{"id":6477,"date":"2021-07-12T08:55:03","date_gmt":"2021-07-12T15:55:03","guid":{"rendered":"https:\/\/blogs.infoblox.com\/?p=6477"},"modified":"2024-04-26T13:20:34","modified_gmt":"2024-04-26T20:20:34","slug":"cyber-threat-advisory-darkside-ransomware-variant","status":"publish","type":"post","link":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-darkside-ransomware-variant\/","title":{"rendered":"Cyber Threat Advisory:  DarkSide Ransomware Variant"},"content":{"rendered":"<h3>Author: Avinash Shende<\/h3>\n<h3>TLP: WHITE<\/h3>\n<p>&nbsp;<\/p>\n<h3>1.\u00a0 Executive Summary<\/h3>\n<p>On 8 July, the Cybersecurity and Infrastructure Security Agency (CISA) published a Malware Analysis Report (AR21-189A) on a variant of DarkSide ransomware.<sup>1<\/sup> To date, there is no evidence that the variant has any association with the Colonial Pipeline security breach, which happened on 7 May, and about which Infoblox released a Cyber Threat Advisory on 13 May.<sup>2<\/sup><\/p>\n<p>This Cyber Threat Advisory will summarize the information from CISA on DarkSide\u2019s new variant: a 32-bit dynamic-link library (DLL) named <em>encryptor2[.]dll<\/em>. This variant can delete Microsoft Volume Shadow copies,<sup>3<\/sup> collect and encrypt files, and exfiltrate system information to its command and control (C&amp;C) server. After encrypting the files, the program creates a bitmap image and sets it as the user&#8217;s wallpaper. In the wallpaper, the program stores the details that the victim would need to recover data.<\/p>\n<p>The DarkSide group announced the existence of their ransomware-as-a-service (RaaS) in August 2020. Since then, the group has become known for their professional operations and large ransoms. They provide web chat support to victims, build intricate redundant systems for storing leaked data, and perform financial analysis of targets prior to attacking them. The group has a history of double-extorting their victims by demanding ransom in exchange for 1) deleting their victims\u2019 exfiltrated data, and 2) for providing the decryption keys that victims need to unlock their infected computers.<\/p>\n<h3>2.\u00a0 Analysis<\/h3>\n<p>To gain initial access to target organizations, DarkSide performs brute-force attacks and exploits vulnerabilities in Remote Desktop Protocol (RDP). After compromising a target network, DarkSide collects system information (operating system, usernames, hostnames, default language, and more) and sends it to their C&amp;C server.<\/p>\n<p>When <em>encryptor2[.]dll<\/em> is executed, it invokes the Volume Shadow service (<em>vssvc.exe<\/em>) to delete any Volume Shadow copies available in the system. <em>Encryptor2[.]dll<\/em> then collects system information and sends it to the C&amp;C domains <em>baroquetees[.]com<\/em> and <em>rumahsia[.]com<\/em>.<\/p>\n<p>This DarkSide variant uses the system GUID to generate a unique eight-character hexadecimal extension, which it then uses to append encrypted files. It contains the hard-coded key <em>_M8607761bf3212d6<\/em> that it uses to decrypt an embedded base64 encoded configuration that runs the ransomware program.<\/p>\n<p>Before launching the encryption module, DarkSide checks for and terminates non-essential processes and services that might be running on the target system. Also, while running, it avoids encrypting certain file directories (for example, Program Files, Windows, and Appdata) and file extensions, which deal with binaries, icons, installer packages and scripts.<\/p>\n<p>After encrypting the files, DarkSide creates a bitmap image in <em>C:\\ProgramData<\/em> and gives it the same name as that of the extension it used to append encrypted files. The image shows the instructions the victims should use to recover their files. To display the image as the desktop wallpaper, DarkSide modifies system registry keys. Also, to ensure that the ransom note is automatically displayed after every system reboot, DarkSide drops it in encrypted locations and in the Startup folder.<\/p>\n<h3>3.\u00a0 Prevention and Mitigation<\/h3>\n<p>The CISA recommends the following:<\/p>\n<ul>\n<li>Maintain up-to-date antivirus signatures and engines, and operating system patches.<\/li>\n<li>Disable file and printer sharing services. If these services are required, use strong passwords or Active Directory authentication.<\/li>\n<li>Restrict users&#8217; ability to install and run unwanted software applications. Unless required, do not add users to the local administrators group.<\/li>\n<li>Require that users use strong passwords and change them regularly.<\/li>\n<li>Exercise caution when opening all email attachments, even those in the emails that are expected and from senders that appear familiar.<\/li>\n<li>On agency workstations, enable personal firewalls configured to deny unsolicited requests for connection.<\/li>\n<li>Disable unnecessary services on agency workstations and servers.<\/li>\n<li>Scan for and remove suspicious email attachments. Ensure that a scanned attachment is of true file type: that is, the attachment\u2019s extension matches the file header.<\/li>\n<li>Monitor users&#8217; web-browsing habits. Restrict access to sites with unfavorable content.<\/li>\n<li>Exercise caution when using removable media.<\/li>\n<li>Scan software before executing downloaded software.<\/li>\n<li>Maintain situational awareness of the latest threats, and implement appropriate access control lists (ACLs).<\/li>\n<\/ul>\n<h3>\u00a04.\u00a0 Indicators of Compromise<\/h3>\n<table width=\"678\">\n<tbody>\n<tr>\n<td width=\"570\">\n<p style=\"text-align: center;\"><strong>Indicator<\/strong><\/p>\n<\/td>\n<td style=\"text-align: center;\" width=\"108\"><strong>Description<\/strong><\/td>\n<\/tr>\n<tr>\n<td width=\"570\">\n<p style=\"text-align: center;\">156335b95ba216456f1ac0894b7b9d6ad95404ac7df447940f21646ca0090673<\/p>\n<p style=\"text-align: center;\">3ba456cafcb31e0710626170c3565aae305bc7c32a948a54f0331d0939e0fe8a<\/p>\n<p style=\"text-align: center;\">f6fba207c71d1f53f82d96a87c25c4fa3c020dca58d9b8a266137f33597a0b0e<\/p>\n<\/td>\n<td width=\"108\">\n<p style=\"text-align: center;\">Hashes related to DarkSide ransomware<sup>4<\/sup><sup>,<\/sup><sup>5<\/sup><\/p>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"570\">\n<p style=\"text-align: center;\">baroquetees[.]com<\/p>\n<p style=\"text-align: center;\">rumahsia[.]com<\/p>\n<\/td>\n<td width=\"108\">\n<p style=\"text-align: center;\">Associated domains<\/p>\n<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center;\" width=\"570\">176[.]103[.]62[.]217<\/p>\n<p>99[.]83[.]154[.]118<\/td>\n<td width=\"108\">\n<p style=\"text-align: center;\">Associated IPs<\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h3><\/h3>\n<h3>Endnotes<\/h3>\n<p>1. \u00a0<a href=\"https:\/\/us-cert.cisa.gov\/ncas\/analysis-reports\/ar21-189a\">https:\/\/us-cert.cisa.gov\/ncas\/analysis-reports\/ar21-189a<\/a><\/p>\n<p>2. <a href=\"https:\/\/blogs.infoblox.com\/cyber-threat-intelligence\/cyber-threat-advisory-darkside-ransomware-attack-on-colonial-pipeline\/\">https:\/\/blogs.infoblox.com\/cyber-threat-intelligence\/cyber-threat-advisory-darkside-ransomware-attack-on-colonial-pipeline\/<\/a><\/p>\n<p>3. <a href=\"https:\/\/en.wikipedia.org\/wiki\/Shadow_Copy\">https:\/\/en.wikipedia.org\/wiki\/Shadow_Copy<\/a><\/p>\n<p>4. <a href=\"https:\/\/app.any.run\/tasks\/17681cfd-dec2-46a9-b09e-fd5377451d5e\/\">https:\/\/app.any.run\/tasks\/17681cfd-dec2-46a9-b09e-fd5377451d5e\/<\/a><\/p>\n<p>5. <a href=\"https:\/\/www.virustotal.com\/gui\/file\/156335b95ba216456f1ac0894b7b9d6ad95404ac7df447940f21646ca0090673\/community\">https:\/\/www.virustotal.com\/gui\/file\/156335b95ba216456f1ac0894b7b9d6ad95404ac7df447940f21646ca0090673\/community<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Author: Avinash Shende TLP: WHITE &nbsp; 1.\u00a0 Executive Summary On 8 July, the Cybersecurity and Infrastructure Security Agency (CISA) published a Malware Analysis Report (AR21-189A) on a variant of DarkSide ransomware.1 To date, there is no evidence that the variant has any association with the Colonial Pipeline security breach, which happened on 7 May, and [&hellip;]<\/p>\n","protected":false},"author":397,"featured_media":6718,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[554],"tags":[334,499,288],"class_list":{"0":"post-6477","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-threat-advisory","8":"tag-cisa","9":"tag-darkside","10":"tag-ransomware","11":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>CyberThreat Advisory: DarkSide Ransomware Variant<\/title>\n<meta name=\"description\" content=\"Cyber Threat Advisory: DarkSide Ransomware Variant. On 8 July, the Cybersecurity and Infrastructure Security Agency (CISA) published a Malware Analysis Report (AR21-189A) on a variant of DarkSide ransomware. To date, there is no evidence that the variant has any association with the Colonial Pipeline security breach, which happened on 7 May, and about which Infoblox released a Cyber Threat Advisory on 13 May.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-darkside-ransomware-variant\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Threat Advisory: DarkSide Ransomware Variant\" \/>\n<meta property=\"og:description\" content=\"Cyber Threat Advisory: DarkSide Ransomware Variant. On 8 July, the Cybersecurity and Infrastructure Security Agency (CISA) published a Malware Analysis Report (AR21-189A) on a variant of DarkSide ransomware. To date, there is no evidence that the variant has any association with the Colonial Pipeline security breach, which happened on 7 May, and about which Infoblox released a Cyber Threat Advisory on 13 May.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-darkside-ransomware-variant\/\" \/>\n<meta property=\"og:site_name\" content=\"Infoblox Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-12T15:55:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-26T20:20:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-11.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"612\" \/>\n\t<meta property=\"og:image:height\" content=\"405\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Infoblox Threat Intel\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Infoblox Threat Intel\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/cyber-threat-advisory-darkside-ransomware-variant\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/cyber-threat-advisory-darkside-ransomware-variant\\\/\"},\"author\":{\"name\":\"Infoblox Threat Intel\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\"},\"headline\":\"Cyber Threat Advisory: DarkSide Ransomware Variant\",\"datePublished\":\"2021-07-12T15:55:03+00:00\",\"dateModified\":\"2024-04-26T20:20:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/cyber-threat-advisory-darkside-ransomware-variant\\\/\"},\"wordCount\":792,\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/cyber-threat-advisory-darkside-ransomware-variant\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-11.jpg\",\"keywords\":[\"CISA\",\"DarkSide\",\"Ransomware\"],\"articleSection\":[\"Cyber Threat Advisory\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/cyber-threat-advisory-darkside-ransomware-variant\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/cyber-threat-advisory-darkside-ransomware-variant\\\/\",\"name\":\"CyberThreat Advisory: DarkSide Ransomware Variant\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/cyber-threat-advisory-darkside-ransomware-variant\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/cyber-threat-advisory-darkside-ransomware-variant\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-11.jpg\",\"datePublished\":\"2021-07-12T15:55:03+00:00\",\"dateModified\":\"2024-04-26T20:20:34+00:00\",\"description\":\"Cyber Threat Advisory: DarkSide Ransomware Variant. On 8 July, the Cybersecurity and Infrastructure Security Agency (CISA) published a Malware Analysis Report (AR21-189A) on a variant of DarkSide ransomware. To date, there is no evidence that the variant has any association with the Colonial Pipeline security breach, which happened on 7 May, and about which Infoblox released a Cyber Threat Advisory on 13 May.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/cyber-threat-advisory-darkside-ransomware-variant\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/cyber-threat-advisory-darkside-ransomware-variant\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/cyber-threat-advisory-darkside-ransomware-variant\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-11.jpg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/ciu-image-11.jpg\",\"width\":612,\"height\":405,\"caption\":\"Press enter button on the keyboard computer Shield cyber Key lock security system abstract technology world digital link cyber security on hi tech Dark blue background, Enter password to log in. lock finger Keyboard\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/threat-intelligence\\\/cyber-threat-advisory\\\/cyber-threat-advisory-darkside-ransomware-variant\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Infoblox Threat Intel\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Threat Advisory\",\"item\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/category\\\/threat-intelligence\\\/cyber-threat-advisory\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Cyber Threat Advisory: DarkSide Ransomware Variant\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"name\":\"infoblox.com\\\/blog\\\/\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#organization\",\"name\":\"Infoblox\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"contentUrl\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/wp-content\\\/uploads\\\/infoblox-logo-2.svg\",\"width\":137,\"height\":30,\"caption\":\"Infoblox\"},\"image\":{\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/#\\\/schema\\\/person\\\/b6aed8965e3298a0817c16d32c0a67ae\",\"name\":\"Infoblox Threat Intel\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"url\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"contentUrl\":\"https:\\\/\\\/blogs.infoblox.com\\\/wp-content\\\/uploads\\\/avatar_user_397_1714162589-96x96.png\",\"caption\":\"Infoblox Threat Intel\"},\"description\":\"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.\",\"url\":\"https:\\\/\\\/www.infoblox.com\\\/blog\\\/author\\\/infoblox-threat-intel\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"CyberThreat Advisory: DarkSide Ransomware Variant","description":"Cyber Threat Advisory: DarkSide Ransomware Variant. On 8 July, the Cybersecurity and Infrastructure Security Agency (CISA) published a Malware Analysis Report (AR21-189A) on a variant of DarkSide ransomware. To date, there is no evidence that the variant has any association with the Colonial Pipeline security breach, which happened on 7 May, and about which Infoblox released a Cyber Threat Advisory on 13 May.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-darkside-ransomware-variant\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Threat Advisory: DarkSide Ransomware Variant","og_description":"Cyber Threat Advisory: DarkSide Ransomware Variant. On 8 July, the Cybersecurity and Infrastructure Security Agency (CISA) published a Malware Analysis Report (AR21-189A) on a variant of DarkSide ransomware. To date, there is no evidence that the variant has any association with the Colonial Pipeline security breach, which happened on 7 May, and about which Infoblox released a Cyber Threat Advisory on 13 May.","og_url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-darkside-ransomware-variant\/","og_site_name":"Infoblox Blog","article_published_time":"2021-07-12T15:55:03+00:00","article_modified_time":"2024-04-26T20:20:34+00:00","og_image":[{"width":612,"height":405,"url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-11.jpg","type":"image\/jpeg"}],"author":"Infoblox Threat Intel","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Infoblox Threat Intel","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-darkside-ransomware-variant\/#article","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-darkside-ransomware-variant\/"},"author":{"name":"Infoblox Threat Intel","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae"},"headline":"Cyber Threat Advisory: DarkSide Ransomware Variant","datePublished":"2021-07-12T15:55:03+00:00","dateModified":"2024-04-26T20:20:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-darkside-ransomware-variant\/"},"wordCount":792,"publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-darkside-ransomware-variant\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-11.jpg","keywords":["CISA","DarkSide","Ransomware"],"articleSection":["Cyber Threat Advisory"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-darkside-ransomware-variant\/","url":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-darkside-ransomware-variant\/","name":"CyberThreat Advisory: DarkSide Ransomware Variant","isPartOf":{"@id":"https:\/\/www.infoblox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-darkside-ransomware-variant\/#primaryimage"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-darkside-ransomware-variant\/#primaryimage"},"thumbnailUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-11.jpg","datePublished":"2021-07-12T15:55:03+00:00","dateModified":"2024-04-26T20:20:34+00:00","description":"Cyber Threat Advisory: DarkSide Ransomware Variant. On 8 July, the Cybersecurity and Infrastructure Security Agency (CISA) published a Malware Analysis Report (AR21-189A) on a variant of DarkSide ransomware. To date, there is no evidence that the variant has any association with the Colonial Pipeline security breach, which happened on 7 May, and about which Infoblox released a Cyber Threat Advisory on 13 May.","breadcrumb":{"@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-darkside-ransomware-variant\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-darkside-ransomware-variant\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-darkside-ransomware-variant\/#primaryimage","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-11.jpg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/ciu-image-11.jpg","width":612,"height":405,"caption":"Press enter button on the keyboard computer Shield cyber Key lock security system abstract technology world digital link cyber security on hi tech Dark blue background, Enter password to log in. lock finger Keyboard"},{"@type":"BreadcrumbList","@id":"https:\/\/www.infoblox.com\/blog\/threat-intelligence\/cyber-threat-advisory\/cyber-threat-advisory-darkside-ransomware-variant\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.infoblox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Infoblox Threat Intel","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/"},{"@type":"ListItem","position":3,"name":"Cyber Threat Advisory","item":"https:\/\/www.infoblox.com\/blog\/category\/threat-intelligence\/cyber-threat-advisory\/"},{"@type":"ListItem","position":4,"name":"Cyber Threat Advisory: DarkSide Ransomware Variant"}]},{"@type":"WebSite","@id":"https:\/\/www.infoblox.com\/blog\/#website","url":"https:\/\/www.infoblox.com\/blog\/","name":"infoblox.com\/blog\/","description":"","publisher":{"@id":"https:\/\/www.infoblox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.infoblox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.infoblox.com\/blog\/#organization","name":"Infoblox","url":"https:\/\/www.infoblox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","contentUrl":"https:\/\/www.infoblox.com\/blog\/wp-content\/uploads\/infoblox-logo-2.svg","width":137,"height":30,"caption":"Infoblox"},"image":{"@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.infoblox.com\/blog\/#\/schema\/person\/b6aed8965e3298a0817c16d32c0a67ae","name":"Infoblox Threat Intel","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","url":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","contentUrl":"https:\/\/blogs.infoblox.com\/wp-content\/uploads\/avatar_user_397_1714162589-96x96.png","caption":"Infoblox Threat Intel"},"description":"Infoblox Threat Intel is the leading creator of original DNS threat intelligence, distinguishing itself in a sea of aggregators. What sets us apart? Two things: mad DNS skills and unparalleled visibility. DNS is notoriously tricky to interpret and hunt from, but our deep understanding and unique access to the internet's inner workings allow us to track down threat actors that others can't see. We're proactive, not just defensive, using our insights to disrupt cybercrime where it begins. We also believe in sharing knowledge to support the broader security community by publishing detailed research and releasing indicators on GitHub. In addition, our intel is seamlessly integrated into our Infoblox Protective DNS solutions, so customers automatically get its benefits, along with ridiculously low false positive rates.","url":"https:\/\/www.infoblox.com\/blog\/author\/infoblox-threat-intel\/"}]}},"_links":{"self":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6477","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/users\/397"}],"replies":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/comments?post=6477"}],"version-history":[{"count":3,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6477\/revisions"}],"predecessor-version":[{"id":6480,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/posts\/6477\/revisions\/6480"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media\/6718"}],"wp:attachment":[{"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/media?parent=6477"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/categories?post=6477"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.infoblox.com\/blog\/wp-json\/wp\/v2\/tags?post=6477"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}