OXFORD, U.K. — Oktober 4, 2022 —

Sophos, a global leader in next-generation cybersecurity, today announced that BlackByte, one of the newer, “heavy-hitter” ransomware gangs, has added a sophisticated “Bring Your Own Driver” technique to bypass more than 1,000 drivers used by industry Endpoint Detection and Response (EDR) products. Sophos details the attack tactics, techniques and procedures (TTPs) in the report, “Remove all the Callbacks – BlackByte Ransomware Disables EDR via RTCore64.sys Abuse.”

BlackByte, featured in a Secret Service and FBI special advisory earlier this year as a threat to critical infrastructure, reemerged in May from a brief hiatus with a new leak site and new extortion tactics. Now, it appears that the group has added new attack methods, as well. Specifically, they’ve been abusing a vulnerability in RTCorec6.sys, a graphics utility driver for Windows systems. This particular vulnerability allows them to communicate directly with the targeted system’s kernel, commanding it to disable callback routines used by EDR providers, as well as the ETW (Event Tracing for Windows) Microsoft-Windows-Threat-Intelligence-Provider. EDR vendors frequently use this feature to monitor the use of commonly maliciously abused API calls; if this feature is disabled, the EDR vendors that rely on this feature are also rendered ineffective.

“If you think of computers as a fortress, for many EDR providers, ETW is the guard at the front gate. If the guard goes down, then that leaves the rest of the system extremely vulnerable. And, because ETW is used by so many different providers, BlackByte’s pool of potential targets for deploying this EDR bypass is enormous,” commented Christopher Budd, senior manager, threat research, Sophos.

BlackByte is not the only ransomware gang taking advantage of the “Bring Your Own Driver” to bypass security products. AvosLocker abused a vulnerability in a different driver to disable antivirus solutions in May.

“Anecdotally, from what we’re seeing in the field, it does appear that EDR bypass is becoming a more popular technique for ransomware threat groups. This is not surprising. Threat actors often leverage tools and techniques developed by the ‘offensive security’ industry to launch attacks faster and with minimal effort. In fact, it appears that BlackByte pulled at least part of its EDR bypass implementation from the open-source tool EDRSandblast,” said Budd. “With criminals adopting work done by the offensive security industry, it’s critical for defenders to monitor new evasion and exploitation techniques and implement mitigations before these techniques become widely available on the cybercrime scene.”

To learn more about BlackByte's latest TTPs and how to keep systems safe, download the full report from Sophos.com.

Über Sophos

Sophos ist ein führender Anbieter im Bereich Cybersicherheit und schützt weltweit 600.000 Unternehmen mit einer KI-basierten Plattform und Experten-Services. Sophos begegnet Unternehmen unabhängig von ihrem Sicherheitsstatus auf Augenhöhe und entwickelt sich gemeinsam mit ihnen weiter, um Cyberangriffe abzuwehren. Die Lösungen kombinieren maschinelles Lernen, Automatisierung und Echtzeit-Bedrohungsinformationen mit der Expertise von Sophos X-Ops und bieten so fortschrittliche Bedrohungsüberwachung, -erkennung und -reaktion rund um die Uhr. Sophos bietet branchenführendes Managed Detection and Response (MDR) sowie ein umfassendes Portfolio an Cybersicherheitstechnologien – darunter Endpoint-, Netzwerk-, E-Mail- und Cloud-Sicherheit, Extended Detection and Response (XDR), Identity Threat Detection and Response (ITDR) und SIEM der nächsten Generation. Zusammen mit den Fachberatungsdienstleistungen der Sophos-Experten helfen diese Funktionen Unternehmen, Risiken proaktiv zu reduzieren und schneller zu reagieren – inklusive der nötigen Transparenz und Skalierbarkeit, um den sich entwickelnden Bedrohungen immer einen Schritt voraus zu sein. Sophos agiert mit einem globalen Partnernetzwerk, das Managed Service Provider (MSPs), Managed Security Service Provider (MSSPs), Reseller und Distributoren, Marktplatzintegrationen sowie Cyber-Risikopartner umfasst. Dadurch haben Organisationen die Flexibilität, bei der Absicherung ihrer Unternehmenswerte auf vertrauensvolle Partnerschaften zurückzugreifen. Der Hauptsitz von Sophos befindet sich in Oxford, Großbritannien. Weitere Informationen finden Sie unter www.sophos.de.