Loading…
Analyzing WhisperGate and BlackCat Malware: Methodology and Threat Perspective
The increasing use of powerful evasive ransomware malware in cyber warfare and targeted attacks is a persistent and growing challenge for nations, corporations, and small and medium-sized enterprises. This threat is evidenced by the emergence of the WhisperGate malware in cyber warfare, which target...
Saved in:
Published in: | International journal of advanced computer science & applications 2023, Vol.14 (4) |
---|---|
Main Authors: | , , |
Format: | Article |
Language: | English |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | |
container_issue | 4 |
container_start_page | |
container_title | International journal of advanced computer science & applications |
container_volume | 14 |
creator | Nicho, Mathew Yadav, Rajesh Singh, Digvijay |
description | The increasing use of powerful evasive ransomware malware in cyber warfare and targeted attacks is a persistent and growing challenge for nations, corporations, and small and medium-sized enterprises. This threat is evidenced by the emergence of the WhisperGate malware in cyber warfare, which targets organizations in Ukraine to render targeted devices inoperable, and the BlackCat malware, which targets large organizations by encrypting files. This paper outlines a practical approach to malware analysis using WhisperGate and BlackCat malware as samples. It subjects them to heuristic-based analysis techniques, including a combination of static, dynamic, hybrid, and memory analysis. Specifically, 12 tools and techniques were selected and deployed to reveal the malware’s innovative stealth and evasion capabilities. This methodology shows what techniques can be applied to analyze critical malware and differentiate samples that are variations of known threats. The paper presents currently available tools and their underlying approaches to performing automated dynamic analysis on potentially malicious software. The study thus demonstrates a practical approach to carrying out malware analysis to understand cybercriminals’ behavior, techniques, and tactics. |
doi_str_mv | 10.14569/IJACSA.2023.0140456 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2819915997</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2819915997</sourcerecordid><originalsourceid>FETCH-LOGICAL-c274t-edaf419117541bc7e9890ebe6e47f9dd030cb7864da42e48792387f4c21527573</originalsourceid><addsrcrecordid>eNotkMtOwzAQRS0EElXpH7CIxDrFz9hmFyIoRS0gUQQ7y3UmbUpoip2CwteTPmYzo5k7V7oHoUuCh4SLRF-PH9PsNR1STNkQE4675QnqUSKSWAiJT_ezigmWH-doEMIKd8U0TRTroad0bav2r1wvovdlGTbgR7aByK7z6Lay7jOzTTS11a_1cBNNoVnWeV3Vi3avmC09dPcX8N2ja8ofuEBnha0CDI69j97u72bZQzx5Ho2zdBI7KnkTQ24LTjQhUnAydxK00hjmkACXhc5zzLCbS5Xw3HIKXElNmZIFd10SKoVkfXR18N34-nsLoTGreuu7KMFQRbQmQuudih9UztcheCjMxpdf1reGYLOHZw7wzA6eOcJj_xTrYXo</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2819915997</pqid></control><display><type>article</type><title>Analyzing WhisperGate and BlackCat Malware: Methodology and Threat Perspective</title><source>Publicly Available Content Database (Proquest) (PQ_SDU_P3)</source><source>EZB Electronic Journals Library</source><creator>Nicho, Mathew ; Yadav, Rajesh ; Singh, Digvijay</creator><creatorcontrib>Nicho, Mathew ; Yadav, Rajesh ; Singh, Digvijay</creatorcontrib><description>The increasing use of powerful evasive ransomware malware in cyber warfare and targeted attacks is a persistent and growing challenge for nations, corporations, and small and medium-sized enterprises. This threat is evidenced by the emergence of the WhisperGate malware in cyber warfare, which targets organizations in Ukraine to render targeted devices inoperable, and the BlackCat malware, which targets large organizations by encrypting files. This paper outlines a practical approach to malware analysis using WhisperGate and BlackCat malware as samples. It subjects them to heuristic-based analysis techniques, including a combination of static, dynamic, hybrid, and memory analysis. Specifically, 12 tools and techniques were selected and deployed to reveal the malware’s innovative stealth and evasion capabilities. This methodology shows what techniques can be applied to analyze critical malware and differentiate samples that are variations of known threats. The paper presents currently available tools and their underlying approaches to performing automated dynamic analysis on potentially malicious software. The study thus demonstrates a practical approach to carrying out malware analysis to understand cybercriminals’ behavior, techniques, and tactics.</description><identifier>ISSN: 2158-107X</identifier><identifier>EISSN: 2156-5570</identifier><identifier>DOI: 10.14569/IJACSA.2023.0140456</identifier><language>eng</language><publisher>West Yorkshire: Science and Information (SAI) Organization Limited</publisher><subject>Cybersecurity ; Electronic warfare ; Malware ; Organizations ; Ransomware</subject><ispartof>International journal of advanced computer science & applications, 2023, Vol.14 (4)</ispartof><rights>2023. This work is licensed under http://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.proquest.com/docview/2819915997?pq-origsite=primo$$EHTML$$P50$$Gproquest$$Hfree_for_read</linktohtml><link.rule.ids>314,780,784,4024,25753,27923,27924,27925,37012,44590</link.rule.ids></links><search><creatorcontrib>Nicho, Mathew</creatorcontrib><creatorcontrib>Yadav, Rajesh</creatorcontrib><creatorcontrib>Singh, Digvijay</creatorcontrib><title>Analyzing WhisperGate and BlackCat Malware: Methodology and Threat Perspective</title><title>International journal of advanced computer science & applications</title><description>The increasing use of powerful evasive ransomware malware in cyber warfare and targeted attacks is a persistent and growing challenge for nations, corporations, and small and medium-sized enterprises. This threat is evidenced by the emergence of the WhisperGate malware in cyber warfare, which targets organizations in Ukraine to render targeted devices inoperable, and the BlackCat malware, which targets large organizations by encrypting files. This paper outlines a practical approach to malware analysis using WhisperGate and BlackCat malware as samples. It subjects them to heuristic-based analysis techniques, including a combination of static, dynamic, hybrid, and memory analysis. Specifically, 12 tools and techniques were selected and deployed to reveal the malware’s innovative stealth and evasion capabilities. This methodology shows what techniques can be applied to analyze critical malware and differentiate samples that are variations of known threats. The paper presents currently available tools and their underlying approaches to performing automated dynamic analysis on potentially malicious software. The study thus demonstrates a practical approach to carrying out malware analysis to understand cybercriminals’ behavior, techniques, and tactics.</description><subject>Cybersecurity</subject><subject>Electronic warfare</subject><subject>Malware</subject><subject>Organizations</subject><subject>Ransomware</subject><issn>2158-107X</issn><issn>2156-5570</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2023</creationdate><recordtype>article</recordtype><sourceid>PIMPY</sourceid><recordid>eNotkMtOwzAQRS0EElXpH7CIxDrFz9hmFyIoRS0gUQQ7y3UmbUpoip2CwteTPmYzo5k7V7oHoUuCh4SLRF-PH9PsNR1STNkQE4675QnqUSKSWAiJT_ezigmWH-doEMIKd8U0TRTroad0bav2r1wvovdlGTbgR7aByK7z6Lay7jOzTTS11a_1cBNNoVnWeV3Vi3avmC09dPcX8N2ja8ofuEBnha0CDI69j97u72bZQzx5Ho2zdBI7KnkTQ24LTjQhUnAydxK00hjmkACXhc5zzLCbS5Xw3HIKXElNmZIFd10SKoVkfXR18N34-nsLoTGreuu7KMFQRbQmQuudih9UztcheCjMxpdf1reGYLOHZw7wzA6eOcJj_xTrYXo</recordid><startdate>2023</startdate><enddate>2023</enddate><creator>Nicho, Mathew</creator><creator>Yadav, Rajesh</creator><creator>Singh, Digvijay</creator><general>Science and Information (SAI) Organization Limited</general><scope>AAYXX</scope><scope>CITATION</scope><scope>3V.</scope><scope>7XB</scope><scope>8FE</scope><scope>8FG</scope><scope>8FK</scope><scope>8G5</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>GUQSH</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>M2O</scope><scope>MBDVC</scope><scope>P5Z</scope><scope>P62</scope><scope>PIMPY</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>Q9U</scope></search><sort><creationdate>2023</creationdate><title>Analyzing WhisperGate and BlackCat Malware: Methodology and Threat Perspective</title><author>Nicho, Mathew ; Yadav, Rajesh ; Singh, Digvijay</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c274t-edaf419117541bc7e9890ebe6e47f9dd030cb7864da42e48792387f4c21527573</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2023</creationdate><topic>Cybersecurity</topic><topic>Electronic warfare</topic><topic>Malware</topic><topic>Organizations</topic><topic>Ransomware</topic><toplevel>online_resources</toplevel><creatorcontrib>Nicho, Mathew</creatorcontrib><creatorcontrib>Yadav, Rajesh</creatorcontrib><creatorcontrib>Singh, Digvijay</creatorcontrib><collection>CrossRef</collection><collection>ProQuest Central (Corporate)</collection><collection>ProQuest Central (purchase pre-March 2016)</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>ProQuest Central (Alumni) (purchase pre-March 2016)</collection><collection>Research Library (Alumni Edition)</collection><collection>ProQuest Central (Alumni)</collection><collection>ProQuest Central</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>AUTh Library subscriptions: ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central</collection><collection>ProQuest Central Student</collection><collection>Research Library Prep</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer science database</collection><collection>ProQuest research library</collection><collection>Research Library (Corporate)</collection><collection>ProQuest advanced technologies & aerospace journals</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>Publicly Available Content Database (Proquest) (PQ_SDU_P3)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>ProQuest Central Basic</collection><jtitle>International journal of advanced computer science & applications</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Nicho, Mathew</au><au>Yadav, Rajesh</au><au>Singh, Digvijay</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Analyzing WhisperGate and BlackCat Malware: Methodology and Threat Perspective</atitle><jtitle>International journal of advanced computer science & applications</jtitle><date>2023</date><risdate>2023</risdate><volume>14</volume><issue>4</issue><issn>2158-107X</issn><eissn>2156-5570</eissn><abstract>The increasing use of powerful evasive ransomware malware in cyber warfare and targeted attacks is a persistent and growing challenge for nations, corporations, and small and medium-sized enterprises. This threat is evidenced by the emergence of the WhisperGate malware in cyber warfare, which targets organizations in Ukraine to render targeted devices inoperable, and the BlackCat malware, which targets large organizations by encrypting files. This paper outlines a practical approach to malware analysis using WhisperGate and BlackCat malware as samples. It subjects them to heuristic-based analysis techniques, including a combination of static, dynamic, hybrid, and memory analysis. Specifically, 12 tools and techniques were selected and deployed to reveal the malware’s innovative stealth and evasion capabilities. This methodology shows what techniques can be applied to analyze critical malware and differentiate samples that are variations of known threats. The paper presents currently available tools and their underlying approaches to performing automated dynamic analysis on potentially malicious software. The study thus demonstrates a practical approach to carrying out malware analysis to understand cybercriminals’ behavior, techniques, and tactics.</abstract><cop>West Yorkshire</cop><pub>Science and Information (SAI) Organization Limited</pub><doi>10.14569/IJACSA.2023.0140456</doi><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2158-107X |
ispartof | International journal of advanced computer science & applications, 2023, Vol.14 (4) |
issn | 2158-107X 2156-5570 |
language | eng |
recordid | cdi_proquest_journals_2819915997 |
source | Publicly Available Content Database (Proquest) (PQ_SDU_P3); EZB Electronic Journals Library |
subjects | Cybersecurity Electronic warfare Malware Organizations Ransomware |
title | Analyzing WhisperGate and BlackCat Malware: Methodology and Threat Perspective |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-27T19%3A38%3A11IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Analyzing%20WhisperGate%20and%20BlackCat%20Malware:%20Methodology%20and%20Threat%20Perspective&rft.jtitle=International%20journal%20of%20advanced%20computer%20science%20&%20applications&rft.au=Nicho,%20Mathew&rft.date=2023&rft.volume=14&rft.issue=4&rft.issn=2158-107X&rft.eissn=2156-5570&rft_id=info:doi/10.14569/IJACSA.2023.0140456&rft_dat=%3Cproquest_cross%3E2819915997%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c274t-edaf419117541bc7e9890ebe6e47f9dd030cb7864da42e48792387f4c21527573%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2819915997&rft_id=info:pmid/&rfr_iscdi=true |