Understanding the BRUTED Framework: A New Threat in Ransomware Tactics

Understanding the BRUTED Framework: A New Threat in Ransomware Tactics

Alex Cipher's Profile Pictire Alex Cipher 5 min read

The introduction of the BRUTED framework signifies a major shift in the tactics used by ransomware gangs, particularly the infamous Black Basta group. This tool automates the brute-forcing of VPNs and other edge networking devices, simplifying the initial access phase of ransomware operations. According to EclecticIQ researcher Arda Büyükkaya, BRUTED retrieves password candidates from a remote server and combines them with locally generated guesses, executing numerous authentication requests simultaneously. This capability allows attackers to efficiently target and compromise vulnerable systems, posing a substantial threat to organizations worldwide. By focusing on widely-used products like SonicWall NetExtender and Cisco AnyConnect, BRUTED can potentially impact a large number of organizations globally, making it a formidable tool in the arsenal of cybercriminals.

BRUTED: The Automated Brute-Forcing Framework

Development and Capabilities of BRUTED

The BRUTED framework, developed by the Black Basta ransomware gang, represents a significant advancement in the automation of brute-force attacks on VPNs and other edge networking devices. This tool is designed to streamline the initial network access phase of ransomware operations by automating the process of brute-forcing credentials. According to EclecticIQ researcher Arda Büyükkaya, BRUTED retrieves password candidates from a remote server and combines them with locally generated guesses to execute numerous authentication requests simultaneously using multiple CPU processes. This capability allows attackers to efficiently target and compromise vulnerable systems.

The framework is particularly adept at targeting a variety of VPN and remote-access products, including SonicWall NetExtender, Palo Alto GlobalProtect, Cisco AnyConnect, Fortinet SSL VPN, Citrix NetScaler (Citrix Gateway), Microsoft RDWeb (Remote Desktop Web Access), and WatchGuard SSL VPN. By focusing on these widely-used products, BRUTED can potentially impact a large number of organizations globally.

Technical Mechanisms and Evasion Techniques

BRUTED employs several sophisticated techniques to enhance its effectiveness and evade detection. One of its key features is the ability to extract Common Name (CN) and Subject Alternative Names (SAN) from the SSL certificates of targeted devices. This information is used to generate additional password guesses based on the target’s domain and naming conventions, increasing the likelihood of successful credential compromise.

To avoid detection, BRUTED utilizes a list of SOCKS5 proxies with domain names that obscure the attacker’s infrastructure. This intermediate layer helps mask the origin of the attack, making it more challenging for defenders to trace back to the source. Additionally, the framework uses specific request headers and user agents tailored to each targeted device, further complicating detection efforts by security systems.

Infrastructure and Operation Insights

The infrastructure supporting BRUTED is extensive and strategically located. The main servers are based in Russia and registered under Proton66 (AS 198953), as revealed by leaked chat logs from the ransomware gang. These logs also provide insight into the operational challenges faced by the group, such as server downtime due to unpaid fees, which were subsequently renewed. This glimpse into the day-to-day operations highlights the logistical considerations that ransomware gangs must manage to maintain their activities.

Impact and Scale of Attacks

The automation capabilities of BRUTED have significantly increased the scale and impact of Black Basta’s ransomware attacks. By efficiently breaching multiple networks simultaneously, the framework enhances the monetization opportunities for threat actors. Reports indicate that Black Basta has been using BRUTED since 2023 to conduct large-scale credential-stuffing and brute-force attacks on edge network devices, with several incidents reported throughout 2024 (BleepingComputer).

The ability to automate these attacks reduces the time and effort required to gain initial access to target networks, allowing the ransomware gang to focus on other aspects of their operations, such as data exfiltration and ransom negotiations. This efficiency makes BRUTED a valuable tool in the arsenal of cybercriminals seeking to exploit vulnerable systems.

Defense Strategies Against BRUTED

Given the advanced capabilities of BRUTED, organizations must adopt robust defense strategies to protect against such automated brute-force attacks. A key component of this defense is enforcing strong, unique passwords for all edge devices and VPN accounts. Implementing multi-factor authentication (MFA) is also crucial, as it can block access even when credentials are compromised.

Monitoring for authentication attempts from unknown locations and high-volume login failures can help identify potential brute-force attacks in progress. Additionally, organizations should implement rate-limiting and account lockout policies to further hinder attackers’ efforts. These measures, combined with regular security audits and employee training, can significantly reduce the risk of successful attacks by tools like BRUTED.

Conclusion

The BRUTED framework developed by Black Basta represents a formidable threat to organizations worldwide. Its automation capabilities and sophisticated evasion techniques make it a powerful tool for ransomware operations. By understanding the mechanisms and impact of BRUTED, organizations can better prepare and defend against this evolving threat landscape. Implementing robust defense strategies, such as enforcing strong passwords and multi-factor authentication, is crucial. Monitoring for unusual authentication attempts and implementing rate-limiting policies can further hinder attackers’ efforts. As cyber threats continue to evolve, staying informed and proactive is essential for safeguarding against tools like BRUTED (BleepingComputer).

References

  • Büyükkaya, A. (2024). Black Basta ransomware creates automated tool to brute-force VPNs. BleepingComputer