Blog

  • Fresh Produce | Three pairs of Shimano glasses with high-tech names

    Fresh Produce | Three pairs of Shimano glasses with high-tech names

    The latest buzz around Shimano’s XTR and XT Di2 drivetrains, along with all-new brakes and wheels, has been, shall we say, electric. The brand is extremely well-known for its components and footwear, but its eyewear is sometimes…

    Continue Reading

  • Angelique Kerber returns to the winner’s circle in Luxembourg

    Angelique Kerber returns to the winner’s circle in Luxembourg

    Four months after giving birth to her second child, former World No.1 Angelique Kerber delivered on debut at the Luxembourg Ladies Tennis Masters, edging newly retired Alizé Cornet in Sunday’s title bout 1-6, 6-3,…

    Continue Reading

  • Supposed Viking ship turned out to be a 15th-century vessel

    Supposed Viking ship turned out to be a 15th-century vessel

    A shipwreck resting about 20 miles south of Stockholm, known as “Wreck 5,” has a new identity. It was long filed under “Viking,” but fresh fieldwork shows it is a late medieval vessel built with flush planking, a style that changed how…

    Continue Reading

  • Mucoactives Found to Have Little Benefit for Bronchiectasis

    Mucoactives Found to Have Little Benefit for Bronchiectasis

    A new study has found that neither hypertonic saline nor carbocisteine significantly reduced the mean incidence of pulmonary exacerbations in people with bronchiectasis over 52 weeks.1

    “Some current guidelines recommend mucoactive drugs plus…

    Continue Reading

  • Could humans build floating cities on Venus?

    Could humans build floating cities on Venus?

    The dream of living on another planet has intrigued scientists, engineers, and explorers for a long time. Now, the dream is moving closer to becoming a reality with researchers at the University of Central Florida (UCF) and beyond exploring how…

    Continue Reading

  • Nvidia to start shipping AI-optimized DGX Spark desktop computer

    Nvidia to start shipping AI-optimized DGX Spark desktop computer

    Nvidia Corp. late Monday announced the launch of the DGX Spark, a compact desktop computer optimized to run artificial intelligence models.

    Software teams typically use cloud infrastructure to fine-tune neural networks. Setting up an…

    Continue Reading

  • Tiny Sensors Rapidly Detect ‘Forever Chemicals’ in Water

    Tiny Sensors Rapidly Detect ‘Forever Chemicals’ in Water

    BYLINE: Sarah C.P. Williams

    Newswise — They linger in our water, our blood and the environment—so-called “forever chemicals” that are notoriously difficult to detect.

    But researchers at the University of Chicago Pritzker…

    Continue Reading

  • Chicago ‘Splatatouille’ was probably a squirrel, say researchers | Animals

    Chicago ‘Splatatouille’ was probably a squirrel, say researchers | Animals

    With a front paw outstretched and its tail at an angle, the creature that fell on to wet concrete in Chicago left quite the memento mori.

    Now, researchers say they have unmasked the identity of the victim, revealing the famous “rat hole” was…

    Continue Reading

  • The simple activity found to help mothers with post natal depression

    The simple activity found to help mothers with post natal depression

    Continue Reading

  • The “BlackSuit Blitz” at a Global Equipment Manufacturer

    The “BlackSuit Blitz” at a Global Equipment Manufacturer

    Unit 42 recently assisted a prominent manufacturer who experienced a severe ransomware attack orchestrated by Ignoble Scorpius, the group that distributes BlackSuit ransomware. This incident serves as a reminder of how a seemingly minor issue — in this case, a single set of compromised VPN credentials — can lead to a full-scale corporate crisis with tremendous impact to the bottom line.

    The Attack: A Combination of Reconnaissance and Ransomware

    The Ignoble Scorpius attack began with a voice phishing (vishing) call. The attacker impersonated the company’s IT help desk and tricked an employee into entering their legitimate VPN credentials on a phishing site.

    With these credentials, the threat actor gained initial network access and immediately escalated their privileges. They executed a DCSync attack on a domain controller to steal highly privileged credentials, including a key service account. Using these compromised credentials, they moved laterally across the network using RDP and SMB, employing tools like Advanced IP Scanner and SMBExec to map the network and identify high-value targets.

    The attackers established persistence by deploying AnyDesk and a custom RAT on a domain controller, configured as a scheduled task to survive reboots. (It is important to note that threat actors often abuse and take advantage of legitimate products like AnyDesk for malicious purposes. We are not implying that the legitimate product is flawed.)

    The attackers then compromised a second domain controller, extracting the NTDS.dit database containing all user password hashes, and exfiltrated over 400 GB of data using a renamed rclone utility. To cover their tracks, the threat actors deployed CCleaner to erase forensic evidence before unleashing the final blow: BlackSuit ransomware, orchestrated through Ansible, simultaneously encrypted hundreds of virtual machines across approximately 60 VMware ESXi hosts, disrupting operations across the entire infrastructure.

    How Unit 42 Helped

    When Unit 42 was engaged, we helped the client expand their Cortex XDR deployment from 250 to over 17,000 endpoints, providing enterprise-wide visibility to track the attacker’s every move. We also leveraged Cortex XSOAR to automate containment actions, stopping the attack from spreading further.

    Our investigation identified the full attack path and led to some critical recommendations including:

    • Network Security: Replace end-of-life Cisco ASA firewalls with Next-Generation Firewalls (NGFW), implement network segmentation, and restrict administrative access to critical systems (like DCs and ESXi hosts) to dedicated management VLANs.
    • Identity and Access Management: Enforce MFA for all remote access, disable NTLM or require EPA, rotate all credentials, and restrict service accounts from being used for interactive logons like RDP.
    • Endpoint and Server Hardening: Block EFSRPC using RPC filters to prevent PetitPotam/DCSync attacks, deploy and maintain a fully patched XDR solution on all endpoints, and have a strict policy for removing EOL systems.
    • Logging and Monitoring: Enhance log retention to 90-plus days for critical sources (ESXi, firewalls, Nasuni), ensure logs are properly parsed for effective analysis, and enable features like AWS CloudTrail log validation.

    The Outcome

    The client was able to achieve several key outcomes:

    • Financial demand negated: We successfully negated the $20 million ransom demand, ensuring the client paid no ransom.
    • Expanded visibility: The engagement expanded the client’s endpoint visibility from 250 to over 17,000, creating a robust foundation for future security operations.
    • Strategic guidance: We provided bespoke, strategic after-incident guidance, helping the client fortify their defenses and prevent future attacks.
    • Continuous monitoring: Following the incident, the client onboarded Unit 42 Managed Detection and Response (MDR) services for continuous monitoring, ensuring they are better prepared to handle future threats.

    The Takeaway

    This attack serves as a stark reminder that even a single compromised credential can create a domino effect, leading to a catastrophic security breach. The swift and sophisticated tactics of threat actors like Ignoble Scorpius and their use of BlackSuit ransomware demonstrate the critical need for a proactive and multi-layered defense strategy.

    By implementing MFA on all remote access points, and integrating robust endpoint visibility, automated containment, and expert guidance, organizations can not only disrupt an attack in progress but also shore up their defenses to prevent future incidents. Most importantly, investments in proactive security assessments have shown to pay dividends that far outweigh the costs of operational and financial impact of a full-scale ransomware attack.

    Interested in learning more about the latest attack trends? If so, take a look at our 2025 Unit 42 Global Incident Response Report, which distills the most critical findings based on our direct experience responding to real-world cyberattacks at over 500 organizations across 38 countries.

    Additional Resources

    About Unit 42

    Unit 42 strengthens your team with the tools and expertise needed to stay ahead of threats like BlackSuit ransomware and protect your business. With our proven strategies and insights from thousands of engagements, we’ll help your team handle the toughest situations with confidence.

    Continue Reading