Security News > 2021 > October > FBI, CISA, NSA share defense tips for BlackMatter ransomware attacks

The Cybersecurity and Infrastructure Security Agency, the Federal Bureau of Investigation, and the National Security Agency published today an advisory with details about how the BlackMatter ransomware gang operates.
The joint cybersecurity advisory from CISA, the FBI, and the NSA shares the tactics, techniques, and procedures associated with BlackMatter activity that could help organizations protect against the BlackMatter ransomware gang.
"Notably, this variant of BlackMatter leverages the embedded credentials and SMB protocol to remotely encrypt, from the original compromised host" - joint advisory from CISA, FBI, and NSA. The BlackMatter file-encrypting malware also has a version for Linux-based systems that can encrypt VMware ESXi virtual servers, which are common in enterprise environments for resource management purposes.
The advisory today warns that, unlike other ransomware actors that encrypt backup data stores and appliances, the BlackMatter gang wipes or reformats them.
To counter BlackMatter ransomware attacks, CISA, the FBI, and the NSA shares a set of cybersecurity measures that start from the basic password hygiene and go to mitigations designed to minimize the Active Directory attack surface.
BlackMatter is among the top ransomware threats today.
News URL
Related news
- CISA and FBI: Ghost ransomware breached orgs in 70 countries (source)
- Medusa Ransomware Strikes 300+ Targets: FBI & CISA Urge Immediate Action to #StopRansomware (source)
- FBI, Europol, and NCA Take Down 8Base Ransomware Data Leak and Negotiation Sites (source)
- US indicts 8Base ransomware operators for Phobos encryption attacks (source)
- RA World Ransomware Attack in South Asia Links to Chinese Espionage Toolset (source)
- Chinese espionage tools deployed in RA World ransomware attack (source)
- Lee Enterprises newspaper disruptions caused by ransomware attack (source)
- CISA Flags Craft CMS Vulnerability CVE-2025-23209 Amid Active Attacks (source)
- CISA flags Craft CMS code injection flaw as exploited in attacks (source)
- Becoming Ransomware Ready: Why Continuous Validation Is Your Best Defense (source)