Tuesday, February 7, 2023
  • Advertise With Us
  • Write For Us
  • Contact Us
  • About Us
  • Editorial Calendar
Download Latest Issue - Free!
The Cyber Express
Ransomware Report
  • MagazineLatest Issue
  • Firewall Daily
    • All
    • Dark Web News
    • Data Breach News
    • Hacks
    • Ransomware
    • Vulnerabilities
    World Anvil Hacked: Sensitive Data of 2.1 Million Users Stolen and For Sale on Hacker’s Forum

    World Anvil Hacked: Sensitive Data of 2.1 Million Users Stolen and For Sale on Hacker’s Forum

    RansomHouse

    RansomHouse Ransomware Group Hits Dubai Gold & Commodities Exchange

    OpenSSH Server

    OpenSSH Eliminates Double-Free Memory Vulnerability that can be Exploited Over the Network

    Safer Internet

    International Safer Internet Day: How Safe Are Our Teenagers Online?

    Dell Vulnerability

    Dell Releases New Updates For Tackling CVE-2023-23698 Vulnerability

    Mirai to Medusa Botnet

    Mirai to Medusa Botnet, Hackers Up Their Game to Launch Cyberattacks

    Sharp Data Breach

    Sharp Healthcare Data Breach Puts 62,777 Patients Information At Risk

    Microsoft Exchange Server

    Have You Patched This Microsoft Vulnerability Yet?

    Oh No! Demon Slayer Season 3

    Oh No! Demon Slayer Season 3, Episode 1 Leaked

  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    Safer Internet

    International Safer Internet Day: How Safe Are Our Teenagers Online?

    TRAI

    TRAI Asked to Involve MoD in Drafting Big Data Regulations & Policies

    cybersecurity

    Cybersecurity incidents may soon be ‘uninsurable’

    Australia

    Australia Ropes in Tech Veterans to Set Up Cyber Action Plan

    Active Directory

    Prevent Ransomware: Save the Active Directory

    Privacy Penalty Bill

    Privacy Penalty Bill: Australian Parliament Approves Heavy Fines

    Zero Trust Strategy

    US Department of Defense to Embrace Zero Trust Strategy

    browser hijackers

    Researchers Find Browser Hijackers on Google Chrome Web Store

    DORA proposal

    DORA Proposal for Cybersecurity Awaits Full Approval by Council and ESAs

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business News
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    Call and Contact Center Expo

    The Countdown Begins: The Call and Contact Center Expo Las Vegas 2023 is Officially Here!

    Kemba Walden

    Kemba Walden: The Next ONCD Top Boss?

    Australia

    Australia Ropes in Tech Veterans to Set Up Cyber Action Plan

    Privacy Penalty Bill

    Privacy Penalty Bill: Australian Parliament Approves Heavy Fines

    World CyberCon

    The Cyber Express to Host the World CyberCon India Edition on November 18, 2022

    World CyberCon India Edition 2022

    World CyberCon India Edition 2022

    GITEX GLOBAL 2022

    GITEX GLOBAL 2022 Helps Break The Glass Ceiling For Women Entrepreneurs

    Cybersecurity in 2023, Value Point Systems

    Softline Acquires Indian Cybersecurity Firm Value Point Systems

    KnowBe4 Vista Equity Partners

    KnowBe4 Goes Private With a $4.6 Billion Deal With Vista Equity Partners

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • EventsCyberCon
    • Webinars
    • World CyberCon Middle East 2023
    • Endorsed Events
No Result
View All Result
The Cyber Express
  • MagazineLatest Issue
  • Firewall Daily
    • All
    • Dark Web News
    • Data Breach News
    • Hacks
    • Ransomware
    • Vulnerabilities
    World Anvil Hacked: Sensitive Data of 2.1 Million Users Stolen and For Sale on Hacker’s Forum

    World Anvil Hacked: Sensitive Data of 2.1 Million Users Stolen and For Sale on Hacker’s Forum

    RansomHouse

    RansomHouse Ransomware Group Hits Dubai Gold & Commodities Exchange

    OpenSSH Server

    OpenSSH Eliminates Double-Free Memory Vulnerability that can be Exploited Over the Network

    Safer Internet

    International Safer Internet Day: How Safe Are Our Teenagers Online?

    Dell Vulnerability

    Dell Releases New Updates For Tackling CVE-2023-23698 Vulnerability

    Mirai to Medusa Botnet

    Mirai to Medusa Botnet, Hackers Up Their Game to Launch Cyberattacks

    Sharp Data Breach

    Sharp Healthcare Data Breach Puts 62,777 Patients Information At Risk

    Microsoft Exchange Server

    Have You Patched This Microsoft Vulnerability Yet?

    Oh No! Demon Slayer Season 3

    Oh No! Demon Slayer Season 3, Episode 1 Leaked

  • Essentials
    • All
    • Compliance
    • Governance
    • Policy Updates
    • Regulations
    Safer Internet

    International Safer Internet Day: How Safe Are Our Teenagers Online?

    TRAI

    TRAI Asked to Involve MoD in Drafting Big Data Regulations & Policies

    cybersecurity

    Cybersecurity incidents may soon be ‘uninsurable’

    Australia

    Australia Ropes in Tech Veterans to Set Up Cyber Action Plan

    Active Directory

    Prevent Ransomware: Save the Active Directory

    Privacy Penalty Bill

    Privacy Penalty Bill: Australian Parliament Approves Heavy Fines

    Zero Trust Strategy

    US Department of Defense to Embrace Zero Trust Strategy

    browser hijackers

    Researchers Find Browser Hijackers on Google Chrome Web Store

    DORA proposal

    DORA Proposal for Cybersecurity Awaits Full Approval by Council and ESAs

    • Regulations
    • Compliance
    • Governance
    • Policy Updates
  • Features
    • Cyber Warfare
    • Espionage
    • Workforce
      • Learning & Development
  • Business News
    • All
    • Appointments
    • Budgets
    • Mergers & Aquisitions
    • Partnerships
    • Press Release
    • Startups
    Call and Contact Center Expo

    The Countdown Begins: The Call and Contact Center Expo Las Vegas 2023 is Officially Here!

    Kemba Walden

    Kemba Walden: The Next ONCD Top Boss?

    Australia

    Australia Ropes in Tech Veterans to Set Up Cyber Action Plan

    Privacy Penalty Bill

    Privacy Penalty Bill: Australian Parliament Approves Heavy Fines

    World CyberCon

    The Cyber Express to Host the World CyberCon India Edition on November 18, 2022

    World CyberCon India Edition 2022

    World CyberCon India Edition 2022

    GITEX GLOBAL 2022

    GITEX GLOBAL 2022 Helps Break The Glass Ceiling For Women Entrepreneurs

    Cybersecurity in 2023, Value Point Systems

    Softline Acquires Indian Cybersecurity Firm Value Point Systems

    KnowBe4 Vista Equity Partners

    KnowBe4 Goes Private With a $4.6 Billion Deal With Vista Equity Partners

    • Startups
    • Mergers & Aquisitions
    • Partnerships
    • Appointments
    • Budgets
    • Research
      • Whitepapers
      • Sponsored Content
      • Market Reports
    • Interviews
      • Podcast
  • EventsCyberCon
    • Webinars
    • World CyberCon Middle East 2023
    • Endorsed Events
No Result
View All Result
The Cyber Express
No Result
View All Result
Home Firewall Daily

BlackByte Ransomware Gang Returns With Version 2.0

Editorial by Editorial
August 21, 2022 - Updated on August 22, 2022
in Firewall Daily, Ransomware
3
BlackByte ransomware
587
SHARES
3.3k
VIEWS
Share on LinkedInShare on Twitter
Listen to this story

The BlackByte ransomware has resurfaced with a new 2.0 version. The news comes after a data leak website emerged on the hacking forums, borrowing extortion techniques from LockBit. The ransomware had previously built a name in the cybersecurity channels by getting attention from the Federal Bureau of Investigation (FBI) and the US Secret Service (USS). After Conti’s wrath in the US, BlackByte seems to be the new chief ransomware posing as a high-risk security threat.

After its brief disappearance, the ransomware gang is back and is operating via a new data leak site known as BlackByte Blog (the name is not yet confirmed). The hackers behind version 2.0 gang target Twitter users using a new operation called BlackByte version 2.0. However, researchers are still unsure whether the ransomware uses the same encryptor or is changed with the new variant.

You might also like

RansomHouse Ransomware Group Hits Dubai Gold & Commodities Exchange

OpenSSH Eliminates Double-Free Memory Vulnerability that can be Exploited Over the Network

International Safer Internet Day: How Safe Are Our Teenagers Online?

BlackByte version 2.0 operates via a new data leak site

Image Credit Unit 42

The ransomware gang is probably testing its capabilities and features with version 2.0 because it has only reached one victim as of August 2022. The team has adopted new extortion strategies with this variation of the ransomware, including increasing extortion based on the target’s financial status. For example, stopping the hackers from publishing the data within the next 24 hours will cost $5,000, ceasing the gang from downloading all the data would cost $200,000, and stopping the data from being destroyed would cost companies $300,000.

The new technologies will undoubtedly pressure companies as they would have only 24 hours to decide, or they will lose the data. However, the prices for these extortions can change depending upon the victim’s revenue models and size. For example, the BlackByte ransomware gang will charge less extortion fees from medium-sized enterprises (SMEs). Whereas bigger, more prominent corporations with higher profiles would be charged more.

The enigma of BlackByte version 2.0 extortion methods

The first rule of a ransomware gang is: if you aim to receive ransom, provide your wallet. Doesn't look like new #BlackByte is going to receive any payments… pic.twitter.com/YJpDyHUa5M

— KELA (@Intel_by_KELA) August 17, 2022

Though the ransomware gang poses to use its new weapon “BlackByte version 2.0” to extort money, the Israel-based threat intelligence firm KELA explains that it cannot do what it says right now. According to a Tweet by KELA, the company explains that the new data leak website cannot correctly embed its wallet address for receiving payments.

While sarcastically stating the flaw in BlackByte’s website, KELA said, “The first rule of a ransomware gang is: if you aim to receive ransom, provide your wallet. It doesn’t look like new #BlackByte is going to receive any payments…”

In short, the website currently offering BlackByte version 2.0 services is not usable because clients who wish to download, purchase or delete particular data cannot complete the transaction, making the new extortion method useless as of August 2022.

Share this:

  • Click to share on LinkedIn (Opens in new window)
  • Click to share on Reddit (Opens in new window)
  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)
  • More
  • Click to email a link to a friend (Opens in new window)
  • Click to share on WhatsApp (Opens in new window)

Related

Tags: blackbyte critical infrastructureblackbyte decryptblackbyte ransomwareblackbyte ransomware analysisblackbyte ransomware iocsblackbyte ransomware mitreblackbyte ransomware palo altocyber expresscyber express newstalos blackbyte
Previous Post

Top #10 Startups That are Changing the Dynamics of Cybersecurity

Next Post

Fake PayPal Invoice: Hackers try to Lure Customers to Bogus Redressal Platforms

Editorial

Editorial

The Cyber Express is a publication that aims to provide the latest news and analysis about the information security industry. The news comes from a variety of sources and is updated regularly so that readers can stay up to date with the latest happenings in this rapidly growing field.

Related Posts

RansomHouse
Data Breach News

RansomHouse Ransomware Group Hits Dubai Gold & Commodities Exchange

by Vishwa Pandagle
February 7, 2023
OpenSSH Server
Firewall Daily

OpenSSH Eliminates Double-Free Memory Vulnerability that can be Exploited Over the Network

by Editorial
February 7, 2023
Safer Internet
Firewall Daily

International Safer Internet Day: How Safe Are Our Teenagers Online?

by Vishwa Pandagle
February 7, 2023
Dell Vulnerability
Firewall Daily

Dell Releases New Updates For Tackling CVE-2023-23698 Vulnerability

by Ashish Khaitan
February 7, 2023
Mirai to Medusa Botnet
DDoS Attacks

Mirai to Medusa Botnet, Hackers Up Their Game to Launch Cyberattacks

by Vishwa Pandagle
February 7, 2023
Next Post
Fake PayPal Invoice: Hackers try to Lure Customers to Bogus Redressal Platforms

Fake PayPal Invoice: Hackers try to Lure Customers to Bogus Redressal Platforms

Comments 3

  1. Pingback: Ragnar Locker Ransomware Behind Attack on Portugal Airline
  2. Pingback: San Francisco 49ers Faces Lawsuit After Ransomware Attack
  3. Pingback: Lorenz Ransomware Exploits Networks Using Phone Systems

Latest Issue is Out. Subscribe Now

Ai in Cybersecurity - Cybersecurity Magazine by The Cyber Express

Download Now



Follow Us On Google News

Never miss an update. Subscribe!

* indicates required

Recommended

Bargain

What Happens When You Bargain Wrong With Ransomware Gang?

December 30, 2022
Salary calculating Excel File

Fake Salary Calculating Excel File Target Ukrainian and Russian Military Personnel

October 13, 2022

Categories

Don't miss it

World Anvil Hacked: Sensitive Data of 2.1 Million Users Stolen and For Sale on Hacker’s Forum
Cybersecurity News

World Anvil Hacked: Sensitive Data of 2.1 Million Users Stolen and For Sale on Hacker’s Forum

February 7, 2023
RansomHouse
Data Breach News

RansomHouse Ransomware Group Hits Dubai Gold & Commodities Exchange

February 7, 2023
OpenSSH Server
Firewall Daily

OpenSSH Eliminates Double-Free Memory Vulnerability that can be Exploited Over the Network

February 7, 2023
Safer Internet
Firewall Daily

International Safer Internet Day: How Safe Are Our Teenagers Online?

February 7, 2023
Dell Vulnerability
Firewall Daily

Dell Releases New Updates For Tackling CVE-2023-23698 Vulnerability

February 7, 2023
Mirai to Medusa Botnet
DDoS Attacks

Mirai to Medusa Botnet, Hackers Up Their Game to Launch Cyberattacks

February 7, 2023

About

The Cyber Express

Cybersecurity News and Magazine

The Cyber Express is a handbook for all stakeholders of the internet that provides information security professionals with the latest news, updates and knowledge they need to combat cyber threats.

Follow The Cyber Express

Contact

For editorial queries: [email protected]

For marketing, PR & media partnerships: [email protected]

For media kit and digitals sales: [email protected]

For Sponsorship/Event Partnership: [email protected]

For Conferences related information: [email protected]

Our Address

We’re remote friendly, with office locations around the world:

San Francisco, Atlanta, Rome,
Dubai, Mumbai, Bangalore, Hyderabad,  Singapore, Jakarta, Sydney, and Melbourne

 

Headquarters:

The Cyber Express LLC
555 North Point Center E
Alpharetta, GA 30022, USA.

Tel: (678) 578-8838

Subscribe to Our Feed

RSS Feeds

Follow Us On Google News

© 2022 The Cyber Express (Cybersecurity News and Magazine) | By Cyble Inc.

No Result
View All Result
  • Firewall Daily
  • Business News
  • Cyber Essentials
  • Features
  • Cybersecurity Magazine
  • Events
    • World CyberCon Middle East 2023
    • Webinars

© 2022 The Cyber Express (Cybersecurity News and Magazine) | By Cyble Inc.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In

Add New Playlist

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.