Back to Resources

SentinelOne Vs. BlackByte Ransomware – Mitigation and Rollback

Watch how SentinelOne mitigates and rolls back BlackByte. BlackByte’s highly-obfuscated JS Loader is delivered via multiple methods (watering hole, exploit kit, other malware/frameworks). The obfuscated JavaScript is typically used to prep the victim for further activity (ex: facilitating the modification of firewall rules for exfiltration) as well as receiving/decoding the main payload (encryptor) for execution. The JS Loader modifies various services and system components that may inhibit the encryption process. This includes the disabling of VSS / Volume Shadow Copies as well as disabling MSQL services.

The Loader also targets the Raccine security product specifically, attempting to shut down or circumvent components of that product. BlackByte ransomware started gaining greater visibility in August of 2021, with the unveiling of their victim “data auction”/blog site.

Lies jetzt

Erleben Sie die weltweit fortschrittlichste Cybersecurity Plattform in Aktion

Erfahren Sie, wie unsere intelligente, autonome Cybersecurity Plattform Ihr Unternehmen heute und morgen schützt.