Doubleface
By |Published On: August 23rd, 2024|2 min read|Categories: Dark Web, Data Exfiltration, Ransomware|

The group behind Doubleface ransomware has recently attacked the website of Donetsk International Airport, demonstrating its capability to execute high-profile cyberattacks.

Key Features and Pricing

Doubleface ransomware uses the C/C++ programming language. It also employs AES-128 and RSA-4096 encryption algorithms.

According to the seller, Doubleface ransomware is undetected by most major antivirus programs like Windows 10/11 Defender, Avast, Kaspersky and AVG. Its unpredictable behavior lets it bypass existing cybersecurity defenses.

Unlike some ransomware variants, Doubleface does not require a stub. But attackers must be careful in the management of the decryption key, because the wrong key will destroy all encrypted files.

The ransomware can work independently of an internet connection or network. It supports evasion of virtual machines, debugging tools and sandbox environments. These stealth features make it difficult to detect and mitigate.

This ransomware costs USD 500 per copy and can be bought in bulk. Also available for USD 10,000 is the complete source code for the ransomware. That opens up the code for cybercriminals to take it and perhaps modify it for their own purposes/purposes.

Notable Incidents

The group behind Doubleface ransomware is said to have attacked the website of Donetsk International Airport on August 10, 2024. This suggests that they might be involved in important or politically driven attacks.

Doubleface post airport takedown

Image: Doubleface posting their airport takedown on a messaging application

Secure Your Organization With BlackFog

The recent attack by the Doubleface ransomware at Donetsk Airport shows that we need stronger protection for important systems. Ransomware locks files, stopping people from using them until the attackers get paid. But paying them only makes them attack more.

BlackFog’s ADX solution prevents cyberattacks including ransomware and crucially stops data exfiltration attempts in real-time. It constantly watches network activity and quickly stops any unauthorized copying or stealing of data as it happens, 24/7, without the need for human interaction. This stops files from being locked in the first place.

Click here to learn more about how BlackFog can protect your business.

Share This Story, Choose Your Platform!

Related Posts

  • How ADX is integrated into the Enterprise

TAG Blog Series 2 – How ADX is Integrated into the Enterprise

September 16th, 2024|

Integrating Anti Data Exfiltration (ADX) solutions into an enterprise is crucial for effective cybersecurity. This article examines how BlackFog's commercial ADX solution enhances existing detection and response technologies by focusing on prevention and the shift-left paradigm. Using ransomware threats as an example, we illustrate how ADX mitigates device risks in typical business environments. Additionally, we explore how ADX supports the evolving needs of modern managed security service providers, ensuring comprehensive and proactive security measures.

  • Manufacturing Industry Surge 1

Manufacturing Industry Faces Surge in Ransomware Attacks in 2024

September 6th, 2024|

Ransomware attacks on the manufacturing industry are rising, with notable cases at MKS Instruments, Brunswick Corporation, Simpson Manufacturing, and The Clorox Company. Learn about the financial and operational impacts and why manufacturers are prime targets for cybercriminals.

  • TAG How ADX Supports and Implements Policy

TAG Blog Series 1 – How ADX Supports and Implements Policy

September 2nd, 2024|

Implementing Anti Data Exfiltration (ADX) solutions is critical for enterprise security. This article provides guidance on establishing effective ADX deployment policies, with a focus on aligning them with business objectives and threat perceptions. Highlighting BlackFog's ADX solution, it explores proactive strategies to prevent data exfiltration, offering valuable insights for practitioners aiming to enhance their security posture.