centristic
  • Solutions
    • Governance, Risk and Compliance Services
    • Identity and Access Management Service
    • Data Protection & Privacy
    • Cyber & Information Security
    • Attack Simulation
    • Office 365 & Azure Security
  • Services
    • Attack Simulation
    • Cyber & Information Security
    • Data Protection & Privacy
    • Governance, Risk and Compliance Services
    • Identity and Access Management Service
    • Office 365 & Azure Security
  • Support
    • Contact Us
    • Customer Portal
  • Company
+1 (954) 488-2643
  • Solutions
    • Governance, Risk and Compliance Services
    • Identity and Access Management Service
    • Data Protection & Privacy
    • Cyber & Information Security
    • Attack Simulation
    • Office 365 & Azure Security
  • Services
    • Attack Simulation
    • Cyber & Information Security
    • Data Protection & Privacy
    • Governance, Risk and Compliance Services
    • Identity and Access Management Service
    • Office 365 & Azure Security
  • Support
    • Contact Us
    • Customer Portal
  • Company
centristic
  • Solutions
    • Governance, Risk and Compliance Services
    • Identity and Access Management Service
    • Data Protection & Privacy
    • Cyber & Information Security
    • Attack Simulation
    • Office 365 & Azure Security
  • Services
    • Attack Simulation
    • Cyber & Information Security
    • Data Protection & Privacy
    • Governance, Risk and Compliance Services
    • Identity and Access Management Service
    • Office 365 & Azure Security
  • Support
    • Contact Us
    • Customer Portal
  • Company
Blog
Home Data Breach Cybersecurity Threat Advisory: BlackMatter Ransomware
Data BreachNEWSRansomwareSecurityTips and Tricks

Cybersecurity Threat Advisory: BlackMatter Ransomware

Michael Blair Michael Blair November 10, 2021 0 Comments

The FBI, CISA, and NSA have released a joint advisory about the BlackMatter Ransomware gang. This group has been gaining traction with their attacks since July 2021 and claims to be the successor of the Darkside and REvil ransomware groups. 

The following best practices presented by the joint advisory will ensure your assets and those of your clients are secure. (Note from the Centristic: Centristic Endpoint Protection already automatically blocks any associated hash values. Centristic Managed Network Security Monitoring offers custom detection mechanisms for this threat. Centristic Ransomware Defense (RDX) recognizes Ransomware exploits and will block this attack. However, a best practices multi-layer approach is recommended.) 
 

What is the BlackMatter Ransomware gang? 

A recent ransomware gang is posing a serious threat to businesses, claiming to be the successor to the infamous DarkSide and REvil ransomware groups. The gang has been setting up a network of affiliates by recruiting threat actors with access to networks of large enterprises to infect them with its ransomware. They do not target healthcare organizations, critical infrastructure, organizations in the defense industry, and non-profit companies. However, these industries have also been impacted by this Ransomware gang. 

Ransomware is an extremely difficult threat to combat. It encrypts an organization’s data and oftentimes cripples a business’ infrastructure. Most Ransomware attacks include large-scale exfiltration of an organization’s data, which is frequently leveraged by the attacker to apply pressure of victims to pay ransoms. An organization that prepares for a Ransomware attack by preparing to recover is being foolhardy. Organizations must protect themselves by preventing infiltration and exploitation. 

References 

For more in-depth information about the recommendations, please visit the following links: 

  • https://us-cert.cisa.gov/ncas/alerts/aa21-291a 
  • https://securityaffairs.co/wordpress/123549/cyber-crime/blackmatter-ransomware-joint-advisory.html 

Here is a link to the CISA Ransomware Guidance and Resources page: https://www.cisa.gov/ransomware 

Centristic’s effective Ransomware solution goes beyond the best practice recommendations outlined by CISA and effectively remediates the risk of ransomware altogether. Our advanced solution meets every criteria and recommendation of the CISA guidelines but adds our patented solution, which mitigates the risk of ransomware once and for all. Get the next-generation solution and forget about ransomware. 

122
693 Views
Michael Blair
AboutMichael Blair
In Socials:
CISA Launches Campaign to Reduce the Risk of Ransomware – Centristic Launches Campaign to Eliminate the RiskPrevCISA Launches Campaign to Reduce the Risk of Ransomware – Centristic Launches Campaign to Eliminate the RiskFebruary 2, 2021
Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution VulnerabilityMay 31, 2022Next

Related Posts

Data BreachNEWSRansomwareSecurity

CISA Launches Campaign to Reduce the Risk of Ransomware – Centristic Launches Campaign to Eliminate the Risk

The Cybersecurity and Infrastructure Security Agency (CISA) announced the Reduce the...

Michael Blair Michael Blair February 2, 2021
Update Button on Computer Glass Keyboard
NEWSRansomwareTips and Tricks

COVID-19 vs Ransomware

The COVID-19 Pandemic is posing serious challenges to information security for firms...

Michael Blair Michael Blair June 29, 2020

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recent Posts
  • Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerability
  • Cybersecurity Threat Advisory: BlackMatter Ransomware
  • CISA Launches Campaign to Reduce the Risk of Ransomware – Centristic Launches Campaign to Eliminate the Risk
  • 9 Cybersecurity Tips to Keep Your Device and Data Safe
  • Home Office Security – Never Too Late to Evaluate
Subscribe to our blog
We have lots of stuff for you to read.
Categories
  • Data Breach
  • tipsEmail Scams
  • HIPAA
  • newsNEWS
  • tipsPhishing
  • phishRansomware
  • Security
  • Tips and Tricks
  • Uncategorized
Most Viewed Posts
Search our Site

Centristic delivers the industry’s most complete IT security and secured solutions to small cap business. Whatever your IT security needs and goals, and wherever you’re starting,

Quick Links
  • Solutions
  • Services
  • Support
  • Company
  • Blog
Get In Touch

Adress:
5645 Coral Ridge Dr #230 Coral Springs, FL 33076-3124
Phone:
+1 (954) 488-2643
Business Hours:
Monday – Friday: 9am to 6pm
Saturday – Sunday: Closed

Copyright © 2020 Centristic. All Rights Reserved

Close