Blog

  • Fresh Produce | Three pairs of Shimano glasses with high-tech names

    Fresh Produce | Three pairs of Shimano glasses with high-tech names

    The latest buzz around Shimano’s XTR and XT Di2 drivetrains, along with all-new brakes and wheels, has been, shall we say, electric. The brand is extremely well-known for its components and footwear, but its eyewear is sometimes…

    Continue Reading

  • Supposed Viking ship turned out to be a 15th-century vessel

    Supposed Viking ship turned out to be a 15th-century vessel

    A shipwreck resting about 20 miles south of Stockholm, known as “Wreck 5,” has a new identity. It was long filed under “Viking,” but fresh fieldwork shows it is a late medieval vessel built with flush planking, a style that changed how…

    Continue Reading

  • Mucoactives Found to Have Little Benefit for Bronchiectasis

    Mucoactives Found to Have Little Benefit for Bronchiectasis

    A new study has found that neither hypertonic saline nor carbocisteine significantly reduced the mean incidence of pulmonary exacerbations in people with bronchiectasis over 52 weeks.1

    “Some current guidelines recommend mucoactive drugs plus…

    Continue Reading

  • The “BlackSuit Blitz” at a Global Equipment Manufacturer

    The “BlackSuit Blitz” at a Global Equipment Manufacturer

    Unit 42 recently assisted a prominent manufacturer who experienced a severe ransomware attack orchestrated by Ignoble Scorpius, the group that distributes BlackSuit ransomware. This incident serves as a reminder of how a seemingly minor issue — in this case, a single set of compromised VPN credentials — can lead to a full-scale corporate crisis with tremendous impact to the bottom line.

    The Attack: A Combination of Reconnaissance and Ransomware

    The Ignoble Scorpius attack began with a voice phishing (vishing) call. The attacker impersonated the company’s IT help desk and tricked an employee into entering their legitimate VPN credentials on a phishing site.

    With these credentials, the threat actor gained initial network access and immediately escalated their privileges. They executed a DCSync attack on a domain controller to steal highly privileged credentials, including a key service account. Using these compromised credentials, they moved laterally across the network using RDP and SMB, employing tools like Advanced IP Scanner and SMBExec to map the network and identify high-value targets.

    The attackers established persistence by deploying AnyDesk and a custom RAT on a domain controller, configured as a scheduled task to survive reboots. (It is important to note that threat actors often abuse and take advantage of legitimate products like AnyDesk for malicious purposes. We are not implying that the legitimate product is flawed.)

    The attackers then compromised a second domain controller, extracting the NTDS.dit database containing all user password hashes, and exfiltrated over 400 GB of data using a renamed rclone utility. To cover their tracks, the threat actors deployed CCleaner to erase forensic evidence before unleashing the final blow: BlackSuit ransomware, orchestrated through Ansible, simultaneously encrypted hundreds of virtual machines across approximately 60 VMware ESXi hosts, disrupting operations across the entire infrastructure.

    How Unit 42 Helped

    When Unit 42 was engaged, we helped the client expand their Cortex XDR deployment from 250 to over 17,000 endpoints, providing enterprise-wide visibility to track the attacker’s every move. We also leveraged Cortex XSOAR to automate containment actions, stopping the attack from spreading further.

    Our investigation identified the full attack path and led to some critical recommendations including:

    • Network Security: Replace end-of-life Cisco ASA firewalls with Next-Generation Firewalls (NGFW), implement network segmentation, and restrict administrative access to critical systems (like DCs and ESXi hosts) to dedicated management VLANs.
    • Identity and Access Management: Enforce MFA for all remote access, disable NTLM or require EPA, rotate all credentials, and restrict service accounts from being used for interactive logons like RDP.
    • Endpoint and Server Hardening: Block EFSRPC using RPC filters to prevent PetitPotam/DCSync attacks, deploy and maintain a fully patched XDR solution on all endpoints, and have a strict policy for removing EOL systems.
    • Logging and Monitoring: Enhance log retention to 90-plus days for critical sources (ESXi, firewalls, Nasuni), ensure logs are properly parsed for effective analysis, and enable features like AWS CloudTrail log validation.

    The Outcome

    The client was able to achieve several key outcomes:

    • Financial demand negated: We successfully negated the $20 million ransom demand, ensuring the client paid no ransom.
    • Expanded visibility: The engagement expanded the client’s endpoint visibility from 250 to over 17,000, creating a robust foundation for future security operations.
    • Strategic guidance: We provided bespoke, strategic after-incident guidance, helping the client fortify their defenses and prevent future attacks.
    • Continuous monitoring: Following the incident, the client onboarded Unit 42 Managed Detection and Response (MDR) services for continuous monitoring, ensuring they are better prepared to handle future threats.

    The Takeaway

    This attack serves as a stark reminder that even a single compromised credential can create a domino effect, leading to a catastrophic security breach. The swift and sophisticated tactics of threat actors like Ignoble Scorpius and their use of BlackSuit ransomware demonstrate the critical need for a proactive and multi-layered defense strategy.

    By implementing MFA on all remote access points, and integrating robust endpoint visibility, automated containment, and expert guidance, organizations can not only disrupt an attack in progress but also shore up their defenses to prevent future incidents. Most importantly, investments in proactive security assessments have shown to pay dividends that far outweigh the costs of operational and financial impact of a full-scale ransomware attack.

    Interested in learning more about the latest attack trends? If so, take a look at our 2025 Unit 42 Global Incident Response Report, which distills the most critical findings based on our direct experience responding to real-world cyberattacks at over 500 organizations across 38 countries.

    Additional Resources

    About Unit 42

    Unit 42 strengthens your team with the tools and expertise needed to stay ahead of threats like BlackSuit ransomware and protect your business. With our proven strategies and insights from thousands of engagements, we’ll help your team handle the toughest situations with confidence.

    Continue Reading

  • Samsung will introduce its Android XR headset at a Galaxy event on October 21

    Samsung will introduce its Android XR headset at a Galaxy event on October 21

    Samsung is back with another event this fall, which it has dubbed Worlds Wide Open. The company said that it will use this opportunity to officially unveil its Android XR headset, internally known as Project Moohan. The livestreamed event will…

    Continue Reading

  • Why Do Women Outlive Men? Evolution’s Secret Revealed Across 1,000 Species – SciTechDaily

    1. Why Do Women Outlive Men? Evolution’s Secret Revealed Across 1,000 Species  SciTechDaily
    2. Why do women live longer than men? A study offers clues to close the gap  NPR
    3. Why do so many female animals live longer than males? New research  The…

    Continue Reading

  • Poopular Science: AI toilets get to the bottom of your gut health

    Poopular Science: AI toilets get to the bottom of your gut health

    Your morning poop can be a window into your well-being — if you know what to look for. Thanks to technology, that closer look can now be automated. From AI-powered apps analysing stool colour, shape, and consistency to detect potential…

    Continue Reading

  • 175+ CVEs, 3 under attack • The Register

    175+ CVEs, 3 under attack • The Register

    Spooky season is in full swing, and this extends to Microsoft’s October Patch Tuesday with security updates for a frightful 175 Microsoft vulnerabilities, plus an additional 21 non-Microsoft CVEs. And even scarier than the sheer number of bugs:…

    Continue Reading

  • Fatal Attraction: Electric Charge Connects Jumping Worm To Aerial Prey

    Fatal Attraction: Electric Charge Connects Jumping Worm To Aerial Prey

    A tiny worm that leaps high into the air — up to 25 times its body length — to attach to flying insects uses static electricity to perform this astounding feat, scientists have found. The journal PNAS published the work on the…

    Continue Reading

  • From insight to impact: How clinical decision support is powering precision medicine in Middle East

    From insight to impact: How clinical decision support is powering precision medicine in Middle East

    From clicks to clinical impact

    Beyond point-of-care support, clinical decision support solutions also offer powerful analytics. “We’re not just tracking usage—we’re translating it into insights,” said Fulcher. “We can show hospitals what clinicians are searching for, how that aligns with prescribing patterns, and where there are gaps in knowledge or compliance.”

    Integration and accessibility: Meeting clinicians where they are

    To maximize impact, clinical decision support tools must be embedded into clinical workflows. “The ideal solution is one click away—within the EMR, mobile app, or even Microsoft Copilot,” said Fulcher. “We’re building a hub-and-spoke model where trusted content is accessible wherever clinicians need it.”

    Dr. Ahmed Al-Dammas, Chief Data Officer at the Saudi Council of Health Insurance, stressed the importance of seamless access: “If it’s not integrated, it’s not used. Single sign-on, mobile optimization, and HL7 integration are no longer nice-to-haves — they’re must-haves.”

    While the clinical benefits are clear, the financial case is equally compelling. “CDS tools reduce adverse drug events, shorten hospital stays, and improve formulary compliance,” said Dr. Abu-Gheida. “That’s real ROI—especially in value-based care models.”

    Dr. Osama Hassan added, “If we want to move from fee-for-service to outcomes-based reimbursement, we need solutions that link decisions to results. Wolters Kluwer’s UpToDate® and Medi-Span® do exactly that.”

    Looking ahead: A shared vision for safer, smarter care

    As the Think Tank concluded, one message resonated: precision medicine is a team sport. It requires collaboration across clinicians, technologists, regulators, and solution providers.

    “We’re not just building tools—we’re building trust,” said Fulcher. “And that trust is what turns insight into impact.”

    Continue Reading