CISA, FBI, and NSA warn of BlackMatter attacks on agriculture


Since July 2021, malicious cyber actors have used BlackMatter ransomware to target multiple U.S. critical infrastructure entities, including a U.S. Food and Agriculture Sector organization.

The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), and the National Security Agency (NSA) issued a joint CyberSecurity Advisory on Monday.

“The threat of ransomware goes beyond specific impacts to a victim company – it has risen to a national security issue,” said Rob Joyce, Director of Cybersecurity at NSA.

ADVERTISEMENT

The document provides cyber actor tactics, techniques, and procedures and outlines mitigations to improve ransomware protection, detection, and response.


Actions You Can Take Now to Protect Against BlackMatter Ransomware
  • Implement and enforce backup and restoration policies and procedures
  • Use strong, unique passwords
  • Use multi-factor authentication
  • Implement network segmentation and traversal monitoring

In September, a major US farm service provider, New Cooperative Inc., was hit by the BlackMatter ransomware. In what appears to be a conversation between New Cooperative Inc and the hackers, New Cooperative appeals to threat actors claiming the attack can lead to disruptions in the grain, pork, and chicken supply chains. A deep web monitoring feed DarkFeed claims that the ransom demand was worth $5.9 million.

“First seen in July 2021, BlackMatter is ransomware-as-a-service (Raas) tool that allows the ransomware's developers to profit from cybercriminal affiliates (i.e., BlackMatter actors) who deploy it against victims. BlackMatter is a possible rebrand of DarkSide, a RaaS which was active from September 2020 through May 2021,” the advisory reads.

BlackMatter actors have attacked numerous US-based organizations and have demanded ransom payments ranging from $80,000 to $15,000,000 in Bitcoin and Monero.

ADVERTISEMENT

This advisory includes analysis of a sample of BlackMatter ransomware and information from trusted third parties. The adversary actor's behavior is mapped to the MITRE ATT&CK framework, a common lexicon of adversary behavior recommended by CISA.


More from CyberNews:

Good luck, everyone - REvil hacker after groups Tor site gets taken over

iPhone users ripped off at least $1.4 million through Bumble and Tinder scams

Third-party vendors are companies’ Achilles’ heel 

WhatsApp finally offers encrypted backups 

Tech giants endlessly exploit our data. Who will put an end to it? 

Subscribe to our newsletter

ADVERTISEMENT