Ransomware remains a major problem for businesses, and a new cybercriminal group is expanding at an alarming rate. Security researchers at ReliaQuest have identified BlackLock as the fastest-growing ransomware operation today, with its activity increasing by 1,425% since late 2024. Although it is currently the seventh most active ransomware group, experts predict it could become the biggest threat in 2025.
Despite law enforcement cracking down on major ransomware gangs like LockBit in 2024, the number of cyberattacks continues to grow. A report from January 31 suggested ransomware incidents had risen by 15% compared to the previous year. However, a February 20 study by Symantec showed a slower increase of just 3%. No matter the rate, the takeaway is the same, ransomware remains a serious risk.
How BlackLock Ransomware Operates
BlackLock ransomware is designed to infect Windows, Linux, and VMware ESXi systems, making it a versatile and dangerous threat. Cybercriminals behind this operation have developed unique methods to pressure victims into paying ransom quickly.
1. Blocking access to stolen data
- Ransomware groups often leak stolen information on dark web sites to force victims to pay.
- BlackLock makes it harder for victims and cybersecurity teams to access leaked data by blocking repeated download attempts.
- If someone tries to retrieve files too often, they either receive no response or only see empty files with contact details instead of real data.
- This tactic prevents companies from fully understanding what was stolen, increasing the likelihood of paying the ransom.
2. Recruiting criminals to assist with attacks
- BlackLock actively hires "traffers," cybercriminals who help spread ransomware by tricking people into downloading malware.
- These traffers guide victims toward fake websites or malicious links that install ransomware.
- The group openly recruits low-level hackers on underground forums, while more skilled cybercriminals are privately contacted for higher-level roles.
Steps to Protect Your Systems
Security experts recommend taking immediate action to strengthen defenses, especially for companies using VMware ESXi servers. Here are some key steps:
1. Turn off unnecessary services
- Disable unused features like vMotion and SNMP to reduce possible entry points for attackers.
2. Strengthen security restrictions
- Configure VMware ESXi hosts to only allow management through vCenter, making it harder for hackers to exploit weaknesses.
3. Limit network access
- Use firewalls and strict access controls to prevent unauthorized users from reaching sensitive systems.
Additional recommendations include:
1. Activating multi-factor authentication (MFA) to prevent unauthorized logins.
2. Disabling Remote Desktop Protocol (RDP) on systems that do not need remote access.
The rapid rise of BlackLock ransomware shows that cybercriminals ar constantly developing new strategies to pressure victims and avoid detection. Organizations must take proactive steps to secure their networks and stay informed about emerging threats. Implementing strong security controls today can prevent costly cyberattacks in the future.