Crimeware Trends | Ransomware Developers Turn to Intermittent Encryption to Evade Detection

The article documents a rising ransomware trend called intermittent encryption, where attackers partially encrypt files to speed up infection and evade detection. It reviews several families adopting this approach (Qyick, Agenda, BlackCat/ALPHV, PLAY, Black Basta) and outlines their encryption modes and extortion tactics. #BlackCat #GSE

Keypoints

  • Intermittent encryption is a technique used to encrypt only portions of files to speed up attacks and reduce detection by security tools.
  • LockFile was one of the first major ransomware families to use intermittent encryption in mid-2021, encrypting every other 16 bytes of a file.
  • Recent reviewed families featuring intermittent encryption include Qyick, Agenda, BlackCat (ALPHV), PLAY, and Black Basta.
  • Qyick is Go-based, sold as a one-time purchase (0.2–1.5 BTC) with a discount if detected within 6 months.
  • Agenda targets healthcare and education in Africa/Asia and offers configurable encryption modes like skip-step, percent, and fast.
  • BlackCat (ALPHV) is a Rust-based RaaS with multiple encryption modes (Full, HeadOnly, DotPattern, SmartPattern, AdvancedSmartPattern, Auto) and uses AES with hardware acceleration or ChaCha20 in software.
  • PLAY and Black Basta apply chunk-based intermittent encryption, with PLAY encrypting 0x100000-byte chunks and Black Basta varying patterns by file size, often resulting in visibly mixed encrypted/unencrypted content.
  • BlackCat/ALPHV employs extortion tactics including data leaks and DDoS threats; Black Basta operates a double-extortion model and advertises data exfiltration on Basta News.
  • The article concludes intermittent encryption is practical and likely to be adopted by more families, with SentinelOne Singularity capable of detecting these samples.

MITRE Techniques

  • [T1486] Data Encrypted for Impact – Intermittent encryption is used to encrypt portions of files to cause impact while aiding evasion. Quote: “…encrypting every other 16 bytes of a file.”
  • [T1041] Exfiltration – BlackCat/ALPHV extortion includes leaking exfiltrated data online and threatening disclosure. Quote: “leaking exfiltrated data online as well as intimidating employees and customers…”
  • [T1499] Endpoint Denial of Service – The attackers threaten DDoS attacks as part of extortion. Quote: “threatening victims with DDoS attacks.”

Indicators of Compromise

  • [SHA1] Ransomware sample hashes – Agenda: 5f99214d68883e91f586e85d8db96deda5ca54af; BlackCat: 8917af3878fa49fe4ec930230b881ff0ae8d19c9; and 2 more hashes

Read more: https://www.sentinelone.com/labs/crimeware-trends-ransomware-developers-turn-to-intermittent-encryption-to-evade-detection/