The ALPHV ransomware group, also known as BlackCat, has emerged as a significant threat by operating under a Ransomware-as-a-Service model. They caused a major healthcare data breach in February 2024, affecting over 100 million individuals when they attacked Change Healthcare, a subsidiary of UnitedHealth Group. The incident prompted UnitedHealth to pay a million ransom. This article explores the groupβs tactics, techniques, and procedures. Affected: healthcare sector, UnitedHealth Group, Change Healthcare
Keypoints :
- ALPHV/BlackCat operates under a Ransomware-as-a-Service model since November 2021.
- In February 2024, they attacked Change Healthcare, causing the largest healthcare data breach in U.S. history.
- Over 100 million personal records were compromised, including health insurance member IDs and Social Security numbers.
- UnitedHealth Group paid a million ransom in response to the attack.
- BlackCat uses advanced TTPs, including complex malware and open-source intelligence for initial access.
- The group offers a lucrative profit-sharing model for affiliates, attracting more cybercriminals to use their ransomware.
- Other major incidents attributed to BlackCat include attacks on Reddit and MGM Resorts.
- The U.S. Department of State is offering rewards up to million for information on the groupβs leaders.
MITRE Techniques :
- Initial Access β T1598: Phishing for Information
- Account Access Development β T1586: Manipulating employees to obtain network credentials.
- Execution β T1059.003: Command and Scripting Interpreter used to execute malware.
- Persistence β T1112: Modify Registry for network operations optimizations.
- Privilege Escalation β T1134: Access Token Manipulation for gaining system privileges.
- Valid Accounts β T1078: Use of stolen credentials in a JSON configuration.
- Defense Evasion β T1562.001: Disabling system recovery and logging to hide activities.
- Discovery β T1057: Enumerating processes to identify security software.
- Impact β T1486: Data Encrypted for Impact with AES encryption.
- Service Stop β T1489: Stopping critical services to disrupt operations.
Indicator of Compromise :
- [SHA256] 847fb7609f53ed334d5affbb07256c21cb5e6f68b1cc14004f5502d714d2a456
- [MD5] 00C3F790F6E329530A6473882007C3E5
- [MD5] 08FCF90499526A0A41797F8FDD67D107
- [SHA1] 1B2A30776DF64FBD7299BD588E21573891DCECBE
- [SHA1] 1D345799307C9436698245E7383914B3A187F1EC
Full Story: https://www.picussecurity.com/resource/blog/alphv-ransomware