heroui logo

Blackbyte Ransomware Registry

Sigma Rules

View Source
Summary
The detection rule identifies the usage of specific registry key modifications associated with the BlackByte ransomware, which is known for its technique to escalate privileges on infected machines, facilitating lateral movement and the initiation of encryption processes. The rule focuses on three particular registry keys that, when set to a DWORD value of 1, indicate a significant change in system policies: `LocalAccountTokenFilterPolicy`, `EnableLinkedConnections`, and `LongPathsEnabled`. These modifications are leveraged by attackers to bypass security measures and enhance their operational capabilities within the exploited environment. Monitoring these registry changes is critical for early detection of potential ransomware activity and responding to infiltration attempts.
Categories
  • Windows
  • Endpoint
Data Sources
  • Windows Registry
Created: 2022-01-24