, Windows, Mac, DIY Tech, and Smart Home. Ravi spends most of his weekends working with IoT (DIY Smart Home) devices and playing Overwatch. He is also a solo traveler who loves hiking and exploring new trails.
Software recommended by MVPs & AdministrRead More
5-in-1 suite of specialized tools, highlRead More
Stellar Converter for EDB is a professioRead More
Powerful software trusted by Microsoft MRead More