Connect with us

Hi, what are you looking for?

Tech & Science

Logistics operations at increased risk from BlackCat operators

Protecting the supply chain from malware like BlackCat can be as easy.

Image: © AFP/File Fred TANNEAU
Image: © AFP/File Fred TANNEAU

BlackCat is a malicious software, deployed as a form of ‘ransomware-as-a-service’, in that BlackCat is seeking affiliates to deploy its ransomware. Affiliates keep a 90 percent share of the ransom payment, with the remainder going to the BlackCat author.

One of the concerns with the ransomware package is with its highly-customizable feature set. This allows the software to be deployed for attacks on a wide range of corporate environments. Through this, BlackCat can target Windows, Linux, and VMWare ESXi systems.

Part of the strength of the malicious code arises because the ransomware is written using Rust which is memory safe and reduces the chances of creation of bugs that security researchers can exploit.

In a companion article, Digital Journal heard from cybersecurity evangelist Alon Nachmany, Field CISO of AppViewX about some of the steps the businesses can take to protect themselves from ransomware incidents.

To gain a second, and more specific perspective, on BackCat ransomware, Digital Journal canvassed the opinion of Raj Dodhiawala, president of Remediant.

Dodhiawala sees the rise of BlackCat and other forms of malicious activity as something that businesses should have been prepared for, noting: “While terrifying, the increase we’re seeing in ransomware groups like BlackCat attacking the supply chains and industrial companies is not surprising.”

There is a rationale that occupies the minds of hackers, which Dodhiawala spells out as: “Ransomware often hits industrial control systems (ICS) or other operational technology environments, with significant impact and both governments and security groups have been warning organizations that ransomware poses an increasing threat to industrial systems.”

There needs to be a particular focus with logistics, says Dodhiawala and he states: “Protecting the supply chain from malware like BlackCat can be as easy as establishing a proper privileged access management program. It requires a methodical approach.”

As to what this entails, Dodhiawala recommends: “After discovering and vaulting the most coveted accounts, it is essential to look at standing privileges across the estate. As headlines continually show us, managing your standing privileges is one of the most critical and effective methods to prevent lateral movement and halt most incidents. The longer you wait to address it – the greater your chances of becoming a headline.”

Avatar photo
Written By

Dr. Tim Sandle is Digital Journal's Editor-at-Large for science news. Tim specializes in science, technology, environmental, business, and health journalism. He is additionally a practising microbiologist; and an author. He is also interested in history, politics and current affairs.

You may also like:

World

US President Joe Biden delivers remarks after signing legislation authorizing aid for Ukraine, Israel and Taiwan at the White House on April 24, 2024...

World

AfD leaders Alice Weidel and Tino Chrupalla face damaging allegations about an EU parliamentarian's aide accused of spying for China - Copyright AFP Odd...

Business

Meta's growth is due in particular to its sophisticated advertising tools and the success of "Reels" - Copyright AFP SEBASTIEN BOZONJulie JAMMOTFacebook-owner Meta on...

Business

Tony Fernandes bought AirAsia for a token one ringgitt after the September 11 attacks on the United States - Copyright AFP Arif KartonoMalaysia’s Tony...