The article documents a rising ransomware trend called intermittent encryption, where attackers partially encrypt files to speed up infection and evade detection. It reviews several families adopting this approach (Qyick, Agenda, BlackCat/ALPHV, PLAY, Black Basta) and outlines their encryption modes and extortion tactics. #BlackCat #GSE
Keypoints
- Intermittent encryption is a technique used to encrypt only portions of files to speed up attacks and reduce detection by security tools.
- LockFile was one of the first major ransomware families to use intermittent encryption in mid-2021, encrypting every other 16 bytes of a file.
- Recent reviewed families featuring intermittent encryption include Qyick, Agenda, BlackCat (ALPHV), PLAY, and Black Basta.
- Qyick is Go-based, sold as a one-time purchase (0.2–1.5 BTC) with a discount if detected within 6 months.
- Agenda targets healthcare and education in Africa/Asia and offers configurable encryption modes like skip-step, percent, and fast.
- BlackCat (ALPHV) is a Rust-based RaaS with multiple encryption modes (Full, HeadOnly, DotPattern, SmartPattern, AdvancedSmartPattern, Auto) and uses AES with hardware acceleration or ChaCha20 in software.
- PLAY and Black Basta apply chunk-based intermittent encryption, with PLAY encrypting 0x100000-byte chunks and Black Basta varying patterns by file size, often resulting in visibly mixed encrypted/unencrypted content.
- BlackCat/ALPHV employs extortion tactics including data leaks and DDoS threats; Black Basta operates a double-extortion model and advertises data exfiltration on Basta News.
- The article concludes intermittent encryption is practical and likely to be adopted by more families, with SentinelOne Singularity capable of detecting these samples.
MITRE Techniques
- [T1486] Data Encrypted for Impact – Intermittent encryption is used to encrypt portions of files to cause impact while aiding evasion. Quote: “…encrypting every other 16 bytes of a file.”
- [T1041] Exfiltration – BlackCat/ALPHV extortion includes leaking exfiltrated data online and threatening disclosure. Quote: “leaking exfiltrated data online as well as intimidating employees and customers…”
- [T1499] Endpoint Denial of Service – The attackers threaten DDoS attacks as part of extortion. Quote: “threatening victims with DDoS attacks.”
Indicators of Compromise
- [SHA1] Ransomware sample hashes – Agenda: 5f99214d68883e91f586e85d8db96deda5ca54af; BlackCat: 8917af3878fa49fe4ec930230b881ff0ae8d19c9; and 2 more hashes