BlackCat/ALPHV attacks Greenfiber
The BlackCat/ALPHV Ransomware Gang's Attack on Greenfiber
The BlackCat/ALPHV ransomware gang has attacked Greenfiber. Greenfiber is a cellulose insulation manufacturer founded in 2000 and headquartered in North Carolina, USA. BlackCat/ALPHV posted Greenfiber to its data leak site on June 26th alongside screenshots of stolen PII.
Overview of BlackCat/ALPHV Ransomware
First observed in late 2021, BlackCat/ALPHV employs a well-developed RaaS (Ransomware-as-a-Service) platform that encrypts by way of an AES algorithm where the AES key is encrypted using an RSA public key. BlackCat/ALPHV has the ability to disable security tools and evade analysis. Over the course of 2022, BlackCat/ALPHV has rapidly become one of the more active RaaS platforms. Typically, BlackCat/ALPHV demands ransoms in the $400,000 to $3 million range but has exceeded $5 million.
Innovative Techniques and Affiliations
BlackCat/ALPHV is thought to be the first ransomware group using RUST, a secure programming language that offers exceptional performance for concurrent processing. The ransomware also leverages Windows scripting to deploy the payload and to compromise additional hosts. The developers have also been linked to DarkSide/BlackMatter ransomware attacks and may simply be a rebranding of those campaigns.
Double Extortion Schemes
BlackCat/ALPHV also exfiltrates victim data prior to the execution of the ransomware – including from cloud-based deployments - to be leveraged in double extortion schemes to compel payment of the ransom demand. They have one of the more generous RaaS offerings, offering as much as 80-90% cut to affiliates.
See Halcyon in action
Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!