Analyzing WhisperGate and BlackCat Malware Methodology and Threat Perspective

The increasing use of powerful evasive ransomware malware in cyber warfare and targeted attacks is a persistent and growing challenge for nations, corporations, and small and medium-sized enterprises. This threat is evidenced by the emergence of the WhisperGate malware in cyber warfare, which target...

Full description

Saved in:
Bibliographic Details
Published inInternational Journal of Advanced Computer Science and Applications Vol. 14; no. 4; pp. 504 - 519
Main Authors Nicho, Mathew, Yadav, Rajesh, Singh, Digvijay
Format Publication Journal Article
LanguageEnglish
Published England - United Kingdom The Science and Information (SAI) Organization 2023
Science and Information (SAI) Organization Limited
Subjects
Online AccessGet full text
ISSN2158-107X
2156-5570
2156-5570
DOI10.14569/IJACSA.2023.0140456

Cover

More Information
Summary:The increasing use of powerful evasive ransomware malware in cyber warfare and targeted attacks is a persistent and growing challenge for nations, corporations, and small and medium-sized enterprises. This threat is evidenced by the emergence of the WhisperGate malware in cyber warfare, which targets organizations in Ukraine to render targeted devices inoperable, and the BlackCat malware, which targets large organizations by encrypting files. This paper outlines a practical approach to malware analysis using WhisperGate and BlackCat malware as samples. It subjects them to heuristic-based analysis techniques, including a combination of static, dynamic, hybrid, and memory analysis. Specifically, 12 tools and techniques were selected and deployed to reveal the malware’s innovative stealth and evasion capabilities. This methodology shows what techniques can be applied to analyze critical malware and differentiate samples that are variations of known threats. The paper presents currently available tools and their underlying approaches to performing automated dynamic analysis on potentially malicious software. The study thus demonstrates a practical approach to carrying out malware analysis to understand cybercriminals’ behavior, techniques, and tactics.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:2158-107X
2156-5570
2156-5570
DOI:10.14569/IJACSA.2023.0140456