securityboulevard.com Open in urlscan Pro
2606:4700:10::6816:39c  Public Scan

URL: https://securityboulevard.com/2022/05/analysis-of-blackbyte-ransomwares-go-based-variants/
Submission: On September 10 via api from IN — Scanned from DE

Form analysis 3 forms found in the DOM

GET https://securityboulevard.com/

<form action="https://securityboulevard.com/" class="search-form searchform clearfix" method="get">
  <div class="search-wrap">
    <input type="text" placeholder="Search" class="s field" name="s">
    <button class="search-icon" type="submit"></button>
  </div>
</form>

POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/1628905/4b9a2bbd-665c-447b-81df-233280dc689e

<form id="hsForm_4b9a2bbd-665c-447b-81df-233280dc689e" method="POST" accept-charset="UTF-8" enctype="multipart/form-data" novalidate=""
  action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/1628905/4b9a2bbd-665c-447b-81df-233280dc689e"
  class="hs-form-private hsForm_4b9a2bbd-665c-447b-81df-233280dc689e hs-form-4b9a2bbd-665c-447b-81df-233280dc689e hs-form-4b9a2bbd-665c-447b-81df-233280dc689e_719f865c-8100-4b2a-9d27-bacddb174183 hs-form stacked"
  target="target_iframe_4b9a2bbd-665c-447b-81df-233280dc689e" data-instance-id="719f865c-8100-4b2a-9d27-bacddb174183" data-form-id="4b9a2bbd-665c-447b-81df-233280dc689e" data-portal-id="1628905"
  data-test-id="hsForm_4b9a2bbd-665c-447b-81df-233280dc689e">
  <div>
    <div class="hs-richtext hs-main-font-element">
      <p style="color: #fff;">Get breaking news, free eBooks and upcoming events delivered to your inbox.</p>
    </div>
  </div>
  <div class="hs_email hs-email hs-fieldtype-text field hs-form-field"><label id="label-email-4b9a2bbd-665c-447b-81df-233280dc689e" class="" placeholder="Enter your " for="email-4b9a2bbd-665c-447b-81df-233280dc689e"><span></span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input id="email-4b9a2bbd-665c-447b-81df-233280dc689e" name="email" required="" placeholder="Enter your email address*" type="email" class="hs-input" inputmode="email" autocomplete="email" value=""></div>
  </div>
  <div>
    <div class="hs-richtext hs-main-font-element">
      <div style="text-align: center;"><a href="https://securityboulevard.com/privacy-policy/" style="color: #fff; font-size: 12px;">View Security Boulevard <u>Privacy Policy</u></a></div>
    </div>
  </div>
  <div>
    <div class="hs-richtext hs-main-font-element">
      <hr style="border: 1px solid #ccc; width: 100%; margin: 20px auto;">
    </div>
  </div>
  <div class="hs_submit hs-submit">
    <div class="hs-field-desc" style="display: none;"></div>
    <div class="actions"><input type="submit" class="hs-button primary large" value="Subscribe Now"></div>
  </div><input name="hs_context" type="hidden"
    value="{&quot;embedAtTimestamp&quot;:&quot;1725958690812&quot;,&quot;formDefinitionUpdatedAt&quot;:&quot;1724698005169&quot;,&quot;clonedFromForm&quot;:&quot;d967bc1f-2d57-4dcf-861d-5930d7bea674&quot;,&quot;renderRawHtml&quot;:&quot;true&quot;,&quot;isLegacyThemeAllowed&quot;:&quot;true&quot;,&quot;userAgent&quot;:&quot;Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/128.0.0.0 Safari/537.36&quot;,&quot;pageTitle&quot;:&quot;Analysis of BlackByte Ransomware's Go-Based Variants - Security Boulevard&quot;,&quot;pageUrl&quot;:&quot;https://securityboulevard.com/2022/05/analysis-of-blackbyte-ransomwares-go-based-variants/&quot;,&quot;isHubSpotCmsGeneratedPage&quot;:false,&quot;formTarget&quot;:&quot;#hbspt-form-719f865c-8100-4b2a-9d27-bacddb174183&quot;,&quot;rumScriptExecuteTime&quot;:2043,&quot;rumTotalRequestTime&quot;:2355.800000190735,&quot;rumTotalRenderTime&quot;:2501.800000190735,&quot;rumServiceResponseTime&quot;:312.80000019073486,&quot;rumFormRenderTime&quot;:146,&quot;connectionType&quot;:&quot;4g&quot;,&quot;firstContentfulPaint&quot;:0,&quot;largestContentfulPaint&quot;:0,&quot;locale&quot;:&quot;en&quot;,&quot;timestamp&quot;:1725958691177,&quot;originalEmbedContext&quot;:{&quot;portalId&quot;:&quot;1628905&quot;,&quot;formId&quot;:&quot;4b9a2bbd-665c-447b-81df-233280dc689e&quot;,&quot;region&quot;:&quot;na1&quot;,&quot;target&quot;:&quot;#hbspt-form-719f865c-8100-4b2a-9d27-bacddb174183&quot;,&quot;isBuilder&quot;:false,&quot;isTestPage&quot;:false,&quot;isPreview&quot;:false,&quot;isMobileResponsive&quot;:true},&quot;correlationId&quot;:&quot;719f865c-8100-4b2a-9d27-bacddb174183&quot;,&quot;renderedFieldsIds&quot;:[&quot;email&quot;],&quot;captchaStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;emailResubscribeStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;isInsideCrossOriginFrame&quot;:false,&quot;source&quot;:&quot;forms-embed-1.5999&quot;,&quot;sourceName&quot;:&quot;forms-embed&quot;,&quot;sourceVersion&quot;:&quot;1.5999&quot;,&quot;sourceVersionMajor&quot;:&quot;1&quot;,&quot;sourceVersionMinor&quot;:&quot;5999&quot;,&quot;allPageIds&quot;:{},&quot;_debug_embedLogLines&quot;:[{&quot;clientTimestamp&quot;:1725958691028,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved pageContext values which may be overriden by the embed context: {\&quot;pageTitle\&quot;:\&quot;Analysis of BlackByte Ransomware's Go-Based Variants - Security Boulevard\&quot;,\&quot;pageUrl\&quot;:\&quot;https://securityboulevard.com/2022/05/analysis-of-blackbyte-ransomwares-go-based-variants/\&quot;,\&quot;userAgent\&quot;:\&quot;Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/128.0.0.0 Safari/537.36\&quot;,\&quot;isHubSpotCmsGeneratedPage\&quot;:false}&quot;},{&quot;clientTimestamp&quot;:1725958691029,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved countryCode property from normalized embed definition response: \&quot;DE\&quot;&quot;}]}"><iframe
    name="target_iframe_4b9a2bbd-665c-447b-81df-233280dc689e" style="display: none;"></iframe>
</form>

POST /2022/05/analysis-of-blackbyte-ransomwares-go-based-variants/#gf_43

<form method="post" enctype="multipart/form-data" target="gform_ajax_frame_43" id="gform_43" class="gpoll_enabled gpoll_show_results_link gpoll" action="/2022/05/analysis-of-blackbyte-ransomwares-go-based-variants/#gf_43" data-formid="43"
  novalidate="">
  <div id="gf_progressbar_wrapper_43" class="gf_progressbar_wrapper" data-start-at-zero="">
    <p class="gf_progressbar_title">Step <span class="gf_step_current_page">1</span> of <span class="gf_step_page_count">2</span>
    </p>
    <div class="gf_progressbar gf_progressbar_blue" aria-hidden="true">
      <div class="gf_progressbar_percentage percentbar_blue percentbar_50" style="width: 50%;"><span>50%</span></div>
    </div>
  </div>
  <div class="gform-body gform_body">
    <div id="gform_page_43_1" class="gform_page " data-js="page-field-id-1">
      <div class="gform_page_fields">
        <div id="gform_fields_43" class="gform_fields top_label form_sublabel_below description_below validation_below">
          <fieldset id="field_43_16"
            class="gfield gfield--type-poll gfield--type-choice gfield--input-type-radio gfield--width-full gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible gpoll_field"
            data-field-class="gpoll_field" data-js-reload="field_43_16">
            <legend class="gfield_label gform-field-label">Does someone in your organization write software?<span class="gfield_required"><span class="gfield_required gfield_required_text">(Required)</span></span></legend>
            <div class="ginput_container ginput_container_radio">
              <div class="gfield_radio" id="input_43_16">
                <div class="gchoice gchoice_43_16_0">
                  <input class="gfield-choice-input" name="input_16" type="radio" value="gpoll16caacbe4a" id="choice_43_16_0" onchange="if (!window.__cfRLUnblockHandlers) return false; gformToggleRadioOther( this )">
                  <label for="choice_43_16_0" id="label_43_16_0" class="gform-field-label gform-field-label--type-inline">Yes</label>
                </div>
                <div class="gchoice gchoice_43_16_1">
                  <input class="gfield-choice-input" name="input_16" type="radio" value="gpoll1664b4d9cc" id="choice_43_16_1" onchange="if (!window.__cfRLUnblockHandlers) return false; gformToggleRadioOther( this )">
                  <label for="choice_43_16_1" id="label_43_16_1" class="gform-field-label gform-field-label--type-inline">No</label>
                </div>
              </div>
            </div>
          </fieldset>
        </div>
      </div>
      <div class="gform_page_footer top_label">
        <input type="button" id="gform_next_button_43_18" class="gform_next_button gform-theme-button button" value="Next"
          onclick="if (!window.__cfRLUnblockHandlers) return false; jQuery(&quot;#gform_target_page_number_43&quot;).val(&quot;2&quot;);  jQuery(&quot;#gform_43&quot;).trigger(&quot;submit&quot;,[true]); "
          onkeypress="if (!window.__cfRLUnblockHandlers) return false; if( event.keyCode == 13 ){ jQuery(&quot;#gform_target_page_number_43&quot;).val(&quot;2&quot;);  jQuery(&quot;#gform_43&quot;).trigger(&quot;submit&quot;,[true]); } ">
      </div>
    </div>
    <div id="gform_page_43_2" class="gform_page" data-js="page-field-id-18" style="display:none;">
      <div class="gform_page_fields">
        <div id="gform_fields_43_2" class="gform_fields top_label form_sublabel_below description_below validation_below">
          <fieldset id="field_43_4"
            class="gfield gfield--type-poll gfield--type-choice gfield--input-type-radio gfield--width-full gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible gpoll_field"
            data-field-class="gpoll_field" data-js-reload="field_43_4">
            <legend class="gfield_label gform-field-label">What portion of your cyber risk is Application Security (AppSec)? (Select one)<span class="gfield_required"><span class="gfield_required gfield_required_text">(Required)</span></span>
            </legend>
            <div class="ginput_container ginput_container_radio">
              <div class="gfield_radio" id="input_43_4">
                <div class="gchoice gchoice_43_4_0">
                  <input class="gfield-choice-input" name="input_4" type="radio" value="gpoll4faf11bbd" id="choice_43_4_0" onchange="if (!window.__cfRLUnblockHandlers) return false; gformToggleRadioOther( this )">
                  <label for="choice_43_4_0" id="label_43_4_0" class="gform-field-label gform-field-label--type-inline">We over-focus on AppSec</label>
                </div>
                <div class="gchoice gchoice_43_4_1">
                  <input class="gfield-choice-input" name="input_4" type="radio" value="gpoll448578a72" id="choice_43_4_1" onchange="if (!window.__cfRLUnblockHandlers) return false; gformToggleRadioOther( this )">
                  <label for="choice_43_4_1" id="label_43_4_1" class="gform-field-label gform-field-label--type-inline">We focus on AppSec to match the risk</label>
                </div>
                <div class="gchoice gchoice_43_4_2">
                  <input class="gfield-choice-input" name="input_4" type="radio" value="gpoll4192ab952" id="choice_43_4_2" onchange="if (!window.__cfRLUnblockHandlers) return false; gformToggleRadioOther( this )">
                  <label for="choice_43_4_2" id="label_43_4_2" class="gform-field-label gform-field-label--type-inline">We under-focus on AppSec</label>
                </div>
              </div>
            </div>
          </fieldset>
        </div>
      </div>
      <div class="gform_page_footer top_label">
        <input type="button" id="gform_previous_button_43_10" class="gform_previous_button gform-theme-button gform-theme-button--secondary button" value="Previous"
          onclick="if (!window.__cfRLUnblockHandlers) return false; jQuery(&quot;#gform_target_page_number_43&quot;).val(&quot;1&quot;);  jQuery(&quot;#gform_43&quot;).trigger(&quot;submit&quot;,[true]); "
          onkeypress="if (!window.__cfRLUnblockHandlers) return false; if( event.keyCode == 13 ){ jQuery(&quot;#gform_target_page_number_43&quot;).val(&quot;1&quot;);  jQuery(&quot;#gform_43&quot;).trigger(&quot;submit&quot;,[true]); } "> <input
          type="button" id="gform_next_button_43_10" class="gform_next_button gform-theme-button button" value="Next"
          onclick="if (!window.__cfRLUnblockHandlers) return false; jQuery(&quot;#gform_target_page_number_43&quot;).val(&quot;3&quot;);  jQuery(&quot;#gform_43&quot;).trigger(&quot;submit&quot;,[true]); "
          onkeypress="if (!window.__cfRLUnblockHandlers) return false; if( event.keyCode == 13 ){ jQuery(&quot;#gform_target_page_number_43&quot;).val(&quot;3&quot;);  jQuery(&quot;#gform_43&quot;).trigger(&quot;submit&quot;,[true]); } ">
      </div>
    </div>
    <div id="gform_page_43_3" class="gform_page" data-js="page-field-id-10" style="display:none;">
      <div class="gform_page_fields">
        <div id="gform_fields_43_3" class="gform_fields top_label form_sublabel_below description_below validation_below">
          <fieldset id="field_43_53"
            class="gfield gfield--type-poll gfield--type-choice gfield--input-type-radio gfield--width-full field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible gpoll_field"
            data-field-class="gpoll_field" data-js-reload="field_43_53">
            <legend class="gfield_label gform-field-label">What are the biggest challenges you face implementing a robust AppSec strategy? (Select all that apply)</legend>
            <div class="ginput_container ginput_container_radio">
              <div class="gfield_radio" id="input_43_53">
                <div class="gchoice gchoice_43_53_0">
                  <input class="gfield-choice-input" name="input_53" type="radio" value="gpoll5303854668" id="choice_43_53_0" onchange="if (!window.__cfRLUnblockHandlers) return false; gformToggleRadioOther( this )">
                  <label for="choice_43_53_0" id="label_43_53_0" class="gform-field-label gform-field-label--type-inline">Lack of budget</label>
                </div>
                <div class="gchoice gchoice_43_53_1">
                  <input class="gfield-choice-input" name="input_53" type="radio" value="gpoll53f06d934f" id="choice_43_53_1" onchange="if (!window.__cfRLUnblockHandlers) return false; gformToggleRadioOther( this )">
                  <label for="choice_43_53_1" id="label_43_53_1" class="gform-field-label gform-field-label--type-inline">Insufficient skilled personnel</label>
                </div>
                <div class="gchoice gchoice_43_53_2">
                  <input class="gfield-choice-input" name="input_53" type="radio" value="gpoll533fcf7fc5" id="choice_43_53_2" onchange="if (!window.__cfRLUnblockHandlers) return false; gformToggleRadioOther( this )">
                  <label for="choice_43_53_2" id="label_43_53_2" class="gform-field-label gform-field-label--type-inline">Complexity of integrating security into the development lifecycle</label>
                </div>
                <div class="gchoice gchoice_43_53_3">
                  <input class="gfield-choice-input" name="input_53" type="radio" value="gpoll534629eb17" id="choice_43_53_3" onchange="if (!window.__cfRLUnblockHandlers) return false; gformToggleRadioOther( this )">
                  <label for="choice_43_53_3" id="label_43_53_3" class="gform-field-label gform-field-label--type-inline">Resistance from development teams</label>
                </div>
                <div class="gchoice gchoice_43_53_4">
                  <input class="gfield-choice-input" name="input_53" type="radio" value="gpoll53759e5dc0" id="choice_43_53_4" onchange="if (!window.__cfRLUnblockHandlers) return false; gformToggleRadioOther( this )">
                  <label for="choice_43_53_4" id="label_43_53_4" class="gform-field-label gform-field-label--type-inline">Keeping up with evolving security threats</label>
                </div>
                <div class="gchoice gchoice_43_53_5">
                  <input class="gfield-choice-input" name="input_53" type="radio" value="gpoll539cf87f76" id="choice_43_53_5" onchange="if (!window.__cfRLUnblockHandlers) return false; gformToggleRadioOther( this )">
                  <label for="choice_43_53_5" id="label_43_53_5" class="gform-field-label gform-field-label--type-inline">Lack of executive buy-in</label>
                </div>
                <div class="gchoice gchoice_43_53_6">
                  <input class="gfield-choice-input" name="input_53" type="radio" value="gpoll5388843091" id="choice_43_53_6" onchange="if (!window.__cfRLUnblockHandlers) return false; gformToggleRadioOther( this )">
                  <label for="choice_43_53_6" id="label_43_53_6" class="gform-field-label gform-field-label--type-inline">Other (please specify)</label>
                </div>
                <div class="gchoice gchoice_43_53_7">
                  <input class="gfield-choice-input" name="input_53" type="radio" value="gf_other_choice" id="choice_43_53_7" onchange="if (!window.__cfRLUnblockHandlers) return false; gformToggleRadioOther( this )">
                  <label for="choice_43_53_7" id="label_43_53_7" class="gform-field-label gform-field-label--type-inline">Other</label><br><input id="input_43_53_other" class="gchoice_other_control" name="input_53_other" type="text" value="Other"
                    aria-label="Other Choice, please specify" disabled="disabled">
                </div>
              </div>
            </div>
          </fieldset>
        </div>
      </div>
      <div class="gform_page_footer top_label">
        <input type="button" id="gform_previous_button_43_44" class="gform_previous_button gform-theme-button gform-theme-button--secondary button" value="Previous"
          onclick="if (!window.__cfRLUnblockHandlers) return false; jQuery(&quot;#gform_target_page_number_43&quot;).val(&quot;2&quot;);  jQuery(&quot;#gform_43&quot;).trigger(&quot;submit&quot;,[true]); "
          onkeypress="if (!window.__cfRLUnblockHandlers) return false; if( event.keyCode == 13 ){ jQuery(&quot;#gform_target_page_number_43&quot;).val(&quot;2&quot;);  jQuery(&quot;#gform_43&quot;).trigger(&quot;submit&quot;,[true]); } "> <input
          type="button" id="gform_next_button_43_44" class="gform_next_button gform-theme-button button" value="Next"
          onclick="if (!window.__cfRLUnblockHandlers) return false; jQuery(&quot;#gform_target_page_number_43&quot;).val(&quot;4&quot;);  jQuery(&quot;#gform_43&quot;).trigger(&quot;submit&quot;,[true]); "
          onkeypress="if (!window.__cfRLUnblockHandlers) return false; if( event.keyCode == 13 ){ jQuery(&quot;#gform_target_page_number_43&quot;).val(&quot;4&quot;);  jQuery(&quot;#gform_43&quot;).trigger(&quot;submit&quot;,[true]); } ">
      </div>
    </div>
    <div id="gform_page_43_4" class="gform_page" data-js="page-field-id-44" style="display:none;">
      <div class="gform_page_fields">
        <div id="gform_fields_43_4" class="gform_fields top_label form_sublabel_below description_below validation_below">
          <fieldset id="field_43_50"
            class="gfield gfield--type-poll gfield--type-choice gfield--input-type-checkbox gfield--width-full gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible gpoll_field"
            data-field-class="gpoll_field" data-js-reload="field_43_50">
            <legend class="gfield_label gform-field-label gfield_label_before_complex">Which DevSecOps practices are widely used for actively developed projects (not legacy) (Select all that apply):<span class="gfield_required"><span
                  class="gfield_required gfield_required_text">(Required)</span></span></legend>
            <div class="ginput_container ginput_container_checkbox">
              <div class="gfield_checkbox" id="input_43_50">
                <div class="gchoice gchoice_43_50_1">
                  <input class="gfield-choice-input" name="input_50.1" type="checkbox" value="gpoll4faf11bbd" id="choice_43_50_1">
                  <label for="choice_43_50_1" id="label_43_50_1" class="gform-field-label gform-field-label--type-inline">Automated unit and functional tests for quality run in the pipeline with merge blocking</label>
                </div>
                <div class="gchoice gchoice_43_50_2">
                  <input class="gfield-choice-input" name="input_50.2" type="checkbox" value="gpoll448578a72" id="choice_43_50_2">
                  <label for="choice_43_50_2" id="label_43_50_2" class="gform-field-label gform-field-label--type-inline">Automated application security testing (AST) in development and (SAST/IAST) runs in the pipeline</label>
                </div>
                <div class="gchoice gchoice_43_50_3">
                  <input class="gfield-choice-input" name="input_50.3" type="checkbox" value="gpoll4192ab952" id="choice_43_50_3">
                  <label for="choice_43_50_3" id="label_43_50_3" class="gform-field-label gform-field-label--type-inline">Automated AST tools to find vulnerabilities in the code you import (SCA) run in the pipeline</label>
                </div>
                <div class="gchoice gchoice_43_50_4">
                  <input class="gfield-choice-input" name="input_50.4" type="checkbox" value="gpoll43dc8a903f" id="choice_43_50_4">
                  <label for="choice_43_50_4" id="label_43_50_4" class="gform-field-label gform-field-label--type-inline">Merge blocking at current policy level for AST checks</label>
                </div>
                <div class="gchoice gchoice_43_50_5">
                  <input class="gfield-choice-input" name="input_50.5" type="checkbox" value="gpoll43c635e38e" id="choice_43_50_5">
                  <label for="choice_43_50_5" id="label_43_50_5" class="gform-field-label gform-field-label--type-inline">Secrets management so no secrets stored in source code repositories</label>
                </div>
              </div>
            </div>
          </fieldset>
        </div>
      </div>
      <div class="gform_page_footer top_label">
        <input type="button" id="gform_previous_button_43_48" class="gform_previous_button gform-theme-button gform-theme-button--secondary button" value="Previous"
          onclick="if (!window.__cfRLUnblockHandlers) return false; jQuery(&quot;#gform_target_page_number_43&quot;).val(&quot;3&quot;);  jQuery(&quot;#gform_43&quot;).trigger(&quot;submit&quot;,[true]); "
          onkeypress="if (!window.__cfRLUnblockHandlers) return false; if( event.keyCode == 13 ){ jQuery(&quot;#gform_target_page_number_43&quot;).val(&quot;3&quot;);  jQuery(&quot;#gform_43&quot;).trigger(&quot;submit&quot;,[true]); } "> <input
          type="button" id="gform_next_button_43_48" class="gform_next_button gform-theme-button button" value="Next"
          onclick="if (!window.__cfRLUnblockHandlers) return false; jQuery(&quot;#gform_target_page_number_43&quot;).val(&quot;5&quot;);  jQuery(&quot;#gform_43&quot;).trigger(&quot;submit&quot;,[true]); "
          onkeypress="if (!window.__cfRLUnblockHandlers) return false; if( event.keyCode == 13 ){ jQuery(&quot;#gform_target_page_number_43&quot;).val(&quot;5&quot;);  jQuery(&quot;#gform_43&quot;).trigger(&quot;submit&quot;,[true]); } ">
      </div>
    </div>
    <div id="gform_page_43_5" class="gform_page" data-js="page-field-id-48" style="display:none;">
      <div class="gform_page_fields">
        <div id="gform_fields_43_5" class="gform_fields top_label form_sublabel_below description_below validation_below">
          <fieldset id="field_43_55"
            class="gfield gfield--type-poll gfield--type-choice gfield--input-type-checkbox gfield--width-full field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible gpoll_field"
            data-field-class="gpoll_field" data-js-reload="field_43_55">
            <legend class="gfield_label gform-field-label gfield_label_before_complex">How do you assess and mitigate risk of For NON actively developed products (legacy) (Select all that apply):</legend>
            <div class="ginput_container ginput_container_checkbox">
              <div class="gfield_checkbox" id="input_43_55">
                <div class="gchoice gchoice_43_55_1">
                  <input class="gfield-choice-input" name="input_55.1" type="checkbox" value="gpoll557eebe10c" id="choice_43_55_1">
                  <label for="choice_43_55_1" id="label_43_55_1" class="gform-field-label gform-field-label--type-inline">In-production scans using DAST products like Qualys, Nessus, etc.</label>
                </div>
                <div class="gchoice gchoice_43_55_2">
                  <input class="gfield-choice-input" name="input_55.2" type="checkbox" value="gpoll55d11adf89" id="choice_43_55_2">
                  <label for="choice_43_55_2" id="label_43_55_2" class="gform-field-label gform-field-label--type-inline">Periodic penetration testing</label>
                </div>
                <div class="gchoice gchoice_43_55_3">
                  <input class="gfield-choice-input" name="input_55.3" type="checkbox" value="gpoll55a150209e" id="choice_43_55_3">
                  <label for="choice_43_55_3" id="label_43_55_3" class="gform-field-label gform-field-label--type-inline">Periodic running of AST tools</label>
                </div>
                <div class="gchoice gchoice_43_55_4">
                  <input class="gfield-choice-input" name="input_55.4" type="checkbox" value="gpoll554d09387c" id="choice_43_55_4">
                  <label for="choice_43_55_4" id="label_43_55_4" class="gform-field-label gform-field-label--type-inline">Manual code reviews by security specialists</label>
                </div>
                <div class="gchoice gchoice_43_55_5">
                  <input class="gfield-choice-input" name="input_55.5" type="checkbox" value="gpoll55a7a8bf83" id="choice_43_55_5">
                  <label for="choice_43_55_5" id="label_43_55_5" class="gform-field-label gform-field-label--type-inline">Use of third-party security assessment services</label>
                </div>
                <div class="gchoice gchoice_43_55_6">
                  <input class="gfield-choice-input" name="input_55.6" type="checkbox" value="gpoll55fc2bcf7e" id="choice_43_55_6">
                  <label for="choice_43_55_6" id="label_43_55_6" class="gform-field-label gform-field-label--type-inline">No assessment or mitigation effort is happening</label>
                </div>
              </div>
            </div>
          </fieldset>
        </div>
      </div>
      <div class="gform_page_footer top_label">
        <input type="button" id="gform_previous_button_43_54" class="gform_previous_button gform-theme-button gform-theme-button--secondary button" value="Previous"
          onclick="if (!window.__cfRLUnblockHandlers) return false; jQuery(&quot;#gform_target_page_number_43&quot;).val(&quot;4&quot;);  jQuery(&quot;#gform_43&quot;).trigger(&quot;submit&quot;,[true]); "
          onkeypress="if (!window.__cfRLUnblockHandlers) return false; if( event.keyCode == 13 ){ jQuery(&quot;#gform_target_page_number_43&quot;).val(&quot;4&quot;);  jQuery(&quot;#gform_43&quot;).trigger(&quot;submit&quot;,[true]); } "> <input
          type="button" id="gform_next_button_43_54" class="gform_next_button gform-theme-button button" value="Next"
          onclick="if (!window.__cfRLUnblockHandlers) return false; jQuery(&quot;#gform_target_page_number_43&quot;).val(&quot;6&quot;);  jQuery(&quot;#gform_43&quot;).trigger(&quot;submit&quot;,[true]); "
          onkeypress="if (!window.__cfRLUnblockHandlers) return false; if( event.keyCode == 13 ){ jQuery(&quot;#gform_target_page_number_43&quot;).val(&quot;6&quot;);  jQuery(&quot;#gform_43&quot;).trigger(&quot;submit&quot;,[true]); } ">
      </div>
    </div>
    <div id="gform_page_43_6" class="gform_page" data-js="page-field-id-54" style="display:none;">
      <div class="gform_page_fields">
        <div id="gform_fields_43_6" class="gform_fields top_label form_sublabel_below description_below validation_below">
          <fieldset id="field_43_6"
            class="gfield gfield--type-poll gfield--type-choice gfield--input-type-checkbox gfield--width-full gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible gpoll_field"
            data-field-class="gpoll_field" data-js-reload="field_43_6">
            <legend class="gfield_label gform-field-label gfield_label_before_complex">How do you resolve the security issues found? (Select all that apply):<span class="gfield_required"><span
                  class="gfield_required gfield_required_text">(Required)</span></span></legend>
            <div class="ginput_container ginput_container_checkbox">
              <div class="gfield_checkbox" id="input_43_6">
                <div class="gchoice gchoice_43_6_1">
                  <input class="gfield-choice-input" name="input_6.1" type="checkbox" value="gpoll6a77f44ff" id="choice_43_6_1">
                  <label for="choice_43_6_1" id="label_43_6_1" class="gform-field-label gform-field-label--type-inline">Findings are manually triaged</label>
                </div>
                <div class="gchoice gchoice_43_6_2">
                  <input class="gfield-choice-input" name="input_6.2" type="checkbox" value="gpoll6c5446642" id="choice_43_6_2">
                  <label for="choice_43_6_2" id="label_43_6_2" class="gform-field-label gform-field-label--type-inline">Findings are communicated to engineering via mostly manual processes</label>
                </div>
                <div class="gchoice gchoice_43_6_3">
                  <input class="gfield-choice-input" name="input_6.3" type="checkbox" value="gpoll637103aa7" id="choice_43_6_3">
                  <label for="choice_43_6_3" id="label_43_6_3" class="gform-field-label gform-field-label--type-inline">Finding above a certain severity automatically populate engineering backlogs</label>
                </div>
                <div class="gchoice gchoice_43_6_4">
                  <input class="gfield-choice-input" name="input_6.4" type="checkbox" value="gpoll606fb4fba" id="choice_43_6_4">
                  <label for="choice_43_6_4" id="label_43_6_4" class="gform-field-label gform-field-label--type-inline">Service level agreements (SLAs) are enforced based on severity</label>
                </div>
                <div class="gchoice gchoice_43_6_5">
                  <input class="gfield-choice-input" name="input_6.5" type="checkbox" value="gpoll61ac6faab" id="choice_43_6_5">
                  <label for="choice_43_6_5" id="label_43_6_5" class="gform-field-label gform-field-label--type-inline">An exception process exists to allow the business to accept risk</label>
                </div>
                <div class="gchoice gchoice_43_6_6">
                  <input class="gfield-choice-input" name="input_6.6" type="checkbox" value="gpoll644274ebf" id="choice_43_6_6">
                  <label for="choice_43_6_6" id="label_43_6_6" class="gform-field-label gform-field-label--type-inline">The exception process is rarely used and must be renewed periodically</label>
                </div>
              </div>
            </div>
          </fieldset>
        </div>
      </div>
      <div class="gform_page_footer top_label">
        <input type="button" id="gform_previous_button_43_35" class="gform_previous_button gform-theme-button gform-theme-button--secondary button" value="Previous"
          onclick="if (!window.__cfRLUnblockHandlers) return false; jQuery(&quot;#gform_target_page_number_43&quot;).val(&quot;5&quot;);  jQuery(&quot;#gform_43&quot;).trigger(&quot;submit&quot;,[true]); "
          onkeypress="if (!window.__cfRLUnblockHandlers) return false; if( event.keyCode == 13 ){ jQuery(&quot;#gform_target_page_number_43&quot;).val(&quot;5&quot;);  jQuery(&quot;#gform_43&quot;).trigger(&quot;submit&quot;,[true]); } "> <input
          type="button" id="gform_next_button_43_35" class="gform_next_button gform-theme-button button" value="Next"
          onclick="if (!window.__cfRLUnblockHandlers) return false; jQuery(&quot;#gform_target_page_number_43&quot;).val(&quot;7&quot;);  jQuery(&quot;#gform_43&quot;).trigger(&quot;submit&quot;,[true]); "
          onkeypress="if (!window.__cfRLUnblockHandlers) return false; if( event.keyCode == 13 ){ jQuery(&quot;#gform_target_page_number_43&quot;).val(&quot;7&quot;);  jQuery(&quot;#gform_43&quot;).trigger(&quot;submit&quot;,[true]); } ">
      </div>
    </div>
    <div id="gform_page_43_7" class="gform_page" data-js="page-field-id-35" style="display:none;">
      <div class="gform_page_fields">
        <div id="gform_fields_43_7" class="gform_fields top_label form_sublabel_below description_below validation_below">
          <fieldset id="field_43_51"
            class="gfield gfield--type-poll gfield--type-choice gfield--input-type-checkbox gfield--width-full gfield_contains_required field_sublabel_below gfield--no-description field_description_below field_validation_below gfield_visibility_visible gpoll_field"
            data-field-class="gpoll_field" data-js-reload="field_43_51">
            <legend class="gfield_label gform-field-label gfield_label_before_complex">Which best describes security training for your developers? (Select all that apply)<span class="gfield_required"><span
                  class="gfield_required gfield_required_text">(Required)</span></span></legend>
            <div class="ginput_container ginput_container_checkbox">
              <div class="gfield_checkbox" id="input_43_51">
                <div class="gchoice gchoice_43_51_1">
                  <input class="gfield-choice-input" name="input_51.1" type="checkbox" value="gpoll6a77f44ff" id="choice_43_51_1">
                  <label for="choice_43_51_1" id="label_43_51_1" class="gform-field-label gform-field-label--type-inline">Monthly</label>
                </div>
                <div class="gchoice gchoice_43_51_2">
                  <input class="gfield-choice-input" name="input_51.2" type="checkbox" value="gpoll6c5446642" id="choice_43_51_2">
                  <label for="choice_43_51_2" id="label_43_51_2" class="gform-field-label gform-field-label--type-inline">Quarterly</label>
                </div>
                <div class="gchoice gchoice_43_51_3">
                  <input class="gfield-choice-input" name="input_51.3" type="checkbox" value="gpoll637103aa7" id="choice_43_51_3">
                  <label for="choice_43_51_3" id="label_43_51_3" class="gform-field-label gform-field-label--type-inline">Annually</label>
                </div>
                <div class="gchoice gchoice_43_51_4">
                  <input class="gfield-choice-input" name="input_51.4" type="checkbox" value="gpoll606fb4fba" id="choice_43_51_4">
                  <label for="choice_43_51_4" id="label_43_51_4" class="gform-field-label gform-field-label--type-inline">As part of onboarding</label>
                </div>
                <div class="gchoice gchoice_43_51_5">
                  <input class="gfield-choice-input" name="input_51.5" type="checkbox" value="gpoll61ac6faab" id="choice_43_51_5">
                  <label for="choice_43_51_5" id="label_43_51_5" class="gform-field-label gform-field-label--type-inline">Just-in-time via integration with AST tools when a vulnerability is found</label>
                </div>
                <div class="gchoice gchoice_43_51_6">
                  <input class="gfield-choice-input" name="input_51.6" type="checkbox" value="gpoll5196126385" id="choice_43_51_6">
                  <label for="choice_43_51_6" id="label_43_51_6" class="gform-field-label gform-field-label--type-inline">No formal training provided</label>
                </div>
              </div>
            </div>
          </fieldset>
        </div>
      </div>
      <div class="gform_page_footer top_label"><input type="submit" id="gform_previous_button_43" class="gform_previous_button gform-theme-button gform-theme-button--secondary button" value="Previous"
          onclick="if (!window.__cfRLUnblockHandlers) return false; if(window[&quot;gf_submitting_43&quot;]){return false;}  if( !jQuery(&quot;#gform_43&quot;)[0].checkValidity || jQuery(&quot;#gform_43&quot;)[0].checkValidity()){window[&quot;gf_submitting_43&quot;]=true;}  "
          onkeypress="if (!window.__cfRLUnblockHandlers) return false; if( event.keyCode == 13 ){ if(window[&quot;gf_submitting_43&quot;]){return false;} if( !jQuery(&quot;#gform_43&quot;)[0].checkValidity || jQuery(&quot;#gform_43&quot;)[0].checkValidity()){window[&quot;gf_submitting_43&quot;]=true;}  jQuery(&quot;#gform_43&quot;).trigger(&quot;submit&quot;,[true]); }">
        <input type="submit" id="gform_submit_button_43" class="gform_button button" value="Submit"
          onclick="if (!window.__cfRLUnblockHandlers) return false; if(window[&quot;gf_submitting_43&quot;]){return false;}  if( !jQuery(&quot;#gform_43&quot;)[0].checkValidity || jQuery(&quot;#gform_43&quot;)[0].checkValidity()){window[&quot;gf_submitting_43&quot;]=true;}  "
          onkeypress="if (!window.__cfRLUnblockHandlers) return false; if( event.keyCode == 13 ){ if(window[&quot;gf_submitting_43&quot;]){return false;} if( !jQuery(&quot;#gform_43&quot;)[0].checkValidity || jQuery(&quot;#gform_43&quot;)[0].checkValidity()){window[&quot;gf_submitting_43&quot;]=true;}  jQuery(&quot;#gform_43&quot;).trigger(&quot;submit&quot;,[true]); }"
          data-conditional-logic="visible"> <input type="hidden" name="gform_ajax" value="form_id=43&amp;title=&amp;description=1&amp;tabindex=0&amp;theme=gravity-theme">
        <input type="hidden" class="gform_hidden" name="is_submit_43" value="1">
        <input type="hidden" class="gform_hidden" name="gform_submit" value="43">
        <input type="hidden" class="gform_hidden" name="gform_unique_id" value="">
        <input type="hidden" class="gform_hidden" name="state_43"
          value="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">
        <input type="hidden" class="gform_hidden" name="gform_target_page_number_43" id="gform_target_page_number_43" value="2">
        <input type="hidden" class="gform_hidden" name="gform_source_page_number_43" id="gform_source_page_number_43" value="1">
        <input type="hidden" name="gform_field_values" value="">
        <a href="javascript:void(0)" class="gpoll_button gform-theme-button gform-theme-button--secondary button" target="_blank">View results</a>
        <div class="gpoll_summary"></div>
      </div>
    </div>
  </div>
  <p style="display: none !important;" class="akismet-fields-container" data-prefix="ak_"><label>Δ<textarea name="ak_hp_textarea" cols="45" rows="8" maxlength="100"></textarea></label><input type="hidden" id="ak_js_1" name="ak_js"
      value="1725958690731">
    <script type="text/javascript">
      document.getElementById("ak_js_1").setAttribute("value", (new Date()).getTime());
    </script>
  </p>
</form>

Text Content

Tuesday, September 10, 2024
 * 
 * 
 * 
 * 
 * 
 * 
 * 


SECURITY BOULEVARD

The Home of the Security Bloggers Network


Community Chats Webinars Library


 * Home
   * Cybersecurity News
   * Features
   * Industry Spotlight
   * News Releases
 * Security Creators Network
   * Latest Posts
   * Syndicate Your Blog
   * Write for Security Boulevard
 * Webinars
   * Upcoming Webinars
   * Calendar View
   * On-Demand Webinars
 * Events
   * Upcoming Events
   * On-Demand Events
 * Sponsored Content
 * Chat
   * Security Boulevard Chat
   * Marketing InSecurity Podcast
   * Techstrong.tv Podcast
   * TechstrongTV - Twitch
 * Library
 * Related Sites
   * Techstrong Group
   * Cloud Native Now
   * DevOps.com
   * Security Boulevard
   * Techstrong Research
   * Techstrong TV
   * Techstrong.tv Podcast
   * Techstrong.tv - Twitch
   * Devops Chat
   * DevOps Dozen
   * DevOps TV
 * Media Kit
 * About
 * Sponsor



 * Analytics
 * AppSec
 * CISO
 * Cloud
 * DevOps
 * GRC
 * Identity
 * Incident Response
 * IoT / ICS
 * Threats / Breaches
 * More
   * Blockchain / Digital Currencies
   * Careers
   * Cyberlaw
   * Mobile
   * Social Engineering
 * Humor


Hot Topics
 * Seventh Sense Unveils Revolutionary Privacy-Preserving Face-Based Public Key
   Infrastructure and eID Solution
 * Legal Impact of GDPR Data Policy Violations
 * Eclypsium Product Roadmap
 * Why Investing in Quality Analysts is Investing in Your Future
 * Mitigating Unforeseen SaaS Risks in M&A Integrations | Grip

 * Seventh Sense Unveils Revolutionary Privacy-Preserving Face-Based Public Key
   Infrastructure and eID Solution
 * Legal Impact of GDPR Data Policy Violations
 * Eclypsium Product Roadmap
 * Why Investing in Quality Analysts is Investing in Your Future
 * Mitigating Unforeseen SaaS Risks in M&A Integrations | Grip

TwitterLinkedInFacebookRedditEmailTeilen
Security Bloggers Network 

Home » Security Bloggers Network » Analysis of BlackByte Ransomware’s Go-Based
Variants


ANALYSIS OF BLACKBYTE RANSOMWARE’S GO-BASED VARIANTS

by Javier Vicente on May 3, 2022

Key Points

BlackByte is a full-featured ransomware family that first emerged around July
2021
The ransomware was originally written in C# and later redeveloped in the Go
programming language around September 2021
The threat group exfiltrates data prior to deploying ransomware and leaks the
stolen information if a ransom is not paid
The group has demanded multi-million dollar ransoms from some victims
BlackByte ransomware employs various anti-analysis techniques including a
multitude of dynamic string obfuscation algorithms
In early versions of the ransomware, file encryption utilized a hardcoded
1,024-bit RSA public key along with a 128-bit AES key that was derived from a
file retrieved from a command and control server
More recent BlackByte versions use Curve25519 Elliptic Curve Cryptography (ECC)
for asymmetric encryption and ChaCha20 for symmetric file encryption

Introduction



BlackByte is a Ransomware-as-a-Service (RaaS) group that has been targeting
corporations worldwide since July 2021. Previous versions of the ransomware were
written in C#. More recently, the authors redeveloped the ransomware using the
Go programming language. The BlackByte Go variant was used in attacks described
in an FBI advisory that warned BlackByte had compromised numerous businesses,
including entities in US critical infrastructure sectors. In this post, Zscaler
ThreatLabz analyzes two variants of the Go-based implementation of BlackByte
ransomware.

Technical Analysis



Variants

ThreatLabz has identified two variants of the Go-based variant of BlackByte. The
first variant was seen in-the-wild around September 2021 and shares many
similarities with the C# version including the commands executed to perform
lateral propagation, privilege escalation, and file encryption algorithms. A
more recent Go-based variant was introduced around February 2022. This new
variant introduced many additional features and updated the file encryption
algorithms. In this blog, for brevity, the Go-based BlackByte variant 1 will be
referred to as BlackByte v1 and the second variant will be referred to as
BlackByte v2.

Initialization

Before BlackByte performs file encryption, the ransomware first performs
initialization. Most of these initialization functions are very similar or
identical to the C# variant of BlackByte.

Mutex Creation

BlackByte creates a mutex using a value that is hardcoded in the malware, for
example: Global\7b55551e-a59c-4252-a34a-5c80372b3014. If the mutex exists,
BlackByte will terminate. This ensures that there is only one active instance of
BlackByte running at a time.

Identify System Language

BlackByte ransomware resolves the victim's system language by comparing the
language ID values with those shown in Table 1. If the system language matches
any from this list, BlackByte will exit without performing file encryption.

Language ID

Language

1049

Russian

1058

Ukrainian

1059

Belarusian

1064

Tajik

1067

Armenian

1068

Azerbaijani Latin

1079

Georgian

1087

Kazakh

1090

Turkmen

1091

Uzbek Latin

2092

Azerbaijani Cyrillic

2115

Uzbek Cyrillic

Table 1. System languages avoided by BlackByte ransomware

These languages are specifically avoided by BlackByte to prevent encrypting
files on systems that are located in Commonwealth of Independent States (CIS)
countries. This likely indicates that the threat actors behind BlackByte are
located in Eastern Europe and/or Russia. This is designed to reduce the threat
that local law enforcement in those regions will pursue criminal prosecution
against those responsible for BlackByte.

Enable Long Paths

The malware executes the following command to avoid issues that may occur when
encrypting files with long path names:

C:\WINDOWS\system32\cmd.exe /c reg add
HKLM\SYSTEM\CurrentControlSet\Control\FileSystem /v LongPathsEnabled /t
REG_DWORD /d 1 /f

Disable Controlled Folder Access

BlackByte executes the following command to disable controlled folder access:

Set-MpPreference -EnableControlledFolderAccess Disabled

The Windows controlled folder access feature is designed to protect data from
malicious applications such as ransomware. When enabled, files located in the
specified protected folders can not be modified by unauthorized applications.

Delete Shadow Copies

Similar to other ransomware families, BlackByte deletes shadow copies to prevent
a victim from easily recovering files from backups. There are two methods that
BlackByte uses to delete shadow copies. The first executes the following
PowerShell command:

$x =
[System.Text.Encoding]::Unicode.GetString([System.Convert]::FromBase64String('RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAg'+
'AFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8AC'+'AARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkA'+
'F8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA=='));Invoke-Expression $x

The Base64 encoding string when decoded is the following: Get-WmiObject
Win32_Shadowcopy | ForEach-Object {$_.Delete();}

BlackByte also executes the commands to delete shadow copies for each drive:

C:\WINDOWS\system32\cmd.exe /c vssadmin resize shadowstorage /for=&lt;unit&gt;:
/on=&lt;unit&gt;: /maxsize=401MB
C:\WINDOWS\system32\cmd.exe /c vssadmin resize shadowstorage /for=&lt;unit&gt;:
/on=&lt;unit&gt;: /maxsize=unbounded

Process Termination and Stop / Start Services

The following commands are executed by BlackByte to stop services that may
hinder file encryption:

C:\WINDOWS\system32\sc.exe config SQLTELEMETRY start= disabled
C:\WINDOWS\system32\sc.exe config SQLTELEMETRY$ECWDB2 start= disabled
C:\WINDOWS\system32\sc.exe config SQLWriter start= disabled
C:\WINDOWS\system32\sc.exe config SstpSvc start= disabled
C:\WINDOWS\system32\sc.exe config MBAMService start= disabled
C:\WINDOWS\system32\sc.exe config wuauserv start= disabled

BlackByte will also start the following services:

C:\WINDOWS\system32\sc.exe config Dnscache start= auto
C:\WINDOWS\system32\sc.exe config fdPHost start= auto
C:\WINDOWS\system32\sc.exe config FDResPub start= auto
C:\WINDOWS\system32\sc.exe config SSDPSRV start= auto
C:\WINDOWS\system32\sc.exe config upnphost start= auto
C:\WINDOWS\system32\sc.exe config RemoteRegistry start= auto

BlackByte ransomware terminates the following processes shown in Table 2 at the
beginning of the execution:

uranium
processhacker
procmon
pestudio
procmon64

x32dbg
x64dbg
cffexplorer
procexp64
procexp

pslist
tcpview
tcpvcon
dbgview
rammap

rammap64
vmmap
ollydbg
autoruns
autorunsc

regmon
idaq
idaq64
immunitydebugger
wireshark

dumpcap
hookexplorer
importrec
petools
lordpe

sysinspector
proc_analyzer
sysanalyzer
sniff_hit
windbg

joeboxcontrol
joeboxserver
joeboxserver
resourcehacker
fiddler

httpdebugger
dumpit
rammap
rammap64
vmmap

agntsvc
cntaosmgr
dbeng50
dbsnmp
encsvc

excel
firefox
firefoxconfig
infopath
isqlplussvc

mbamtray
msaccess
msftesql
mspub
mydesktopqos

mydesktopservice
mysqld
mysqld-nt
mysqld-opt
Ntrtscan

ocautoupds
ocomm
ocssd
onenote
oracle

outlook
PccNTMon
powerpnt
sqbcoreservice
sql

sqlagent
sqlbrowser
sqlservr
sqlwriter
steam

synctime
tbirdconfig
thebat
thebat64
thunderbird

tmlisten
visio
winword
wordpad
xfssvccon

zoolz
veeam
backup
sql
memtas

vss
sophos
svc$
mepocs
wuauserv

filemon

Table 2. Process names terminated by BlackByte ransomware

Many of these process names are related to business applications. BlackByte
kills these processes to avoid open file handle permission issues when
performing file encryption of the victim's files. In addition, the list contains
a large number of malware analyst tools that can be used to reverse engineer the
functionality of the ransomware.

BlackByte also terminates the following services that are associated with
antivirus products, backup software, and business applications including
financial software, email clients, and databases as shown below in Table 3.

klvssbridge64
vapiendpoint
ShMonitor
Smcinst
SmcService

SntpService
svcGenericHost
swi_
TmCCSF
tmlisten

TrueKey
TrueKeyScheduler
TrueKeyServiceHelper
WRSVC
McTaskManager

OracleClientCache80
mfefire
wbengine
mfemms
RESvc

mfevtp
sacsvr
SAVAdminService
SAVService

SepMasterService

PDVFSService
ESHASRV
SDRSVC
FA_Scheduler
KAVFS

KAVFSGT
kavfsslp
klnagent
macmnsvc
masvc

MBAMService
MBEndpointAgent
McShield
audioendpointbuilder
Antivirus

AVP
DCAgent
bedbg
EhttpSrv
MMS

ekrn
EPSecurityService
EPUpdateService
ntrtscan
EsgShKernel

msexchangeadtopology
AcrSch2Svc
MSOLAP$TPSAMA
Intel(R) PROSet Monitoring

msexchangeimap4

ARSM
unistoresvc_1af40a
ReportServer$TPS
MSOLAP$SYSTEM_BGC
W3Svc

MSExchangeSRS
ReportServer$TPSAMA
Zoolz 2 Service
MSOLAP$TPS

aphidmonitorservice

SstpSvc
MSExchangeMTA
ReportServer$SYSTEM_BGC
Symantec System Recovery
UI0Detect

MSExchangeSA
MSExchangeIS
ReportServer
MsDtsServer110
POP3Svc

MSExchangeMGMT
SMTPSvc
MsDtsServer
IisAdmin
MSExchangeES

EraserSvc11710
Enterprise Client Service
MsDtsServer100
NetMsmqActivator
stc_raw_agent

VSNAPVSS
PDVFSService
AcrSch2Svc
Acronis

CASAD2DWebSvc

CAARCUpdateSvc
McAfee
avpsus
DLPAgentService
mfewc

BMR Boot Service
DefWatch
ccEvtMgr
ccSetMgr
SavRoam

RTVscan
QBFCService
QBIDPService
Intuit.QuickBooks.FCS

QBCFMonitorService

YooIT
zhudongfangyu

Table 3. Service names terminated by BlackByte ransomware

Windows Firewall

BlackByte disables the Windows firewall via the command:

netsh advfirewall set allprofiles state off

Windows Defender

The ransomware executes the following command to delete task manager, resource
monitor, and stop the Windows Defender service:

cmd /c del C:\Windows\System32\Taskmgr.exe /f /q &amp; del
C:\Windows\System32\resmon.exe /f /q &amp;
powershell -command "$x =
[System.Text.Encoding]::Unicode.GetString([System.Convert]::FromBase64String
('V'+'wBp'+'A'+'G4AR'+'AB'+'lAG'+'YAZQBuAGQA'));Stop-Service -Name
$x;Set-Service -StartupType Disabled

The Base64 encoded string above decodes to WinDefend.

Raccine Anti-Ransomware

BlackByte terminates and uninstalls an anti-ransomware product known as Raccine.
The Raccine processes that are terminated are raccine.exe and
raccinesettings.exe. To uninstall Raccine, BlackByte deletes the following
registry keys and values:

HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Raccine Tray
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\EventLog\Application\Raccine
HKEY_CURRENT_USER\SOFTWARE\Raccine
HKEY_LOCAL_MACHINE\SOFTWARE\Raccine

BlackByte then deletes Raccine's scheduled task via the command:

C:\WINDOWS\system32\schtasks.exe /DELETE /TN "\"Raccine Rules Updater\"" /F

Privilege Escalation

The ransomware executes the following commands to disable UAC remote
restrictions:

C:\WINDOWS\system32\cmd.exe /c reg add
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v
LocalAccountTokenFilterPolicy /t REG_DWORD /d 1 /f

BlackByte sets the EnableLinkedConnections registry value to force symbolic
links to be written to link logon sessions as follows:

C:\WINDOWS\system32\cmd.exe /c reg add
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v
EnableLinkedConnections /t REG_DWORD /d 1 /f

In BlackByte v2, an additional privilege escalation method was added that
exploits the CMSTPLUA COM interface to bypass UAC. The ShellExec method of the
interface ICMLuaUtil can be invoked with arbitrary commands with elevated
privileges using the ElevationMoniker
Elevation:Administrator!new:{3E5FC7F9-9A51-4367-9063-A120244FBEC7}. This allows
BlackByte v2 to execute the svchost.exe process that it injects into with
elevated privileges. This privilege escalation technique has also been utilized
by other ransomware groups including REvil and LockBit.

Lateral Propagation

BlackByte ransomware performs network enumeration and can propagate across a
local network. First it executes the following commands to enable network
discovery and file and printer sharing:

C:\WINDOWS\system32\cmd.exe /c netsh advfirewall firewall set rule
"group=\"Network Discovery\"" new enable=Yes
C:\WINDOWS\system32\cmd.exe /c netsh advfirewall firewall set rule "group=\"File
and Printer Sharing\"" new enable=Yes

The following commands are then executed to discover other computers and network
file shares:

net view
arp -a

BlackByte loads the Active Directory module RSAT-AD-PowerShell and queries for
other computers via the following commands:

C:\WINDOWS\System32\WindowsPowerShell\v1.0\powershell.exe Install-WindowsFeature
-Name \"RSAT-AD-PowerShell\" –IncludeAllSubFeature

powershell -command "Import-Module ActiveDirectory;Get-ADComputer -Filter *
-Properties * | FT Name"

If the -a flag is passed via the command-line, BlackByte attempts to copy itself
to remote computer's public folders via the administrative share
\\&lt;remote_computer_name&gt;\c$\Users\Public\&lt;filename.exe&gt;. If that
attempt is unsuccessful, BlackByte will default to the path:
\\&lt;remote_computer_name&gt;\Users\Public\&lt;filename.exe&gt;. BlackByte uses
the Windows task scheduler to execute the ransomware on the remote host using
the following command:

C:\Windows\system32\schtasks.exe /Create /S &lt;remote_computername&gt; /TN
&lt;taskname&gt; /TR "C:\Users\Public\&lt;filename&gt; -s &lt;passphrase&gt;"
/ru SYSTEM /sc onlogon /RL HIGHEST /f

In BlackByte v2, the filename and task name are pseudorandomly generated using a
function that produces eight upper and lowercase alphabetic and numeric
characters (e.g., BqgDOVYL.exe and KYL8EpE9, respectively). BlackByte v1 uses a
hardcoded filename and command-line argument complex.exe -single and the
hardcoded task name asd.

After scheduling the task, the remote BlackByte binary is executed using the
command:

C:\Windows\system32\schtasks.exe /S &lt;remote_computername&gt; /Run /TN
&lt;taskname&gt;

After the task is executed, BlackByte deletes the remote task using the command:

C:\Windows\system32\schtasks.exe /Delete /S &lt;remote_computername&gt; /TN
&lt;taskname&gt; /f

BlackByte then deletes the copy of itself on the remote host network share.
BlackByte also attempts to access administrative shares A$ through Z$ and the
folders shown in Table 4.

Users
Backup
Veeam
Consejo
homes

home
media
common
Storage Server
Public

Web
Images
Downloads
BackupData

ActiveBackupForBusiness

Backups
NAS-DC
DCBACKUP
DirectorFiles
share

Table 4. Network shares targeted by BlackByte ransomware

Check for Analysis Tools

The malware checks the following DLL modules in memory shown in Table 5 and
exits if they are present:

DLL Filename
Description

DBGHELP.DLL
Windows DbgHelp Library

SbieDll.dll
Sandboxie

SxIn.dll
Qihu 360 Total Security

Sf2.dll
Avast Antivirus

snxhk.dll
Avast Antivirus

cmdvrt32.dll
COMODO Internet Security

Table 5. DLLs Identified by BlackByte ransomware

Disable Debugging

BlackByte attempts to prevent debugging tools from monitoring and attaching to
various processes by removing the following registry values under
SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options:

vssadmin.exe
wbadmin.exe
bcdedit.exe
powershell.exe
diskshadow.exe
net.exe
taskkill.exe
wmic.exe
fsutil.exe

Process Injection

BlackByte v1 injects the ransomware code in an instance of regedit.exe, while
BlackByte v2 injects itself into an instance of svchost.exe. After the process
is injected with the ransomware code, the file encryption is then performed in
the context of the regedit.exe or svchost.exe process. BlackByte then deletes
its original binary on disk by executing the command:

C:\Windows\system32\cmd.exe /c ping 1.1.1.1 -n 10 &gt; Nul &amp; Del
&lt;blackbyte_filepath.exe&gt; /F /Q

The ping command is used to delay the file deletion by 10 seconds. The process
injection functionality may be able to bypass some security software detections.

Unmount Virtual Machine Images

In order to identify virtual machines on the victim's system, BlackByte will
execute the command:

powershell Get-VM

If any virtual machine files are located, BlackByte will attempt to unmount the
image by executing the following command line:

powershell.exe Dismount-DiskImage -ImagePath &lt;filename.vhd&gt;

Backup Volumes

The malware executes mountvol.exe to try to mount additional volumes:

C:\WINDOWS\system32\mountvol.exe A: \\?\Volume{[GUID]}\
C:\WINDOWS\system32\mountvol.exe B: \\?\Volume{[GUID]}\
C:\WINDOWS\system32\mountvol.exe E: \\?\Volume{[GUID]}\
C:\WINDOWS\system32\mountvol.exe F: \\?\Volume{[GUID]}\

This is likely an attempt to mount and encrypt backup volumes to further prevent
file recovery after encryption.

File Encryption

BlackByte enumerates all physical drives and network shares skipping files that
contain the following substrings in Table 6:

blackbyte
ntdetect.com
bootnxt
ntldr
recycle.bin

bootmgr
thumbs.db
ntuser.dat
bootsect.bak
autoexec.bat

iconcache.db
bootfont.bin

Table 6. BlackByte ransomware file substring filter list

BlackByte avoids the following extensions shown in Table 7.

url
msilog
log
ldf
lock

theme
msi
sys
wpx
cpl

adv
msc
scr
key
ico

dll
hta
deskthemepack
nomedia
msu

rtp
msp
idx
ani
386

diagcfg
bin
mod
ics
com

hlp
spl
nls
cab
exe

diagpkg
icl
ocx
rom
prf

themepack
msstyles
icns
mpa
drv

cur
diagcab
cmd
shs

Table 7. File extensions skipped by BlackByte ransomware

BlackByte will also skip files located in the following directories shown in
Table 8.

bitdefender
trend micro
avast software
intel
common files

programdata
windowsapps
appdata
mozilla
application data

google
windows.old
system volume information
program files (x86)
boot

tor browser
windows
intel
perflogs
msocache

Table 8. Directories whitelisted by BlackByte ransomware

BlackByte optimizes encryption speed based on the targeted file size according
to the following rules:

Filesize
Encryption Algorithm

Size &lt;= 5MB
Encrypt the entire file

15MB &gt;= Size &gt; 5MB
Encrypt the first 1MB and last 1MB

150MB &gt;= Size &gt; 15MB
Encrypt the first 5MB and last 5MB

Size &gt; 150MB
Encrypt the first 50MB and last 50MB

BlackByte renames encrypted files with the extension .blackbyte. The ransomware
creates a DefaultIcon registry key under HKEY_CLASSES_ROOT\.blackbyte that
points to an icon file, so that every file that is encrypted will show this icon
in Windows explorer. In addition, the registry names s1159 and s2359 are set to
BLACKBYTE under HKEY_CURRENT_USER\Control Panel\International. These registry
values control the time format for AM/PM. As a result, Windows will show
BLACKBYTE instead of AM/PM as shown below in Figure 2.

Figure 2. BlackByte AM/PM time format modification

This time format modification is performed by executing the commands:

reg add "HKCU\Control Panel\International" /v s1159 /t REG_SZ /d BLACKBYTE /f
reg add "HKCU\Control Panel\International" /v s2359 /t REG_SZ /d BLACKBYTE /f

File Encryption Algorithms (Variant 1)

BlackByte v1 must be executed with the command line argument -single followed by
a SHA256 hash. This hash is combined with a TOR onion URL (e.g.,
hxxp://7oukjxwkbnwyg7cekudzp66okrchbuubde2j3h6fkpis6izywoj2eqad[.]onion/). The
SHA256 hash given as an argument is concatenated to the onion URL to build the
URL of the victim ransom portal that is embedded in the ransom note. This URL is
substituted in the [LINK] field of the ransom note template.

When BlackByte v1 is executed, the malware tries to connect to a hardcoded URL
that hosts a file that is involved in the construction of an AES key that is
used to encrypt a victim's files. An example URL used for this purpose was
hxxps://185.93.6[.]31/mountain.png. The mechanism used to build the AES key is
very similar to the C# variant.

After the content of the file mountain.png is downloaded, BlackByte reads the
first 16 bytes of the file into a buffer and 24 bytes at the offset 0x410 of the
file into another buffer. These 24 bytes are used as key to create and
initialize a NewTripleDESCipher object from the Go Cryptographic API. This
object is used to decrypt the first 16 bytes of the file mountain.png. The
resulting 16-byte buffer will be used as a PBKDF2 password to derive the AES key
that will be used to encrypt the victim's files. The BlackByte PBKDF2 algorithm
uses SHA1 as the hashing function and 1,000 iterations to derive the AES key.
The password is converted to unicode and the unicode string BLACKBYTE_IS_COOL is
used as the salt. The following example Python code can be used to derive the
AES key used for file encryption.

Figure 3. Python code to decrypt BlackByte v1 files with the file (e.g.,
mountain.png) downloaded from the C2 server

Victim's files are encrypted with AES using CBC mode. The first 16 bytes of the
PBKDF2 derived key are used as AES key, and the same 16 bytes are used as the
initialization vector (IV). The same AES key is used to encrypt all the files on
a victim's machine.

The PBKDF2 password is encrypted with a hardcoded 1,024-bit RSA public key and
the resulting RSA-encrypted value is encoded with Base64. This Base64 encoded
string is substituted in the [KEY] field in the ransom note template. The threat
actor can decrypt the PBKDF2 password with their corresponding RSA private key,
derive the AES key, and thereafter, decrypt the victim's encrypted files. The
following is an example RSA public key that was hardcoded in BlackByte:

—–BEGIN PUBLIC KEY—–
MIGfMA0GCSqGSIb3DQEBAQUAA4GNADCBiQKBgQDUBwECQuQiVGorPYvHrJM11OWV
E1PS8gaBqIAfPaR1rQHUEXu3iX/da/dCtV8Z27/SIA/ZYUNhTyUsX9Snjz8zve90
QAiG1c/BS81WWRax7M7i1rESStVwOaUDAj5w6cz9GwDMGYI+wve9Qyjtw5R6hr5I
qlIEig1Wy1X27vUC2wIDAQAB
—–END PUBLIC KEY—–

Ransom Note and BlackByte Icon (Variant 1)

The BlackByte ransom note and an image containing an icon file are stored as
Base64 encoded strings in the binary. After the encryption of the victim's
files, the ransom note is written to a file named BlackByteRestore.txt, and the
previously mentioned icon file is written to a file named BB.ico. An example
BlackByte v1 ransom note template is shown below in Figure 4. The BlackByte logo
uses the extended ASCII characters of the 8-bit code page 437 to create 3-D
block letters.

Figure 4. Go-based BlackByte v1 ransom note template

File Encryption Algorithms (Variant 2)

The second variant of BlackByte ransomware does not require a network connection
to start encryption. In addition, the ransomware's command-line parameters were
modified. BlackByte v2 requires two command line parameters:

sample.exe &lt;flags&gt; &lt;passphrase&gt;

The first parameter is a flag (e.g., -a) that controls specific behaviors of the
ransomware (e.g., to propagate across a network), while the second parameter is
a passphrase (e.g., 54726956) that is verified before file encryption commences.
If BlackByte is not provided with any command-line arguments, the ransomware
prints out the phrase BlackByte ransomware, 8-th generation, the most
destructive of all ransomware products, real natural disaster. and exits.

BlackByte v2 removed the RSA and AES file encryption algorithms from the
ransomware. The encryption algorithms were replaced with Curve25519 elliptic
curve cryptography for asymmetric encryption and ChaCha for symmetric algorithm.
The Curve25519 functions are statically compiled within BlackByte using Go
library code. BlackByte generates a random 32-byte buffer per file using the
Windows API function RtlGenRandom(). This random value is used as a file's
secret key. The file's public key is calculated as follows:

file_public_key = Curve25519(file_secret_key, base_point = 0x9)

The threat actor's Curve25519 public key is hardcoded in the binary and stored
as a Base64 encoded string. For the sample with the SHA256 hash
ffc4d94a26ea7bcf48baffd96d33d3c3d53df1bb2c59567f6d04e02e7e2e5aaa, the hardcoded
Curve25519 public key was the string:

2BSTzcpdqRW/a2DRT3TiL9lN5INRmmn1lCQWzZhkfQs=
(d81493cdca5da915bf6b60d14f74e22fd94de483519a69f5942416cd98647d0b)

The shared secret is derived as follows:

shared_secret = Curve25519(file_secret_key, blackbyte_public_key)

The shared secret is hashed with SHA256 to derive a 32-byte ChaCha encryption
key. The ChaCha encryption key is then hashed again with SHA256 to derive the
ChaCha nonce (using 12 bytes starting at offset 10). Once the ChaCha key
parameters have been derived, they will be used to encrypt the file's content.
The encrypted data is written to the file (overwriting the original content).
Finally, the victim's 32-byte public key is concatenated to the encrypted
content of the file. The BlackByte v2 encryption algorithm is shown below in
Figure 5.

Figure 5. BlackByte v2 file encryption algorithm

The threat actor can use the file's public key together with the threat actor's
secret key to recover the shared secret and use it to decrypt the encrypted data
as follows:

shared_secret = Curve25519(blackbyte_secret_key, file_public_key)

The following Python code in Figure 6 can be used to decrypt BlackByte encrypted
data from a file that has been encrypted if the threat actor's private key is
obtained:

Figure 6. Python code to decrypt BlackByte v2 files with the threat actor's
private key

BlackByte v2 also encrypts the filename after encryption. The encryption is a
simple XOR layer with a hardcoded key, followed by Base64 encoding as shown in
Figure 7.

Figure 7. BlackByte v2 filename encryption

In the analyzed sample, the XOR key was fuckyou123. After a filename has been
encrypted, the file is renamed and the .blackbyte extension is concatenated.

Ransom Note and BlackByte Icon (Variant 2)

BlackByte v2 introduced some improvements to storing the ransom note and icon
file. The Base64 encoded blocks for the ransom note and icon file added an
XOR-based encryption layer. The XOR key to decrypt the ransom note and icon file
is embedded in the ransomware as an obfuscated string. The icon file is written
to the victim's %APPDATA% directory using a randomly generated filename
consisting of six upper and lowercase alphabetic and numeric characters (e.g.,
i2uOJh.ico).

BlackByte v2 contains a hardcoded TOR onion URL and path for the victim portal
rather than relying on the command-line for the path value. BlackByte v2 also
added a hardcoded password that is required to access the victim ransom portal.
An example password is:

gkaW_#DD[Aw_JTB@luXpJBdye6eLr@{bx5pHFA)T5FpMYJC]f|@

The BlackByte v2 ransom note template is shown below in Figure 8. The [LINK]
substring in the ransom note is replaced with the hardcoded BlackByte victim URL
and the [PASSW] substring is replaced with the victim-specific password for the
ransom portal.

Figure 8. BlackByte v2 ransom note template

An example ransom note when populated after file encryption has been performed
for BlackByte v2 is shown in Figure 9.

Figure 9. BlackByte v2 ransom note

After BlackByte encrypts files, the ransom note is written to each directory,
the encrypted files are renamed, and their icons are replaced by the BlackByte
icon.

Ransom Portal and Leak Site

When a victim accesses the link in the ransom portal, they are instructed to
enter the access key from the ransom note as shown in Figure 10.

Figure 10. BlackByte victim ransom portal

After a victim authenticates, they are provided the ransom demand and
instructions how to purchase Bitcoin. There is also a live chat feature as shown
in Figure 11.

Figure 11. BlackByte ransom negotiation portal

Victims are further pressured to pay the ransom, or risk having their data
publicly leaked on their TOR hidden service as shown in Figure 12.

Figure 12. BlackByte victim leak site

Print Bombing

In addition to dropping a ransom note on the victim's machine, the ransomware
sends a message to be printed by any connected printers. The printed ransom
message is an RTF file with the content shown below:

{\rtf1\ansi\ansicpg1251\deff0\nouicompat\deflang1049{\fonttbl{\f0\fnil\fcharset0
Calibri;}}
{\*\generator Riched20 10.0.19041}\viewkind4\uc1
\pard\sa200\sl276\slmult1\qc\f0\fs56\lang9 Your HACKED by BlackByte team.\par
Connect us to restore your system.\fs22\par
\fs56 Your HACKED by BlackByte team.\par
Connect us to restore your system.\fs22\par
\fs56 Your HACKED by BlackByte team.\par
Connect us to restore your system.\fs22\par
\fs56 Your HACKED by BlackByte team.\par
Connect us to restore your system.\fs22\par
\fs56 Your HACKED by BlackByte team.\par
Connect us to restore your system.\fs22\par
\fs56 Your HACKED by BlackByte team.\par
Connect us to restore your system.\fs22\par

\pard\sa200\sl276\slmult1\par
}

In BlackByte v1, the message is written to the file C:\Users\tree.dll and the
following command is executed to print it:

C:\\Windows\\System32\\cmd.exe /c for /l %x in (1,1 ,75) do start wordpad.exe /p
C:\\Users\\tree.dll

In addition, a task named Task is created to print the message every hour:

C:\WINDOWS\system32\schtasks.exe /create /np /sc HOURLY /tn Task /tr
"C:\Windows\System32\cmd.exe
/c for /l %x in (1,1,75) do start wordpad.exe /p C:\Users\tree.dll" /st 07:00

In BlackByte v2, the text of the message is written to a file with a random name
consisting of six upper and lowercase alphabetic and numeric characters. The
task name is also created randomly consisting of eight upper and lowercase
alphabetic and numeric characters. An example task command to print the ransom
message is shown below:

C:\WINDOWS\system32\schtasks.exe /create /np /sc HOURLY /tn 4y77VPNo /tr
"C:\Windows\System32\cmd.exe
/c for /l %x in (1,1,75) do start %SystemDrive%\Program Files\Windows
NT\Accessories\WordPad.exe /p
C:\Users\1HoWkK.dll" /st 07:00

Anti-Analysis / Anti-Forensics Techniques

String Obfuscation

Both Go-based BlackByte variants encrypt most strings using a tool similar to
AdvObfuscator. Each string is decrypted using a unique algorithm with
polymorphic code that implements different operations xor, addition,
subtraction, etc. In the examples below, the encrypted strings in Figure 13 are
built and decrypted from arguments on the stack.

Figure 13. BlackByte string obfuscation examples

Modified UPX Packer

In addition to string obfuscation, BlackByte samples are typically packed with
UPX. In BlackByte v1, all of the samples observed by ThreatLabz were packed with
the standard UPX packer and could be unpacked via the command-line parameter -d.
The early samples of BlackByte v2 were also packed with the standard UPX packer.
However, the most recent BlackByte samples (since March 2022) are packed with a
modified version of UPX. The names of the sections have been renamed from UPX0
and UPX1 to BB0 and BB1, respectively. Figure 14 shows an example BlackByte v2
sample with the modified UPX headers.

Figure 14. BlackByte v2 altered UPX header

Antivirus Detection

Due to BlackByte's anti-analysis features, polymorphic code, and heavy
obfuscation many antivirus products have very low detection rates. For example,
the BlackByte sample with the SHA256
534f5fbb7669803812781e43c30083e9197d03f97f0d860ae7d9a59c0484ace4 has an
antivirus detection rate of 4/61 at the time of publication.

Conclusion

BlackByte is a full-featured ransomware family operated by a threat group that
continues to breach organizations and demand large ransom amounts. The threat
group also performs double extortion attacks by stealing an organization's files
and leaking them online if the ransom is not paid. The ransomware code itself is
regularly updated to fix bugs, bypass security software, and hinder malware
analysis. The encryption algorithms have also been improved to be more secure
and prevent file recovery. This demonstrates that the threat group will likely
continue to improve the ransomware and remain a significant threat to
organizations.

Cloud Sandbox Detection

Zscaler's multilayered cloud security platform detects indicators at various
levels, as shown below:

Win64.Ransom.Blackbyte

Indicators of Compromise

IoC Type
Value

BlackByte v1 Packed Sample
1df11bc19aa52b623bdf15380e3fded56d8eb6fb7b53a2240779864b1a6474ad

BlackByte v1 Packed Sample
388163c9ec1458c779849db891e17efb16a941ca598c4c3ac3a50a77086beb69

BlackByte v1 Unpacked Sample
44a5e78fce5455579123af23665262b10165ac710a9f7538b764af76d7771550

BlackByte v1 Unpacked Sample
6f36a4a1364cfb063a0463d9e1287248700ccf1e0d8e280e034b02cf3db3c442

BlackByte v2 Packed Sample
ffc4d94a26ea7bcf48baffd96d33d3c3d53df1bb2c59567f6d04e02e7e2e5aaa

BlackByte v2 Packed Sample
9103194d32a15ea9e8ede1c81960a5ba5d21213de55df52a6dac409f2e58bcfe

BlackByte v2 Packed Sample
e434ec347a8ea1f0712561bccf0153468a943e16d2cd792fbc72720bd0a8002e

BlackByte v1 Onion URL
hxxp://7oukjxwkbnwyg7cekudzp66okrchbuubde2j3h6fkpis6izywoj2eqad.]onion

BlackByte v2 Onion URL
hxxp://fyk4jl7jk6viteakzzrxntgzecnz4v6wxaefmbmtmcnscsl3tnwix6yd.]onion

BlackByte v2 Onion URL
hxxp://p5quu5ujzzswxv4nxyuhgg3fjj2vy2a3zmtcowalkip2temdfadanlyd.]onion

BlackByte v1 AES Key Seed URL
hxxps://185.93.6[.]31/mountain.png

References

https://redcanary.com/blog/blackbyte-ransomware/

Click to access 220211.pdf

https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/blackbyte-ransomware-pt-1-in-depth-analysis/
https://www.bleepingcomputer.com/forums/t/755181/blackbyte-ransomware-blackbyte-support-topic/

*** This is a Security Bloggers Network syndicated blog from Blog Category Feed
authored by Javier Vicente. Read the original post at:
https://www.zscaler.com/blogs/security-research/analysis-blackbyte-ransomwares-go-based-variants

May 3, 2022May 3, 2022 Javier Vicente

 * ← SOC 2 Compliance: More Qs and As with Audit Expert Liam Collins
 * Joy Of Tech® ‘The Metaverse Land Grab’ →




TECHSTRONG TV

Click full-screen to enable volume control
Watch latest episodes and shows


UPCOMING WEBINARS

 1. 
 2. 
 3. 
 4. 




PODCAST

Listen to all of our podcasts


PRESS RELEASES

GOPLUS’S LATEST REPORT HIGHLIGHTS HOW BLOCKCHAIN COMMUNITIES ARE LEVERAGING
CRITICAL API SECURITY DATA TO MITIGATE WEB3 THREATS

C2A SECURITY’S EVSEC RISK MANAGEMENT AND AUTOMATION PLATFORM GAINS TRACTION IN
AUTOMOTIVE INDUSTRY AS COMPANIES SEEK TO EFFICIENTLY MEET REGULATORY
REQUIREMENTS

ZAMA RAISES $73M IN SERIES A LEAD BY MULTICOIN CAPITAL AND PROTOCOL LABS TO
COMMERCIALIZE FULLY HOMOMORPHIC ENCRYPTION

RSM US DEPLOYS STELLAR CYBER OPEN XDR PLATFORM TO SECURE CLIENTS

THREATHUNTER.AI HALTS HUNDREDS OF ATTACKS IN THE PAST 48 HOURS: COMBATING
RANSOMWARE AND NATION-STATE CYBER THREATS HEAD-ON




SUBSCRIBE TO OUR NEWSLETTERS

Get breaking news, free eBooks and upcoming events delivered to your inbox.


View Security Boulevard Privacy Policy

--------------------------------------------------------------------------------







MOST READ ON THE BOULEVARD

Choosing the Best Cybersecurity Prioritization Method for Your Organization
Why and How to Secure GenAI Investments From Day Zero
RansomHub Emerges in Rapidly Evolving Ransomware Landscape
Is Cloud Security Ready for a Pivot to Behavioral Detection & Response
Russian ‘WhisperGate’ Hacks: 5 More Indicted
An Introduction to Trackers and the Data They Collect
Frustration Trying to Opt-Out After the National Public Data Breach
Unify & Conquer: How Open XDR Streamlines Your Security Operations
Protecting NATO Secret and Foreign Government Information
Cyber Insurers Are Not Your Friend – Why a Warranty May Be a Better Option


INDUSTRY SPOTLIGHT

Analytics & Intelligence AppSec Cyberlaw Cybersecurity Data Privacy Data
Security Deep Fake and Other Social Engineering Tactics DevSecOps Editorial
Calendar Endpoint Featured Governance, Risk & Compliance Humor Identity &
Access Identity and Access Management Incident Response Industry
Spotlight Malware Most Read This Week Network Security News Popular
Post Ransomware Regulatory Compliance Securing the Edge Security at the
Edge Security Awareness Security Boulevard (Original) Security Operations Social
- Facebook Social - LinkedIn Social - X Social Engineering Spotlight Threat
Intelligence Threats & Breaches Zero-Trust 


RUSSIAN ‘WHISPERGATE’ HACKS: 5 MORE INDICTED

September 6, 2024 Richi Jennings | 3 days ago 0
Cloud Security Cybersecurity Data Privacy Data
Security Endpoint Featured Industry Spotlight Mobile Security Network
Security News Security Boulevard (Original) Social - Facebook Social -
LinkedIn Social - X Spotlight 


WHITE HOUSE WANTS TO TIGHTEN INTERNET ROUTING SECURITY

September 4, 2024 Jeffrey Burt | Sep 04 0
Application Security Cloud Security Cybersecurity Data Privacy Data
Security Deep Fake and Other Social Engineering Tactics DevOps DevSecOps Digital
Transformation Editorial Calendar Endpoint Featured Governance, Risk &
Compliance Humor Identity & Access Identity and Access Management Incident
Response Industry Spotlight Insider Threats Mobile Security Most Read This
Week News Popular Post Regulatory Compliance Securing the Edge Security at the
Edge Security Awareness Security Boulevard (Original) Security Challenges and
Opportunities of Remote Work Security Operations Social - Facebook Social -
LinkedIn Social - X Social Engineering Software Supply Chain
Security Spotlight Threats & Breaches Vulnerabilities Zero-Trust 


YIKES, YUBIKEY VULNERABLE — ‘EUCLEAK’ FIDO FAIL?

September 4, 2024 Richi Jennings | Sep 04 0


TOP STORIES

Analytics & Intelligence CISO Suite CISO
Talk Cybersecurity Featured News Security Boulevard (Original) Social -
Facebook Social - LinkedIn Social - X 


SECURITY BUDGET GROWTH SLOWS, BUT SPENDING REMAINS ELEVATED

September 9, 2024 Nathan Eddy | Yesterday 0
Cloud Security Cybersecurity Data Security Featured Incident
Response Malware Network Security News Security Boulevard (Original) Social -
Facebook Social - LinkedIn Social - X Social Engineering Spotlight Threat
Intelligence 


THREAT ACTORS ABUSE RED TEAM TOOL MACROPACK TO DELIVER MALWARE

September 6, 2024 Jeffrey Burt | 3 days ago 0
Cloud Security Cybersecurity Data Security Featured Malware Network
Security News Security Boulevard (Original) Social - Facebook Social -
LinkedIn Social - X Spotlight Threat Intelligence Threats & Breaches 


RANSOMHUB EMERGES IN RAPIDLY EVOLVING RANSOMWARE LANDSCAPE

September 5, 2024 Jeffrey Burt | 4 days ago 0


SECURITY HUMOR

RANDALL MUNROE’S XKCD ‘SLINGSHOTS’


DOWNLOAD FREE EBOOK






JOIN THE COMMUNITY

 * Add your blog to Security Creators Network
 * Write for Security Boulevard
 * Bloggers Meetup and Awards
 * Ask a Question
 * Email: info@securityboulevard.com


USEFUL LINKS

 * About
 * Media Kit
 * Sponsor Info
 * Copyright
 * TOS
 * DMCA Compliance Statement
 * Privacy Policy


RELATED SITES

 * Techstrong Group
 * Cloud Native Now
 * DevOps.com
 * Digital CxO
 * Techstrong Research
 * Techstrong TV
 * Techstrong.tv Podcast
 * DevOps Chat
 * DevOps Dozen
 * DevOps TV

 * 
 * 
 * 
 * 
 * 
 * 
 * 


Copyright © 2024 Techstrong Group Inc. All rights reserved.



SECURITY BOULEVARD ASKS FOR YOUR CONSENT TO USE YOUR PERSONAL DATA TO:

 * perm_identity
   Personalised advertising and content, advertising and content measurement,
   audience research and services development
 * devices
   Store and/or access information on a device

expand_moreremove
Learn more
 * 
   How can I change my choice?
 * 
   What if I don't consent?
 * 
   How does legitimate interest work?
 * 
   Do I have to consent to everything?

Your personal data will be processed and information from your device (cookies,
unique identifiers, and other device data) may be stored by, accessed by and
shared with 136 TCF vendor(s) and 62 ad partner(s), or used specifically by this
site or app.

Some vendors may process your personal data on the basis of legitimate interest,
which you can object to by managing your options below. Look for a link at the
bottom of this page to manage or withdraw consent in privacy and cookie
settings.

Consent



Do not consent

Manage options

arrow_back

Data preferences


MANAGE YOUR DATA

You can choose how your personal data is used. Vendors want your permission to
do the following:

TCF vendors

help_outline


STORE AND/OR ACCESS INFORMATION ON A DEVICE

Cookies, device or similar online identifiers (e.g. login-based identifiers,
randomly assigned identifiers, network based identifiers) together with other
information (e.g. browser type and information, language, screen size, supported
technologies etc.) can be stored or read on your device to recognise it each
time it connects to an app or to a website, for one or several of the purposes
presented here.

View details
Consent (120 vendors)


USE LIMITED DATA TO SELECT ADVERTISING

Advertising presented to you on this service can be based on limited data, such
as the website or app you are using, your non-precise location, your device type
or which content you are (or have been) interacting with (for example, to limit
the number of times an ad is presented to you).

View details
Consent (69 vendors)Legitimate interest (32 vendors)help_outline


CREATE PROFILES FOR PERSONALISED ADVERTISING

Information about your activity on this service (such as forms you submit,
content you look at) can be stored and combined with other information about you
(for example, information from your previous activity on this service and other
websites or apps) or similar users. This is then used to build or improve a
profile about you (that might include possible interests and personal aspects).
Your profile can be used (also later) to present advertising that appears more
relevant based on your possible interests by this and other entities.

View details
Consent (95 vendors)


USE PROFILES TO SELECT PERSONALISED ADVERTISING

Advertising presented to you on this service can be based on your advertising
profiles, which can reflect your activity on this service or other websites or
apps (like the forms you submit, content you look at), possible interests and
personal aspects.

View details
Consent (91 vendors)


CREATE PROFILES TO PERSONALISE CONTENT

Information about your activity on this service (for instance, forms you submit,
non-advertising content you look at) can be stored and combined with other
information about you (such as your previous activity on this service or other
websites or apps) or similar users. This is then used to build or improve a
profile about you (which might for example include possible interests and
personal aspects). Your profile can be used (also later) to present content that
appears more relevant based on your possible interests, such as by adapting the
order in which content is shown to you, so that it is even easier for you to
find content that matches your interests.

View details
Consent (28 vendors)


USE PROFILES TO SELECT PERSONALISED CONTENT

Content presented to you on this service can be based on your content
personalisation profiles, which can reflect your activity on this or other
services (for instance, the forms you submit, content you look at), possible
interests and personal aspects. This can for example be used to adapt the order
in which content is shown to you, so that it is even easier for you to find
(non-advertising) content that matches your interests.

View details
Consent (23 vendors)


MEASURE ADVERTISING PERFORMANCE

Information regarding which advertising is presented to you and how you interact
with it can be used to determine how well an advert has worked for you or other
users and whether the goals of the advertising were reached. For instance,
whether you saw an ad, whether you clicked on it, whether it led you to buy a
product or visit a website, etc. This is very helpful to understand the
relevance of advertising campaigns.

View details
Consent (76 vendors)Legitimate interest (47 vendors)help_outline


MEASURE CONTENT PERFORMANCE

Information regarding which content is presented to you and how you interact
with it can be used to determine whether the (non-advertising) content e.g.
reached its intended audience and matched your interests. For instance, whether
you read an article, watch a video, listen to a podcast or look at a product
description, how long you spent on this service and the web pages you visit etc.
This is very helpful to understand the relevance of (non-advertising) content
that is shown to you.

View details
Consent (31 vendors)Legitimate interest (14 vendors)help_outline


UNDERSTAND AUDIENCES THROUGH STATISTICS OR COMBINATIONS OF DATA FROM DIFFERENT
SOURCES

Reports can be generated based on the combination of data sets (like user
profiles, statistics, market research, analytics data) regarding your
interactions and those of other users with advertising or (non-advertising)
content to identify common characteristics (for instance, to determine which
target audiences are more receptive to an ad campaign or to certain contents).

View details
Consent (57 vendors)Legitimate interest (22 vendors)help_outline


DEVELOP AND IMPROVE SERVICES

Information about your activity on this service, such as your interaction with
ads or content, can be very helpful to improve products and services and to
build new products and services based on user interactions, the type of
audience, etc. This specific purpose does not include the development or
improvement of user profiles and identifiers.

View details
Consent (66 vendors)Legitimate interest (38 vendors)help_outline


USE LIMITED DATA TO SELECT CONTENT

Content presented to you on this service can be based on limited data, such as
the website or app you are using, your non-precise location, your device type,
or which content you are (or have been) interacting with (for example, to limit
the number of times a video or an article is presented to you).

View details
Consent (12 vendors)Legitimate interest (3 vendors)help_outline


ENSURE SECURITY, PREVENT AND DETECT FRAUD, AND FIX ERRORS

help_outline

Your data can be used to monitor for and prevent unusual and possibly fraudulent
activity (for example, regarding advertising, ad clicks by bots), and ensure
systems and processes work properly and securely. It can also be used to correct
any problems you, the publisher or the advertiser may encounter in the delivery
of content and ads and in your interaction with them.

View details


DELIVER AND PRESENT ADVERTISING AND CONTENT

help_outline

Certain information (like an IP address or device capabilities) is used to
ensure the technical compatibility of the content or advertising, and to
facilitate the transmission of the content or ad to your device.

View details


SAVE AND COMMUNICATE PRIVACY CHOICES

help_outline

The choices you make regarding the purposes and entities listed in this notice
are saved and made available to those entities in the form of digital signals
(such as a string of characters). This is necessary in order to enable both this
service and those entities to respect such choices.

View details


MATCH AND COMBINE DATA FROM OTHER DATA SOURCES

help_outline

Information about your activity on this service may be matched and combined with
other information relating to you and originating from various sources (for
instance your activity on a separate online service, your use of a loyalty card
in-store, or your answers to a survey), in support of the purposes explained in
this notice.

View details


LINK DIFFERENT DEVICES

help_outline

In support of the purposes explained in this notice, your device might be
considered as likely linked to other devices that belong to you or your
household (for instance because you are logged in to the same service on both
your phone and your computer, or because you may use the same Internet
connection on both devices).

View details


IDENTIFY DEVICES BASED ON INFORMATION TRANSMITTED AUTOMATICALLY

help_outline

Your device might be distinguished from other devices based on information it
automatically sends when accessing the Internet (for instance, the IP address of
your Internet connection or the type of browser you are using) in support of the
purposes exposed in this notice.

View details


USE PRECISE GEOLOCATION DATA

With your acceptance, your precise location (within a radius of less than 500
metres) may be used in support of the purposes explained in this notice.

View details
Consent

Vendor preferences

Accept all



Confirm choices

arrow_back

Vendor preferences


CONFIRM OUR VENDORS

Vendors can use your data to provide services. Declining a vendor can stop them
from using the data you shared.

TCF vendors

help_outline


EXPONENTIAL INTERACTIVE, INC D/B/A VDX.TV

Cookie duration: 90 (days).

Data collected and processed: Device identifiers, Probabilistic identifiers,
Browsing and interaction data, Non-precise location data, Privacy choices, IP
addresses, Users’ profiles

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


ROQ.AD GMBH

Cookie duration: 365 (days).

Data collected and processed: Device identifiers, Device characteristics,
Authentication-derived identifiers, Precise location data, Probabilistic
identifiers, Browsing and interaction data, Non-precise location data, Privacy
choices, IP addresses

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


INDEX EXCHANGE INC.

Cookie duration: 395 (days).

Data collected and processed: Device identifiers, Device characteristics,
Precise location data, Non-precise location data, Privacy choices, IP addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


QUANTCAST

Cookie duration: 396 (days).

Data collected and processed: Device identifiers, Device characteristics,
Authentication-derived identifiers, Probabilistic identifiers, Browsing and
interaction data, Non-precise location data, User-provided data, Privacy
choices, IP addresses, Users’ profiles

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


BEESWAXIO CORPORATION

Cookie duration: 395 (days).

Data collected and processed: Device identifiers, Device characteristics,
Precise location data, Probabilistic identifiers, Browsing and interaction data,
Non-precise location data, Privacy choices, IP addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


SOVRN, INC.

Cookie duration: 365 (days).

Data collected and processed: Device identifiers, Device characteristics,
Browsing and interaction data, Non-precise location data, Privacy choices, IP
addresses, Users’ profiles

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
Consent


ADIKTEEV

Doesn't use cookies.

Data collected and processed: Device identifiers, Device characteristics,
Authentication-derived identifiers, Probabilistic identifiers, Non-precise
location data, IP addresses, Users’ profiles

more

Uses other forms of storage.


View details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


RTB HOUSE S.A.

Cookie duration: 365 (days).

Data collected and processed: Device identifiers, Device characteristics,
Browsing and interaction data, Non-precise location data, Privacy choices, IP
addresses, Users’ profiles

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


THE UK TRADE DESK LTD

Cookie duration: 365 (days).

Data collected and processed: Device identifiers, Device characteristics,
Authentication-derived identifiers, Precise location data, Probabilistic
identifiers, Browsing and interaction data, Non-precise location data, Privacy
choices, IP addresses, Users’ profiles

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


NEXXEN INC.

Cookie duration: 180 (days).

Data collected and processed: Device identifiers, Device characteristics,
Probabilistic identifiers, Browsing and interaction data, Non-precise location
data, Privacy choices, IP addresses, Users’ profiles

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


EPSILON

Cookie duration: 184 (days).

Data collected and processed: Device identifiers, Device characteristics,
Authentication-derived identifiers, Probabilistic identifiers, Browsing and
interaction data, Non-precise location data, User-provided data, Privacy
choices, IP addresses, Users’ profiles

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
Consent


YAHOO EMEA LIMITED

Cookie duration: 397 (days).

Data collected and processed: Device identifiers, Device characteristics,
Precise location data, Probabilistic identifiers, Browsing and interaction data,
Non-precise location data, Privacy choices, IP addresses, Users’ profiles

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


ADVENTORI SAS

Cookie duration: 90 (days).

Data collected and processed: Device identifiers, Probabilistic identifiers,
Browsing and interaction data, Non-precise location data, User-provided data,
Privacy choices, IP addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
Consent


TRIPLE LIFT, INC.

Cookie duration: 90 (days).

Data collected and processed: Device identifiers, Device characteristics,
Authentication-derived identifiers, Precise location data, Browsing and
interaction data, Non-precise location data, Privacy choices, IP addresses,
Users’ profiles

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


XANDR, INC.

Cookie duration: 90 (days).

Data collected and processed: Device identifiers, Device characteristics,
Authentication-derived identifiers, Precise location data, Browsing and
interaction data, Non-precise location data, Privacy choices, IP addresses,
Users’ profiles

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


NEORY GMBH

Cookie duration: 90 (days).

Data collected and processed: Device identifiers, Device characteristics,
Authentication-derived identifiers, Probabilistic identifiers, Browsing and
interaction data, Non-precise location data, User-provided data, Privacy
choices, IP addresses, Users’ profiles

more

Cookie duration resets each session.


View details | Privacy policylaunch
Consent


NEXXEN GROUP LLC

Cookie duration: 365 (days).

Data collected and processed: Device identifiers, Device characteristics,
Probabilistic identifiers, Non-precise location data, Privacy choices, IP
addresses, Users’ profiles

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


NEURAL.ONE

Cookie duration: 365 (days).

Data collected and processed: Device characteristics, Probabilistic identifiers,
Browsing and interaction data, Non-precise location data, Privacy choices, IP
addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
Consent


ADITION (VIRTUAL MINDS GMBH)

Cookie duration: 90 (days).

Data collected and processed: Device identifiers, Device characteristics,
Precise location data, Probabilistic identifiers, Browsing and interaction data,
Non-precise location data, User-provided data, Privacy choices, IP addresses,
Users’ profiles

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


ACTIVE AGENT (VIRTUAL MINDS GMBH)

Cookie duration: 90 (days).

Data collected and processed: Device identifiers, Device characteristics,
Precise location data, Probabilistic identifiers, Browsing and interaction data,
Non-precise location data, User-provided data, Privacy choices, IP addresses,
Users’ profiles

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


TABOOLA EUROPE LIMITED

Cookie duration: 366 (days).

Data collected and processed: Device identifiers, Device characteristics,
Probabilistic identifiers, Browsing and interaction data, Non-precise location
data, Privacy choices, IP addresses, Users’ profiles

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


EQUATIV

Cookie duration: 396 (days).

Data collected and processed: Device identifiers, Device characteristics,
Authentication-derived identifiers, Precise location data, Probabilistic
identifiers, Browsing and interaction data, Non-precise location data, Privacy
choices, IP addresses, Users’ profiles

more

Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


ADFORM A/S

Cookie duration: 3650 (days).

Data collected and processed: Device identifiers, Device characteristics,
Authentication-derived identifiers, Probabilistic identifiers, Browsing and
interaction data, Non-precise location data, User-provided data, Privacy
choices, IP addresses, Users’ profiles

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


MAGNITE, INC.

Cookie duration: 365 (days).

Data collected and processed: Device identifiers, Device characteristics,
Precise location data, Probabilistic identifiers, Browsing and interaction data,
Non-precise location data, Privacy choices, IP addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


RATEGAIN ADARA INC

Cookie duration: 730 (days).

Data collected and processed: Device identifiers, Device characteristics,
Authentication-derived identifiers, Browsing and interaction data, Non-precise
location data, User-provided data, Privacy choices, IP addresses, Users’
profiles

more




View details | Storage details | Privacy policylaunch
Consent


SIFT MEDIA, INC

Doesn't use cookies.

Data collected and processed: Device identifiers, Device characteristics,
Precise location data, Non-precise location data, IP addresses

more




View details | Privacy policylaunch
Consent


RAKUTEN MARKETING LLC

Cookie duration: 730 (days).

Data collected and processed: Device identifiers, Device characteristics,
Authentication-derived identifiers, Probabilistic identifiers, Browsing and
interaction data, Non-precise location data, User-provided data, Privacy
choices, IP addresses, Users’ profiles

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


LUMEN RESEARCH LIMITED

Doesn't use cookies.

Data collected and processed: Device characteristics, Browsing and interaction
data, Non-precise location data, IP addresses

more




View details | Privacy policylaunch
Legitimate interesthelp_outline


AMAZON AD SERVER

Cookie duration: 396 (days).

Data collected and processed: Device identifiers, Device characteristics,
Authentication-derived identifiers, Browsing and interaction data, Non-precise
location data, Privacy choices, IP addresses, Users’ profiles

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


OPENX

Cookie duration: 365 (days).

Data collected and processed: Device identifiers, Device characteristics,
Browsing and interaction data, Non-precise location data, Privacy choices, IP
addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


YIELDLAB (VIRTUAL MINDS GMBH)

Cookie duration: 90 (days).

Data collected and processed: Device identifiers, Device characteristics,
Precise location data, Probabilistic identifiers, Browsing and interaction data,
Non-precise location data, User-provided data, Privacy choices, IP addresses,
Users’ profiles

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


ROKU ADVERTISING SERVICES

Cookie duration: 396 (days).

Data collected and processed: Device identifiers, Device characteristics,
Authentication-derived identifiers, Precise location data, Probabilistic
identifiers, Browsing and interaction data, Non-precise location data,
User-provided data, Privacy choices, IP addresses, Users’ profiles

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


NANO INTERACTIVE GROUP LTD.

Doesn't use cookies.

Data collected and processed: Device characteristics, Browsing and interaction
data, Non-precise location data

more




View details | Privacy policylaunch
Consent


SIMPLIFI HOLDINGS LLC

Cookie duration: 366 (days).

Data collected and processed: Device identifiers, Precise location data, IP
addresses

more

Uses other forms of storage.


View details | Privacy policylaunch
Consent


PUBMATIC, INC

Cookie duration: 365 (days).

Data collected and processed: Device identifiers, Device characteristics,
Authentication-derived identifiers, Precise location data, Probabilistic
identifiers, Browsing and interaction data, Non-precise location data,
User-provided data, Privacy choices, IP addresses, Users’ profiles

more

Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


COMSCORE B.V.

Cookie duration: 720 (days).

Data collected and processed: Device identifiers, Device characteristics,
Authentication-derived identifiers, Probabilistic identifiers, Browsing and
interaction data, User-provided data, Privacy choices, IP addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
Consent


FLASHTALKING

Cookie duration: 730 (days).

Data collected and processed: Device identifiers, Device characteristics,
Authentication-derived identifiers, Probabilistic identifiers, Browsing and
interaction data, Non-precise location data, Privacy choices, IP addresses,
Users’ profiles

more




View details | Privacy policylaunch
Consent


PULSEPOINT, INC.

Cookie duration: 365 (days).

Data collected and processed: Device identifiers, Device characteristics, IP
addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
Consent


SMAATO, INC.

Cookie duration: 21 (days).

Data collected and processed: Device identifiers, Device characteristics,
Authentication-derived identifiers, Precise location data, Browsing and
interaction data, Non-precise location data, User-provided data, Privacy
choices, IP addresses, Users’ profiles

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


SEMASIO GMBH

Cookie duration: 366 (days).

Data collected and processed: Device identifiers, Browsing and interaction data,
Privacy choices, IP addresses

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


CRIMTAN HOLDINGS LIMITED

Cookie duration: 365 (days).

Data collected and processed: Device identifiers, Device characteristics,
Authentication-derived identifiers, Precise location data, Probabilistic
identifiers, Browsing and interaction data, Non-precise location data,
User-provided data, Privacy choices, IP addresses, Users’ profiles

more

Cookie duration resets each session.


View details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


GENIUS SPORTS UK LIMITED

Cookie duration: 365 (days).

Data collected and processed: Device identifiers, Device characteristics,
Authentication-derived identifiers, Probabilistic identifiers, Browsing and
interaction data, Non-precise location data, Privacy choices, IP addresses,
Users’ profiles

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


CRITEO SA

Cookie duration: 390 (days).

Data collected and processed: Device identifiers, Device characteristics,
Authentication-derived identifiers, Probabilistic identifiers, Browsing and
interaction data, Non-precise location data, Privacy choices, IP addresses,
Users’ profiles

more

Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


ADLOOX SA

Doesn't use cookies.

Data collected and processed: Device identifiers, Device characteristics,
Probabilistic identifiers, Browsing and interaction data, Non-precise location
data, IP addresses

more

Uses other forms of storage.


View details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


BLIS GLOBAL LIMITED

Cookie duration: 400 (days).

Data collected and processed: Device identifiers, Device characteristics,
Authentication-derived identifiers, Precise location data, Probabilistic
identifiers, Browsing and interaction data, Non-precise location data,
User-provided data, Privacy choices, IP addresses, Users’ profiles

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


LOTAME SOLUTIONS, INC

Cookie duration: 274 (days).

Data collected and processed: Device identifiers, Device characteristics,
Authentication-derived identifiers, Probabilistic identifiers, Browsing and
interaction data, User-provided data, Privacy choices, IP addresses, Users’
profiles

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
Consent


LIVERAMP

Cookie duration: 365 (days).

Data collected and processed: Device identifiers, Device characteristics,
Authentication-derived identifiers, Browsing and interaction data, Non-precise
location data, Privacy choices, IP addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


GROUPM UK LIMITED

Cookie duration: 395 (days).

Data collected and processed: Device identifiers, Device characteristics,
Authentication-derived identifiers, Precise location data, Probabilistic
identifiers, Browsing and interaction data, Non-precise location data, Privacy
choices, IP addresses

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


LOOPME LIMITED

Cookie duration: 90 (days).

Data collected and processed: Device identifiers, Device characteristics,
Precise location data, Probabilistic identifiers, Browsing and interaction data,
Non-precise location data, User-provided data, Privacy choices, IP addresses,
Users’ profiles

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


DYNATA LLC

Cookie duration: 365 (days).

Data collected and processed: Device identifiers, Device characteristics,
Authentication-derived identifiers, Browsing and interaction data, Non-precise
location data, User-provided data, Privacy choices, IP addresses, Users’
profiles

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


ASK LOCALA

Doesn't use cookies.

Data collected and processed: Device identifiers, Device characteristics,
Precise location data, Non-precise location data, Privacy choices, IP addresses

more

Uses other forms of storage.


View details | Privacy policylaunch
Consent


AZIRA

Doesn't use cookies.

Data collected and processed: Device identifiers, Device characteristics,
Precise location data, Browsing and interaction data, Non-precise location data,
Privacy choices, IP addresses, Users’ profiles

more

Uses other forms of storage.


View details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


DOUBLEVERIFY INC.

Doesn't use cookies.

Data collected and processed: Device characteristics, Probabilistic identifiers,
Browsing and interaction data, Non-precise location data, Privacy choices, IP
addresses

more




View details | Privacy policylaunch
Legitimate interesthelp_outline


BIDSWITCH GMBH

Cookie duration: 365 (days).

Data collected and processed: Device identifiers, Device characteristics,
Authentication-derived identifiers, Precise location data, Probabilistic
identifiers, Browsing and interaction data, Non-precise location data, Privacy
choices, IP addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
Consent


IPONWEB GMBH

Cookie duration: 365 (days).

Data collected and processed: Device identifiers, Device characteristics,
Authentication-derived identifiers, Browsing and interaction data, Non-precise
location data, User-provided data, Privacy choices, IP addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


NEXTROLL, INC.

Cookie duration: 183 (days).

Data collected and processed: Device identifiers, Device characteristics,
Browsing and interaction data, Non-precise location data, User-provided data,
Privacy choices, IP addresses, Users’ profiles

more

Cookie duration resets each session.


View details | Privacy policylaunch
Consent


TEADS FRANCE SAS

Cookie duration: 365 (days).

Data collected and processed: Device identifiers, Device characteristics,
Probabilistic identifiers, Browsing and interaction data, Non-precise location
data, Privacy choices, IP addresses, Users’ profiles

more

Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


STRÖER SSP GMBH (SSP)

Cookie duration: 365 (days).

Data collected and processed: Device identifiers, Device characteristics,
Probabilistic identifiers, Browsing and interaction data, Non-precise location
data, Privacy choices, IP addresses, Users’ profiles

more

Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


OS DATA SOLUTIONS GMBH & CO. KG

Cookie duration: 90 (days).

Data collected and processed: Device identifiers, Device characteristics,
Probabilistic identifiers, Browsing and interaction data, Non-precise location
data, User-provided data, Privacy choices, IP addresses, Users’ profiles

more

Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


PERMODO GMBH

Doesn't use cookies.

Data collected and processed: Device identifiers, Device characteristics,
Browsing and interaction data, Non-precise location data, Privacy choices, IP
addresses, Users’ profiles

more

Uses other forms of storage.


View details | Privacy policylaunch
Consent


PLATFORM161 B.V.

Cookie duration: 396 (days).

Data collected and processed: Device identifiers, Device characteristics,
Precise location data, Probabilistic identifiers, Browsing and interaction data,
Non-precise location data, Privacy choices, IP addresses, Users’ profiles

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


BASIS GLOBAL TECHNOLOGIES, INC.

Cookie duration: 365 (days).

Data collected and processed: Device identifiers, Device characteristics,
Authentication-derived identifiers, Precise location data, Browsing and
interaction data, Non-precise location data, Privacy choices, IP addresses,
Users’ profiles

more

Cookie duration resets each session.


View details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


SMADEX, S.L.U.

Cookie duration: 365 (days).

Data collected and processed: Device identifiers, Device characteristics,
Probabilistic identifiers, Non-precise location data, User-provided data,
Privacy choices, IP addresses, Users’ profiles

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


BOMBORA INC.

Cookie duration: 365 (days).

Data collected and processed: Device identifiers, Device characteristics,
Authentication-derived identifiers, Browsing and interaction data, Non-precise
location data, IP addresses, Users’ profiles

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


EASYMEDIA GMBH

Cookie duration: 365 (days).

Data collected and processed: Device identifiers, Device characteristics,
Precise location data, Probabilistic identifiers, Browsing and interaction data,
Non-precise location data, Privacy choices, IP addresses, Users’ profiles

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


REMERGE GMBH

Doesn't use cookies.

Data collected and processed: Device identifiers, Device characteristics,
Browsing and interaction data, Non-precise location data, IP addresses

more

Uses other forms of storage.


View details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


ADVANCED STORE GMBH

Cookie duration: 365 (days).

Data collected and processed: Device identifiers

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


MAGNITE CTV, INC.

Cookie duration: 366 (days).

Data collected and processed: Device identifiers, Device characteristics,
Precise location data, Probabilistic identifiers, Browsing and interaction data,
Non-precise location data, Privacy choices, IP addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


DELTA PROJECTS AB

Cookie duration: 365 (days).

Data collected and processed: Device identifiers, Device characteristics,
Authentication-derived identifiers, Precise location data, Probabilistic
identifiers, Browsing and interaction data, Non-precise location data,
User-provided data, Privacy choices, IP addresses, Users’ profiles

more




View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


USEMAX ADVERTISEMENT (EMEGO GMBH)

Cookie duration: 365 (days).

Data collected and processed: IP addresses, Users’ profiles

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


EMETRIQ GMBH

Cookie duration: 365 (days).

Data collected and processed: Device identifiers, Device characteristics,
Authentication-derived identifiers, Probabilistic identifiers, Browsing and
interaction data, Non-precise location data, User-provided data, Privacy
choices, IP addresses, Users’ profiles

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


PUBLICIS MEDIA GMBH

Cookie duration: 1825 (days).

Data collected and processed: Device identifiers, Device characteristics,
Authentication-derived identifiers, Probabilistic identifiers, Browsing and
interaction data, Non-precise location data, User-provided data, Privacy
choices, IP addresses, Users’ profiles

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
Consent


M.D. PRIMIS TECHNOLOGIES LTD.

Cookie duration: 25 (days).

Data collected and processed: Device identifiers, Device characteristics,
Probabilistic identifiers, Browsing and interaction data, Non-precise location
data, User-provided data, Privacy choices, IP addresses

more




View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


ONETAG LIMITED

Cookie duration: 396 (days).

Data collected and processed: Device identifiers, Device characteristics,
Browsing and interaction data, Non-precise location data, Privacy choices, IP
addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


CLOUD TECHNOLOGIES S.A.

Cookie duration: 365 (days).

Data collected and processed: Device identifiers, Device characteristics,
Authentication-derived identifiers, Browsing and interaction data, Non-precise
location data, Privacy choices, IP addresses, Users’ profiles

more

Cookie duration resets each session.


View details | Privacy policylaunch
Consent


SMARTOLOGY LIMITED

Doesn't use cookies.

Data collected and processed: IP addresses

more

Uses other forms of storage.


View details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


IMPROVE DIGITAL

Cookie duration: 90 (days).

Data collected and processed: Device identifiers, Device characteristics,
Authentication-derived identifiers, Precise location data, Probabilistic
identifiers, Browsing and interaction data, Non-precise location data,
User-provided data, Privacy choices, IP addresses, Users’ profiles

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


ADOBE ADVERTISING CLOUD

Cookie duration: 365 (days).

Data collected and processed: Device identifiers, Authentication-derived
identifiers, Privacy choices, IP addresses

more




View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


BANNERFLOW AB

Cookie duration: 366 (days).

Data collected and processed: Device characteristics, Non-precise location data,
Privacy choices, IP addresses

more

Cookie duration resets each session.


View details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


TABMO SAS

Doesn't use cookies.

Data collected and processed: Device identifiers, Device characteristics,
Precise location data, Probabilistic identifiers, Browsing and interaction data,
Non-precise location data, User-provided data, Privacy choices, IP addresses,
Users’ profiles

more

Uses other forms of storage.


View details | Privacy policylaunch
Consent


INTEGRAL AD SCIENCE (INCORPORATING ADMANTX)

Doesn't use cookies.

Data collected and processed: Device characteristics, Browsing and interaction
data, Non-precise location data, Privacy choices, IP addresses

more




View details | Privacy policylaunch
Legitimate interesthelp_outline


WIZALY

Cookie duration: 365 (days).

Data collected and processed: Device characteristics, Authentication-derived
identifiers, Browsing and interaction data, Non-precise location data, Privacy
choices, IP addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


WEBORAMA

Cookie duration: 393 (days).

Data collected and processed: Device identifiers, Device characteristics,
Authentication-derived identifiers, Precise location data, Probabilistic
identifiers, Browsing and interaction data, Non-precise location data,
User-provided data, Privacy choices, IP addresses, Users’ profiles

more

Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


JIVOX CORPORATION

Cookie duration: 30 (days).

Data collected and processed: Device identifiers, Precise location data,
Browsing and interaction data, Non-precise location data, Privacy choices, IP
addresses, Users’ profiles

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


VISTAR MEDIA EMEA BV

Doesn't use cookies.

Data collected and processed: Non-precise location data

more




View details | Privacy policylaunch
Consent


ON DEVICE RESEARCH LIMITED

Cookie duration: 30 (days).

Data collected and processed: Device identifiers, Device characteristics,
Precise location data, Browsing and interaction data, Non-precise location data,
User-provided data, IP addresses

more




View details | Storage details | Privacy policylaunch
Consent


ROCKABOX MEDIA LTD

Doesn't use cookies.

Data collected and processed: Device characteristics, Browsing and interaction
data, Non-precise location data, IP addresses

more




View details | Storage details | Privacy policylaunch
Legitimate interesthelp_outline


EXACTAG GMBH

Cookie duration: 180 (days).

Data collected and processed: Device identifiers, Device characteristics,
Authentication-derived identifiers, Browsing and interaction data, Privacy
choices, IP addresses

more

Cookie duration resets each session.


View details | Privacy policylaunch
Consent


CELTRA INC.

Doesn't use cookies.

Data collected and processed: Device identifiers, Device characteristics,
Precise location data, IP addresses

more

Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


MAINADV SRL

Cookie duration: 30 (days).

Data collected and processed: Device identifiers, Device characteristics,
Browsing and interaction data, Non-precise location data, User-provided data,
Privacy choices, IP addresses

more

Uses other forms of storage.


View details | Privacy policylaunch
Consent


GEMIUS SA

Cookie duration: 1825 (days).

Data collected and processed: Device identifiers, Device characteristics,
Browsing and interaction data, Privacy choices, IP addresses, Users’ profiles

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


THE KANTAR GROUP LIMITED

Cookie duration: 914 (days).

Data collected and processed: Device identifiers, Device characteristics,
Browsing and interaction data, Non-precise location data, Privacy choices, IP
addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
Consent


NIELSEN MEDIA RESEARCH LTD.

Cookie duration: 120 (days).

Data collected and processed: Device identifiers, Device characteristics,
Browsing and interaction data, Privacy choices, IP addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


SOLOCAL SA

Cookie duration: 396 (days).

Data collected and processed: Device identifiers, Device characteristics,
Precise location data, Browsing and interaction data, Non-precise location data,
User-provided data, Privacy choices, IP addresses, Users’ profiles

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


PIXALATE, INC.

Doesn't use cookies.

Data collected and processed: Device identifiers, Device characteristics,
Browsing and interaction data, Non-precise location data, IP addresses

more




View details | Storage details | Privacy policylaunch
Consent


ORACLE ADVERTISING

Cookie duration: 180 (days).

Data collected and processed: Device identifiers, Device characteristics,
Authentication-derived identifiers, Browsing and interaction data, Non-precise
location data, User-provided data, Privacy choices, IP addresses, Users’
profiles

more

Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


NUMBERLY

Cookie duration: 180 (days).

Data collected and processed: Device identifiers, Device characteristics,
Authentication-derived identifiers, Browsing and interaction data, Non-precise
location data, User-provided data, Privacy choices, IP addresses, Users’
profiles

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


AUDIENCEPROJECT A/S

Cookie duration: 365 (days).

Data collected and processed: Device identifiers, Device characteristics,
Authentication-derived identifiers, Probabilistic identifiers, Browsing and
interaction data, Non-precise location data, User-provided data, Privacy
choices, IP addresses, Users’ profiles

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


DEMANDBASE, INC.

Cookie duration: 730 (days).

Data collected and processed: Device identifiers, Device characteristics,
Precise location data, Probabilistic identifiers, Browsing and interaction data,
Non-precise location data, User-provided data, Privacy choices, IP addresses,
Users’ profiles

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


EFFILIATION / EFFINITY

Cookie duration: 30 (days).

Data collected and processed: Device characteristics

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


ARRIVALIST CO.

Cookie duration: 365 (days).

Data collected and processed: Non-precise location data, IP addresses

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


SEENTHIS AB

Doesn't use cookies.

Data collected and processed: Device characteristics, IP addresses

more




View details | Privacy policylaunch


COMMANDERS ACT

Cookie duration: 365 (days).

Data collected and processed: Device identifiers, IP addresses

more




View details | Storage details | Privacy policylaunch
Consent


TRAVEL AUDIENCE GMBH

Cookie duration: 397 (days).

Data collected and processed: Device identifiers, Device characteristics,
Authentication-derived identifiers, Precise location data, Probabilistic
identifiers, Browsing and interaction data, Non-precise location data, IP
addresses, Users’ profiles

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
Consent


HUMAN

Doesn't use cookies.

Data collected and processed: Device identifiers, Device characteristics,
Probabilistic identifiers, Non-precise location data, IP addresses

more




View details | Privacy policylaunch
Legitimate interesthelp_outline


ADLUDIO LTD.

Doesn't use cookies.

Data collected and processed: Device identifiers, Device characteristics,
Precise location data

more




View details | Privacy policylaunch
Consent


BLENDEE SRL

Cookie duration: 366 (days).

Data collected and processed: Device identifiers, Device characteristics,
Authentication-derived identifiers, Browsing and interaction data, Non-precise
location data, User-provided data, Privacy choices, IP addresses, Users’
profiles

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


INNOVID LLC

Cookie duration: 90 (days).

Data collected and processed: Device identifiers, Device characteristics,
Browsing and interaction data, Non-precise location data, Privacy choices, IP
addresses

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


PAPIRFLY AS

Doesn't use cookies.

Data collected and processed: Device characteristics

more




View details | Privacy policylaunch
Legitimate interesthelp_outline


NEUSTAR, INC., A TRANSUNION COMPANY

Cookie duration: 365 (days).

Data collected and processed: Device identifiers, Device characteristics,
Authentication-derived identifiers, Probabilistic identifiers, Browsing and
interaction data, Non-precise location data, User-provided data, Privacy
choices, IP addresses, Users’ profiles

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


VERVE GROUP EUROPE GMBH

Doesn't use cookies.

Data collected and processed: Device identifiers, Device characteristics,
Authentication-derived identifiers, Precise location data, Browsing and
interaction data, Non-precise location data, User-provided data, Privacy
choices, IP addresses, Users’ profiles

more

Uses other forms of storage.


View details | Privacy policylaunch
Consent


OTTO (GMBH & CO KG)

Cookie duration: 365 (days).

Data collected and processed: Device identifiers, Browsing and interaction data,
User-provided data, Privacy choices, IP addresses, Users’ profiles

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


ADOBE AUDIENCE MANAGER, ADOBE EXPERIENCE PLATFORM

Cookie duration: 180 (days).

Data collected and processed: Device identifiers, Device characteristics,
Authentication-derived identifiers, Precise location data, Probabilistic
identifiers, Browsing and interaction data, Non-precise location data,
User-provided data, Privacy choices, IP addresses, Users’ profiles

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


LOCALSENSOR B.V.

Doesn't use cookies.

Data collected and processed: Device identifiers, Device characteristics,
Precise location data, Non-precise location data, Privacy choices, IP addresses

more

Uses other forms of storage.


View details | Privacy policylaunch
Consent


ONLINE SOLUTION

Cookie duration: 365 (days).

Data collected and processed: Device identifiers, Device characteristics,
Precise location data, Probabilistic identifiers, Browsing and interaction data,
Non-precise location data, User-provided data, Privacy choices, IP addresses,
Users’ profiles

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
Consent


RELAY42 NETHERLANDS B.V.

Cookie duration: 730 (days).

Data collected and processed: Device identifiers, Device characteristics,
Probabilistic identifiers, Browsing and interaction data, User-provided data,
Privacy choices, IP addresses, Users’ profiles

more




View details | Storage details | Privacy policylaunch
Consent


GP ONE GMBH

Cookie duration: Uses session cookies.

Data collected and processed: Device characteristics, Browsing and interaction
data, Non-precise location data, User-provided data, Privacy choices, IP
addresses

more

Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


LMI, INC.

Doesn't use cookies.

Data collected and processed: Device identifiers, Device characteristics,
Authentication-derived identifiers, Precise location data, Probabilistic
identifiers, Browsing and interaction data, Non-precise location data,
User-provided data, Privacy choices, IP addresses, Users’ profiles

more

Uses other forms of storage.


View details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


THE MEDIAGRID INC.

Cookie duration: 365 (days).

Data collected and processed: Device identifiers, Device characteristics,
Precise location data, Probabilistic identifiers, Browsing and interaction data,
Non-precise location data, Privacy choices, IP addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
Consent


MINDTAKE RESEARCH GMBH

Cookie duration: 180 (days).

Data collected and processed: Device identifiers, Device characteristics,
Probabilistic identifiers, Browsing and interaction data, IP addresses, Users’
profiles

more

Uses other forms of storage.


View details | Privacy policylaunch
Consent


CINT AB

Cookie duration: 730 (days).

Data collected and processed: Device identifiers, Device characteristics,
Browsing and interaction data, Privacy choices, IP addresses

more

Uses other forms of storage.


View details | Privacy policylaunch
Consent


GOOGLE ADVERTISING PRODUCTS

Cookie duration: 396 (days).

Data collected and processed: Device identifiers, Device characteristics,
Authentication-derived identifiers, Browsing and interaction data, Non-precise
location data, User-provided data, Privacy choices, IP addresses, Users’
profiles

more

Uses other forms of storage.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


GFK GMBH

Cookie duration: 730 (days).

Data collected and processed: Device identifiers, Device characteristics,
Authentication-derived identifiers, Browsing and interaction data, Non-precise
location data, User-provided data, Privacy choices, IP addresses, Users’
profiles

more

Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


REVJET

Cookie duration: 365 (days).

Data collected and processed: Device identifiers, Non-precise location data,
Privacy choices, IP addresses, Users’ profiles

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


PROTECTED MEDIA LTD

Doesn't use cookies.

Data collected and processed: Device identifiers, Device characteristics,
Probabilistic identifiers, Browsing and interaction data, IP addresses

more




View details | Privacy policylaunch
Legitimate interesthelp_outline


CLINCH LABS LTD

Cookie duration: 730 (days).

Data collected and processed: Device identifiers, Device characteristics,
Probabilistic identifiers, Browsing and interaction data, Non-precise location
data, Privacy choices, IP addresses, Users’ profiles

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


ORACLE DATA CLOUD - MOAT

Doesn't use cookies.

Data collected and processed: Non-precise location data, IP addresses

more




View details | Privacy policylaunch
Legitimate interesthelp_outline


HEARTS AND SCIENCE MÜNCHEN GMBH

Cookie duration: 60 (days).

Data collected and processed: IP addresses

more

Cookie duration resets each session.


View details | Privacy policylaunch
Consent


AMAZON ADVERTISING

Cookie duration: 396 (days).

Data collected and processed: Device identifiers, Device characteristics,
Authentication-derived identifiers, Browsing and interaction data, Non-precise
location data, Privacy choices, IP addresses, Users’ profiles

more

Cookie duration resets each session. Uses other forms of storage.


View details | Storage details | Privacy policylaunch
Consent


MOLOCO, INC.

Cookie duration: 730 (days).

Data collected and processed: Device identifiers, Device characteristics,
Non-precise location data, IP addresses

more

Cookie duration resets each session. Uses other forms of storage.


View details | Privacy policylaunch
ConsentLegitimate interesthelp_outline


ADTRIBA GMBH

Cookie duration: 730 (days).

Data collected and processed: Device identifiers, Device characteristics,
Authentication-derived identifiers, Browsing and interaction data, Non-precise
location data, Privacy choices, IP addresses

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


OBJECTIVE PARTNERS BV

Cookie duration: 90 (days).

Data collected and processed: Device identifiers

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent


ENSIGHTEN

Cookie duration: 1825 (days).

Data collected and processed: Device identifiers, Device characteristics,
Browsing and interaction data, Privacy choices, IP addresses

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Legitimate interesthelp_outline


EBAY INC

Cookie duration: 90 (days).

Data collected and processed: Device characteristics, Privacy choices, IP
addresses

more




View details | Storage details | Privacy policylaunch
Consent


METRIXLAB NEDERLAND B.V.

Cookie duration: 730 (days).

Data collected and processed: Device identifiers, Device characteristics,
Browsing and interaction data, User-provided data, IP addresses

more

Uses other forms of storage.


View details | Privacy policylaunch
Consent


HURRA COMMUNICATIONS GMBH

Cookie duration: 366 (days).

Data collected and processed: Device identifiers, Device characteristics,
Authentication-derived identifiers, Precise location data, Probabilistic
identifiers, Browsing and interaction data, Non-precise location data, IP
addresses

more

Cookie duration resets each session.


View details | Storage details | Privacy policylaunch
Consent

Ad partners

help_outline


AKAMAI

Privacy policylaunch
Consent


META

Privacy policylaunch
Consent


AUNICA

Privacy policylaunch
Consent


BOOKING.COM

Privacy policylaunch
Consent


C3 METRICS

Privacy policylaunch
Consent


IBM

Privacy policylaunch
Consent


EVIDON

Privacy policylaunch
Consent


ADACADO

Privacy policylaunch
Consent


INTELLIAD

Privacy policylaunch
Consent


DSTILLERY

Privacy policylaunch
Consent


MEDIAMATH

Privacy policylaunch
Consent


ZMS

Privacy policylaunch
Consent


OMNICOM MEDIA GROUP

Privacy policylaunch
Consent


RESONATE

Privacy policylaunch
Consent


SOJERN

Privacy policylaunch
Consent


TRADEDOUBLER AB

Privacy policylaunch
Consent


TRUSTARC

Privacy policylaunch
Consent


TRUEFFECT

Privacy policylaunch
Consent


TRAVEL DATA COLLECTIVE

Privacy policylaunch
Consent


ADVOLUTION.CONTROL

Privacy policylaunch
Consent


LIFESTREET

Privacy policylaunch
Consent


ADMAXIM

Privacy policylaunch
Consent


BATCH MEDIA

Privacy policylaunch
Consent


VODAFONE GMBH

Privacy policylaunch
Consent


MAGNITE

Privacy policylaunch
Consent


SCENESTEALER

Privacy policylaunch
Consent


NETQUEST

Privacy policylaunch
Consent


MANAGE.COM

Privacy policylaunch
Consent


CLOUDFLARE

Privacy policylaunch
Consent


SALESFORCE DMP

Privacy policylaunch
Consent


NETFLIX

Privacy policylaunch
Consent


EBUILDERS

Privacy policylaunch
Consent


APPLOVIN CORP.

Privacy policylaunch
Consent


FRACTIONAL MEDIA

Privacy policylaunch
Consent


RACKSPACE

Privacy policylaunch
Consent


MSI-ACI

Privacy policylaunch
Consent


ADMETRICS

Privacy policylaunch
Consent


NAVEGG

Privacy policylaunch
Consent


ADMEDO

Privacy policylaunch
Consent


KOCHAVA

Privacy policylaunch
Consent


MOBITRANS

Privacy policylaunch
Consent


ADEX

Privacy policylaunch
Consent


IMPACT

Privacy policylaunch
Consent


SPOTAD

Privacy policylaunch
Consent


AARKI

Privacy policylaunch
Consent


SFR

Privacy policylaunch
Consent


CABLATO

Privacy policylaunch
Consent


WAYSTACK

Privacy policylaunch
Consent


TRESENSA

Privacy policylaunch
Consent


GSKINNER

Privacy policylaunch
Consent


CUBED

Privacy policylaunch
Consent


OPTOMATON

Privacy policylaunch
Consent


ANALIGHTS

Privacy policylaunch
Consent


DENTSU AEGIS NETWORK

Privacy policylaunch
Consent


DIGISEG

Privacy policylaunch
Consent


HAENSEL AMS

Privacy policylaunch
Consent


BDSK HANDELS GMBH & CO. KG

Privacy policylaunch
Consent


MARKETING SCIENCE CONSULTING GROUP, INC.

Privacy policylaunch
Consent


DENTSU

Privacy policylaunch
Consent


KOBLER

Privacy policylaunch
Consent


WIDESPACE

Privacy policylaunch
Consent


VIMEO

Privacy policylaunch
Consent

Accept all



Confirm choices

Close




Application Security Check Up

Step 1 of 2

50%
Does someone in your organization write software?(Required)
Yes
No

What portion of your cyber risk is Application Security (AppSec)? (Select
one)(Required)
We over-focus on AppSec
We focus on AppSec to match the risk
We under-focus on AppSec

What are the biggest challenges you face implementing a robust AppSec strategy?
(Select all that apply)
Lack of budget
Insufficient skilled personnel
Complexity of integrating security into the development lifecycle
Resistance from development teams
Keeping up with evolving security threats
Lack of executive buy-in
Other (please specify)
Other


Which DevSecOps practices are widely used for actively developed projects (not
legacy) (Select all that apply):(Required)
Automated unit and functional tests for quality run in the pipeline with merge
blocking
Automated application security testing (AST) in development and (SAST/IAST) runs
in the pipeline
Automated AST tools to find vulnerabilities in the code you import (SCA) run in
the pipeline
Merge blocking at current policy level for AST checks
Secrets management so no secrets stored in source code repositories

How do you assess and mitigate risk of For NON actively developed products
(legacy) (Select all that apply):
In-production scans using DAST products like Qualys, Nessus, etc.
Periodic penetration testing
Periodic running of AST tools
Manual code reviews by security specialists
Use of third-party security assessment services
No assessment or mitigation effort is happening

How do you resolve the security issues found? (Select all that apply):(Required)
Findings are manually triaged
Findings are communicated to engineering via mostly manual processes
Finding above a certain severity automatically populate engineering backlogs
Service level agreements (SLAs) are enforced based on severity
An exception process exists to allow the business to accept risk
The exception process is rarely used and must be renewed periodically

Which best describes security training for your developers? (Select all that
apply)(Required)
Monthly
Quarterly
Annually
As part of onboarding
Just-in-time via integration with AST tools when a vulnerability is found
No formal training provided
View results


Δ



✓
Danke für das Teilen!
AddToAny
Mehr…


Notifications





previousnextslideshow





We'd like to show you notifications for the latest news and updates.


AllowCancel