According to a recent finding, cybersecurity researchers at Bitdefender have identified a concerning development in the growing pool of threats, as a new backdoor named Trojan.MAC.RustDoor is targeting macOS users. This particular threat bears connections to the nefarious ransomware family known as BlackCat/ALPHV, which has traditionally focused on Windows systems.
The Trojan.MAC.RustDoor operates by disguising itself as an update for the widely-used Visual Studio code editor, a tactic commonly employed by cybercriminals to deceive unsuspecting users. What sets this backdoor apart is its use of the Rust programming language, making it a unique and sophisticated threat in the macOS workings. Bitdefender's advisory reveals that various iterations of this backdoor have been active for at least three months.
The malware's operating method involves collecting data from users' Desktop and Documents folders, including personal notes, which are then compressed into a ZIP archive. Subsequently, this sensitive information is transmitted to a command-and-control (C2) server, giving the attackers unauthorised access to the compromised systems.
Bitdefender researcher Andrei Lapusneau, in the advisory, emphasises that while there is not enough information to definitively attribute this campaign to a specific threat actor, certain artefacts and indicators of compromise (IoCs) suggest a possible link to the BlackBasta and ALPHV/BlackCat ransomware operators. Notably, three out of the four identified command-and-control servers have previously been associated with ransomware campaigns targeting Windows clients.
It is worth noting that the ALPHV/BlackCat ransomware, like Trojan.MAC.RustDoor, is coded in Rust, indicating a potential connection between the two threats. Historically, the BlackCat/ALPHV ransomware group has predominantly targeted Windows systems, with a particular focus on Microsoft Exchange Services.
As cybersecurity threats continue to multiply its digital presence, it is crucial for macOS users to remain vigilant and take proactive measures to protect their systems. This latest event underscores the importance of staying informed about potential threats and adopting best practices for withstanding cybersecurity hassles.
The users are advised to exercise caution when downloading and installing software updates, especially from unofficial sources. Employing reputable antivirus software and keeping systems up-to-date with the latest security patches can also serve as effective measures to mitigate the risk of falling short to such malicious activities.
The identification of Trojan.MAC.RustDoor serves as a reminder that threats can manifest in unexpected ways, emphasising the need for ongoing practical methods and collaboration within the cybersecurity community to safeguard users against these potential cyber threats.
In a recent occurrence of a cyber threat, the infamous ransomware gang known as ALPHV, or Blackcat, has claimed responsibility for breaching the Technica Corporation, a company supporting the U.S. Federal Government. ALPHV announced on the dark web that it successfully stole 300GB of data, including classified and top-secret documents related to U.S. intelligence agencies like the FBI. The group threatened to sell or publicly release the data if Technica did not contact them promptly.
The dark web post included a sample of the stolen data, revealing 29 documents, including contracts from the Department of Defense and personal information of Technica employees. The Daily Dot reached out to Technica for confirmation but received no response at the time of press.
Brett Callow, a threat analyst at Emsisoft, highlighted the seriousness of the situation, emphasising that such incidents should not be viewed in isolation. Exfiltrated data could be combined with information from other attacks, amplifying the impact. ALPHV's recent attack follows the takedown of their dark web homepage by the FBI and global intelligence agencies last month. Despite this, the group easily relaunched its site elsewhere on the dark web.
ALPHV gained notoriety for its previous attack on casinos in Las Vegas, causing significant disruption. The group is also known for targeting critical infrastructure and medical facilities, including plastic surgery clinics. The FBI questioned about the alleged breach and the documents obtained by ALPHV, did not respond to inquiries from the Daily Dot.
Within the field of cybersecurity, the recent breach is causing heightened apprehension due to the potential exposure of classified information. Experts stress the need to view these incidents in a broader context, underscoring that the combination of data from various sources could lead to consequences more significant than initially perceived.
ALPHV's history of targeting diverse sectors underscores the need for heightened cybersecurity measures across industries. As the situation unfolds, it emphasises the evolving challenges organisations face in protecting sensitive information from increasingly sophisticated cyber threats.
The ongoing threat posed by ransomware groups like ALPHV highlights the urgency for organisations to bolster their cybersecurity defences and collaborate with law enforcement agencies to address the growing menace of cyber attacks on critical infrastructure and government institutions.
Henry Schein is a Fortune 500 healthcare products and services provider with operations and affiliates in 32 countries, with approximately $12 billion in revenue reported in 2022.
It first made public on October 15 that, following a cyberattack the day before, it had to take some systems offline in order to contain the threat.
On November 22, more than a month later, the company announced that parts of its apps and the e-commerce platform had once more been taken down due to another attack that was attributed to the BlackCat ransomware.
"Certain Henry Schein applications, including its ecommerce platform, are currently unavailable. The Company continues to take orders using alternate means and continues to ship to its customers," the announcement said.
"Henry Schein has identified the cause of the occurrence. The threat actor from the previously disclosed cyber incident has claimed responsibility."
Today, the company released a statement, noting that it has restored its U.S. e-commerce platform and that it is expecting its platforms in Canada and Europe to be back online shortly.
The healthcare services company is apparently still taking orders through alternate methods and distributing them to customers in the affected areas.
Following the breach, the ransomware gang BlackCat added Henry Schein to its dark web leak forum, taking responsibility for breaching the company’s network. BlackCat notes that it has stolen 35 terabytes of the company’s crucial data.
The cybercrime organization claims that they re-encrypted the company's devices while Henry Schein was about to restore its systems, following a breakdown in negotiations toward the end of October.
This would make the event this month the third time that BlackCat has compromised Henry Schein's network and encrypted its computers after doing so on October 15.
"Despite ongoing discussions with Henry's team, we have not received any indication of their willingness to prioritize the security of their clients, partners, and employees, let alone protect their own network," the threat actors said.
The ransomware group further warned of releasing their internal payroll data and shareholder folders to their collective blog by midnight.
Initially discovered in November 2021, BlackCat is believed to have rebranded itself from the popular DarkSide/BlackMatter gang. DarkSide has earlier gained global recognition by initiating attacks on Colonial Pipelines, prompting extensive law enforcement probes.
Moreover, the FBI has linked the ransomware group to over 60 breaches, between November 2021 and March 2022, affecting companies globally.