BYLINE: Sarah C.P. Williams
Newswise — They linger in our water, our blood and the environment—so-called “forever chemicals” that are notoriously difficult to detect.
But researchers at the University of Chicago Pritzker…
BYLINE: Sarah C.P. Williams
Newswise — They linger in our water, our blood and the environment—so-called “forever chemicals” that are notoriously difficult to detect.
But researchers at the University of Chicago Pritzker…
With a front paw outstretched and its tail at an angle, the creature that fell on to wet concrete in Chicago left quite the memento mori.
Now, researchers say they have unmasked the identity of the victim, revealing the famous “rat hole” was…
A rat-shaped indent on a Chicago sidewalk went viral early last year, with troves of people venturing to the hole bearing coins and other offerings. However, a new study suggests the so-called “Chicago Rat Hole” wasn’t actually made by a rat —…
Unit 42 recently assisted a prominent manufacturer who experienced a severe ransomware attack orchestrated by Ignoble Scorpius, the group that distributes BlackSuit ransomware. This incident serves as a reminder of how a seemingly minor issue — in this case, a single set of compromised VPN credentials — can lead to a full-scale corporate crisis with tremendous impact to the bottom line.
The Ignoble Scorpius attack began with a voice phishing (vishing) call. The attacker impersonated the company’s IT help desk and tricked an employee into entering their legitimate VPN credentials on a phishing site.
With these credentials, the threat actor gained initial network access and immediately escalated their privileges. They executed a DCSync attack on a domain controller to steal highly privileged credentials, including a key service account. Using these compromised credentials, they moved laterally across the network using RDP and SMB, employing tools like Advanced IP Scanner and SMBExec to map the network and identify high-value targets.
The attackers established persistence by deploying AnyDesk and a custom RAT on a domain controller, configured as a scheduled task to survive reboots. (It is important to note that threat actors often abuse and take advantage of legitimate products like AnyDesk for malicious purposes. We are not implying that the legitimate product is flawed.)
The attackers then compromised a second domain controller, extracting the NTDS.dit database containing all user password hashes, and exfiltrated over 400 GB of data using a renamed rclone utility. To cover their tracks, the threat actors deployed CCleaner to erase forensic evidence before unleashing the final blow: BlackSuit ransomware, orchestrated through Ansible, simultaneously encrypted hundreds of virtual machines across approximately 60 VMware ESXi hosts, disrupting operations across the entire infrastructure.
When Unit 42 was engaged, we helped the client expand their Cortex XDR deployment from 250 to over 17,000 endpoints, providing enterprise-wide visibility to track the attacker’s every move. We also leveraged Cortex XSOAR to automate containment actions, stopping the attack from spreading further.
Our investigation identified the full attack path and led to some critical recommendations including:
The client was able to achieve several key outcomes:
This attack serves as a stark reminder that even a single compromised credential can create a domino effect, leading to a catastrophic security breach. The swift and sophisticated tactics of threat actors like Ignoble Scorpius and their use of BlackSuit ransomware demonstrate the critical need for a proactive and multi-layered defense strategy.
By implementing MFA on all remote access points, and integrating robust endpoint visibility, automated containment, and expert guidance, organizations can not only disrupt an attack in progress but also shore up their defenses to prevent future incidents. Most importantly, investments in proactive security assessments have shown to pay dividends that far outweigh the costs of operational and financial impact of a full-scale ransomware attack.
Interested in learning more about the latest attack trends? If so, take a look at our 2025 Unit 42 Global Incident Response Report, which distills the most critical findings based on our direct experience responding to real-world cyberattacks at over 500 organizations across 38 countries.
Unit 42 strengthens your team with the tools and expertise needed to stay ahead of threats like BlackSuit ransomware and protect your business. With our proven strategies and insights from thousands of engagements, we’ll help your team handle the toughest situations with confidence.
Follow ZDNET: Add us as a preferred source on Google.
Samsung is finally about to reveal more details about its Project Moohan mixed reality headset. The company just announced a new “Worlds Wide Open” Galaxy event that will take place on October 21st at 10PM ET, where it’s promising to reveal…
Samsung is back with another event this fall, which it has dubbed Worlds Wide Open. The company said that it will use this opportunity to officially unveil its Android XR headset, internally known as Project Moohan. The livestreamed event will…
Britney Spears is firing back at her ex-husband Kevin Federline following his explosive new memoir.
As reported by PEOPLE Magazine, the pop…
SANTA CLARA, Calif., Oct. 14, 2025 — NVIDIA has announced it will start shipping NVIDIA DGX Spark, the world’s smallest AI supercomputer. AI workloads are quickly outgrowing the memory and software capabilities of the PCs, workstations…