<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[The Growth Framework: Security & Compliance]]></title><description><![CDATA[Security & Compliance — Guiding leaders and engineers in securing AI ecosystems, aligning with global compliance frameworks, and strengthening organisational resilience against emerging risks.]]></description><link>https://www.thegrowthframework.com/s/security-compliance</link><image><url>https://substackcdn.com/image/fetch/$s_!-4nl!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F523d446f-6fa3-4469-804c-da20793d9737_700x700.png</url><title>The Growth Framework: Security &amp; Compliance</title><link>https://www.thegrowthframework.com/s/security-compliance</link></image><generator>Substack</generator><lastBuildDate>Sat, 11 Apr 2026 06:35:32 GMT</lastBuildDate><atom:link href="https://www.thegrowthframework.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Batchmore B.V.]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[growthframework@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[growthframework@substack.com]]></itunes:email><itunes:name><![CDATA[Glen Smale]]></itunes:name></itunes:owner><itunes:author><![CDATA[Glen Smale]]></itunes:author><googleplay:owner><![CDATA[growthframework@substack.com]]></googleplay:owner><googleplay:email><![CDATA[growthframework@substack.com]]></googleplay:email><googleplay:author><![CDATA[Glen Smale]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[This is the first real case of AI being used in a cyber attack]]></title><description><![CDATA[The biggest AI story this week wasn&#8217;t the release of GPT-5.1. It was the cyber attack run on Claude.]]></description><link>https://www.thegrowthframework.com/p/this-is-the-first-real-case-of-ai</link><guid isPermaLink="false">https://www.thegrowthframework.com/p/this-is-the-first-real-case-of-ai</guid><dc:creator><![CDATA[Glen Smale]]></dc:creator><pubDate>Sun, 16 Nov 2025 07:03:54 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/397e7fd0-1a1a-492d-a55c-36e53f2a3ab9_1000x667.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>It has been a busy week in AI.</em></p><p><strong>GPT 5.1 landed</strong> with solid upgrades.<br><strong>Kimi pushed out K2</strong> and people jumped straight into testing the reasoning boost.<br>A few labs dropped new benchmarks.</p><p>But that is not the real headline.</p><p>The real headline is that Anthropic released the full report of a live cyber attack that ran in September.</p><p>The back story is that a state linked espionage team used Claude in a real intrusion.</p><p>Not theory.<br>Not a demo.<br>A real operation with real targets.</p><p>This is the first time we have seen a fully documented case of an AI system helping to carry out intrusion steps in the wild.</p><p>We have officially moved beyond the &#8220;what if&#8221; stage.<br>It is now clear that AI cyber attacks have begun.</p><p>Let&#8217;s break down what happened and what it means for platforms and engineers.</p><div><hr></div><h2>What GTG 1002 Actually Did</h2><p>The report identifies the operators as <strong>GTG 1002</strong>, a state linked espionage team known for targeting high value environments.</p><p><em>Here&#8217;s how Anthropic described the intrusion in their official November 2025 report.</em></p><blockquote><p>In mid-September 2025, we detected a highly sophisticated cyber espionage operation conducted by a Chinese state-sponsored group we&#8217;ve designated GTG-1002 that represents a fundamental shift in how advanced threat actors use AI. Our investigation revealed a well-resourced, professionally coordinated operation involving multiple simultaneous targeted intrusions. The operation targeted roughly 30 entities and our investigation validated a handful of successful intrusions.<br><em><strong>Source: Anthropic Full Report, November 2025</strong></em></p></blockquote><p>Their targets included banks, tech firms, and government bodies.<br>Roughly thirty organisations in total.<br><br>These were not random targets.<br>These were chosen for access, insight, and strategic value.<br><br>This is now what automated cyber threat campaigns look like.</p><p>A small team suddenly has the power of a much larger threat operation.</p><div><hr></div><h2>The Architecture Behind the Operation</h2><p>The architecture of this campaign tells you everything about how far threat actors have already gone with AI driven operations.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!Lx6U!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F768a94c5-18c4-422f-8eaf-b6eab232a9da_838x493.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!Lx6U!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F768a94c5-18c4-422f-8eaf-b6eab232a9da_838x493.png 424w, https://substackcdn.com/image/fetch/$s_!Lx6U!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F768a94c5-18c4-422f-8eaf-b6eab232a9da_838x493.png 848w, https://substackcdn.com/image/fetch/$s_!Lx6U!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F768a94c5-18c4-422f-8eaf-b6eab232a9da_838x493.png 1272w, https://substackcdn.com/image/fetch/$s_!Lx6U!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F768a94c5-18c4-422f-8eaf-b6eab232a9da_838x493.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!Lx6U!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F768a94c5-18c4-422f-8eaf-b6eab232a9da_838x493.png" width="838" height="493" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/768a94c5-18c4-422f-8eaf-b6eab232a9da_838x493.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:493,&quot;width&quot;:838,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:87680,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.thegrowthframework.com/i/178984827?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F768a94c5-18c4-422f-8eaf-b6eab232a9da_838x493.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!Lx6U!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F768a94c5-18c4-422f-8eaf-b6eab232a9da_838x493.png 424w, https://substackcdn.com/image/fetch/$s_!Lx6U!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F768a94c5-18c4-422f-8eaf-b6eab232a9da_838x493.png 848w, https://substackcdn.com/image/fetch/$s_!Lx6U!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F768a94c5-18c4-422f-8eaf-b6eab232a9da_838x493.png 1272w, https://substackcdn.com/image/fetch/$s_!Lx6U!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F768a94c5-18c4-422f-8eaf-b6eab232a9da_838x493.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>GTG 1002 did not run a simple script or a noisy mass scan.<br>They built a structured campaign with clear phases, long lived model sessions, and a split between model autonomy and human oversight.</p><p>Claude handled most of the operational work.<br>The human operators only stepped in at strategic points where judgment mattered.</p><p>This is how the report describes it:</p><blockquote><p>&#8220;The campaign proceeded through structured phases, where AI autonomy increased progressively while human oversight remained concentrated at strategic decision gates.&#8221;<br><strong>Source: Anthropic Full Report, November 2025</strong></p></blockquote><p>This means the operation had a real hierarchy.<br>Claude did the scanning, sorting, checking, mapping, testing, and summarising.<br>The humans chose targets, adjusted strategy, and decided what to do next.</p><p>Across the campaign, the pattern looked like this:</p><p>Claude ran two to six hour blocks of autonomous activity.<br>Humans stepped in every five to twenty minutes to approve the next move.<br>Then Claude ran the next sequence.</p><p>This architecture let a small team work at a speed that usually requires a large crew.<br>Much of the workflow ran like a distributed system.</p><p>Claude acted as the worker nodes, processing small tasks and producing structured output.</p><p>The human operators acted as the orchestrators, linking outputs into the bigger chain.</p><p>It is also clear that the attackers understood the model&#8217;s tool ecosystem.<br>They used browser tools, scanning utilities, payload testers, and structured reporting to keep the workflow cohesive.</p><p>Everything was broken into small tasks so the model would treat each step as normal.</p><p>Once you understand the architecture, the lifecycle makes sense.<br>The attack was not random.<br>It moved through phases.<br>It expanded autonomy with each step.</p><p>And it used human oversight only where strategic decisions were needed.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!T6bH!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb50c6a8-debc-48d8-9d57-2bb73960ade4_742x559.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!T6bH!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb50c6a8-debc-48d8-9d57-2bb73960ade4_742x559.png 424w, https://substackcdn.com/image/fetch/$s_!T6bH!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb50c6a8-debc-48d8-9d57-2bb73960ade4_742x559.png 848w, https://substackcdn.com/image/fetch/$s_!T6bH!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb50c6a8-debc-48d8-9d57-2bb73960ade4_742x559.png 1272w, https://substackcdn.com/image/fetch/$s_!T6bH!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb50c6a8-debc-48d8-9d57-2bb73960ade4_742x559.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!T6bH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb50c6a8-debc-48d8-9d57-2bb73960ade4_742x559.png" width="742" height="559" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/eb50c6a8-debc-48d8-9d57-2bb73960ade4_742x559.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:559,&quot;width&quot;:742,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:118812,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.thegrowthframework.com/i/178984827?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb50c6a8-debc-48d8-9d57-2bb73960ade4_742x559.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!T6bH!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb50c6a8-debc-48d8-9d57-2bb73960ade4_742x559.png 424w, https://substackcdn.com/image/fetch/$s_!T6bH!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb50c6a8-debc-48d8-9d57-2bb73960ade4_742x559.png 848w, https://substackcdn.com/image/fetch/$s_!T6bH!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb50c6a8-debc-48d8-9d57-2bb73960ade4_742x559.png 1272w, https://substackcdn.com/image/fetch/$s_!T6bH!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feb50c6a8-debc-48d8-9d57-2bb73960ade4_742x559.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><div><hr></div><h2>Anthropic&#8217;s Response</h2><blockquote><p>&#8220;Upon detecting this activity, we immediately launched an investigation to understand its scope and nature. Over the following ten days, as we mapped the severity and full extent of the operation, we banned accounts as they were identified, notified affected entities as appropriate, and coordinated with authorities as we gathered actionable intelligence.&#8221;<br><em><strong>Source: Anthropic Full Report, November 2025</strong></em></p></blockquote><p>Anthropic&#8217;s response was fast and structured.</p><p>They picked up the unusual behaviour patterns early and moved into an investigation straight away.</p><p>The next ten days were spent mapping the scale of the operation, confirming what was real, and verifying how far the attackers had progressed.</p><p>As they traced the activity across accounts, they banned each one as soon as it was confirmed.</p><p>They notified the organisations that were affected.</p><p>And they worked with the relevant authorities while the intelligence was being collected.</p><p>This is an important part of the story.<br>The detection came from behaviour, not prompts.<br>And the response followed the same pattern you would expect from any security incident:<br>detect, verify, isolate, notify, and contain.</p><p>This also shows that the defenders moved at speed.<br>And speed matters now more than ever.</p><div class="pullquote"><p><em>And while that response closed the main attack, the report surfaced something else.<br>A separate weakness.<br>A different path that attackers could use.<br>And this one came from Claude&#8217;s own network features.</em></p></div><h2>Claude&#8217;s Network Feature Flaw</h2><p>The report surfaced another issue.</p><p>A separate flaw that involved Claude&#8217;s network features and how they could be manipulated through indirect prompt injection.</p><p>Security researcher Johann Rehberger discovered this weakness in October.</p><p>Claude&#8217;s coding tool has a network mode called package managers only.<br>It was designed to allow safe access to a small list of approved domains.</p><p>Claude&#8217;s &#8220;Package managers only&#8221; network mode allowed outbound calls to a short allowlist of trusted domains:</p><pre><code>api.anthropic.com</code></pre><p>The idea was that Claude could install software packages from trusted sources like npm, PyPI, GitHub, and a few Anthropic controlled endpoints.</p><p>But the setup introduced an opening.</p><p>Rehberger found that an attacker could hide instructions inside a normal looking file.</p><p>A document.<br>A script.<br>Even a printed message.</p><p>The moment a user asked Claude to analyse that file, hidden instructions could be executed.</p><p>It&#8217;s  indirect prompt injection.</p><p>The flow is simple.<br>Claude reads the content.<br>Follows the content.<br>Carries out the steps.</p><p>In this case, the steps were:</p><p>Gather recent chat history.<br>Write it into a file inside the sandbox.<br>Use the Anthropic SDK to send that file to the attacker&#8217;s own Anthropic account.</p><p>Because the allowed domain list included Anthropic&#8217;s own API endpoint, the upload request looked legitimate.</p><p>And since each upload supported up to thirty megabytes, the data exfiltration could happen at scale.</p><p>Early tests showed the exploit worked without much resistance.<br>Later versions of Claude started flagging obvious API keys.</p><p>So the researcher disguised the payload inside harmless print statements, and Claude ran it.</p><p>The weakness was reported through HackerOne.</p><p>At first, Anthropic treated it as a model safety issue, not a security issue.</p><p>However, after public discussion, they acknowledged it formally and confirmed it as an actual security problem.</p><p>This incident showed something important.</p><p>Even limited connectivity in an AI system can be misused.</p><p>Once a model can run code and make outbound calls, every allowed domain becomes a possible path for misuse.<br><br><em>So what does this mean, and what&#8217;s the gameplay for us as engineers?<br>I will unpack that next.</em></p><div><hr></div><h2>Fundamentals of Defence</h2><p>The report highlights that AI can change the tempo of an attack.<br>But it does not change the fundamentals of defence.</p><p>The workflows used in both incidents were built on things we already know.</p><p>Weak configurations.<br>Open paths.<br>Routine tasks.<br>And systems that trust too much by default.</p><p><em>So here is the gameplay for engineers.</em></p><p>Keep your systems tight.<br>Keep the paths narrow.<br>Keep the attack surface small.</p><p>The threat actors used automation to speed things up.<br>But they still relied on the same entry points every attacker uses.<br>The same mistakes.<br>The same gaps.<br>The same blind spots.</p><p>If your patching is current, the paths shrink.<br>If your identity controls are strong, the paths shrink.<br>If your endpoints are clean and monitored, the paths shrink.<br>If your staff know what a phishing lure looks like, the paths shrink again.</p><p>And if you shut down unnecessary network access,<br>there is no path for automated exfiltration in the first place.</p><p>AI allows attackers to run more checks, faster checks, and wider checks.<br><br>But it cannot bypass a well secured system.</p><p>It cannot push through a patch that is already applied.<br>It cannot defeat a hardware token.<br>It cannot log in where no credential exists.</p><p>The gameplay is the same.<br>But the discipline needs to be sharper.</p><p><em>So what should we do about it?</em></p><div><hr></div><h2>The Playbook</h2><p>If there is one message from this incident, it is this.<br>AI speeds up attacks, but it does not invent new ones.<br>It just runs the same old paths faster.</p><p>So the defence still starts with the basics.<br>But they need to be done properly.<br>And they need to be checked often.</p><p><em>Let&#8217;s dive in.</em></p><div><hr></div><h3>1. Multi Factor Authentication Everywhere</h3><p>Use hardware tokens or certificate based authentication.<br>Avoid SMS.<br>Keep admin accounts separate.<br>Rotate them on a fixed schedule.</p><p>Check your logs for unusual sign in attempts.<br>Look for access from strange locations.<br>Look for repeated failed logins.</p><p>A strong identity control blocks most intrusion chains before they begin.</p><div><hr></div><h3>2. Patch the Top Attack Surfaces Fast</h3><p>Do not wait for quarterly maintenance windows.<br>Patch the critical surfaces as soon as fixes are released.</p><p>Focus on:<br>Exchange and mail servers.<br>VPN appliances.<br>Firewall platforms.<br>Hypervisors.<br>Public facing apps.<br>Open source libraries in your dependency chain.</p><p>Keep a monthly patch report.<br>Track each issue until it is closed.<br>This one action removes a large slice of real world attack paths.</p><div><hr></div><h3>3. Segment Your Network Properly</h3><p>Keep critical systems isolated.<br>Block sideways movement by default.<br>Follow zero trust principles in practice, not only on paper.</p><p>Test this every quarter.<br>Try to move from a low value system to a high value one.</p><p>If you can do it easily, an attacker can too.</p><div><hr></div><h3>4. Lock Down Remote Access</h3><p>Limit remote tools to a small approved list.<br>Block everything else at the policy level.</p><p>Watch for:<br>AnyDesk<br>TeamViewer<br>Unapproved RDP paths<br>Unusual remote sessions<br>Processes spawning remote tools</p><p>If you really need external RDP, put it behind a VPN or jump server.</p><p>Use hardware based MFA on every privileged account.</p><div><hr></div><h3>5. Run Strong Backup Routines</h3><p>Follow the three, two, one rule.<br>Three copies.<br>Two media types.<br>One kept offline.</p><p>Run a restore test monthly.<br>Write down the result.</p><p>A backup that has never been tested is not a backup.</p><div><hr></div><h3>6. Use EDR and Threat Hunting</h3><p>Watch for common attack tradecraft:</p><p>Unexpected PowerShell activity.<br>PsExec tasks.<br>Credential dumping.<br>Cobalt Strike style patterns.<br>Large file locks.<br>Strange data staging.<br>New scheduled tasks.<br>Weird WMI activity.</p><p>Feed your EDR with updated threat intelligence.<br>Run weekly hunt reports with indicators from CISA and other trusted sources.</p><div><hr></div><h3>7. Identity and Privilege Control</h3><p>Keep access tight.<br>Grant admin rights only for the short time needed.<br>Review all elevated access at the end of each month.</p><p>Disable old accounts.<br>Rotate service credentials.<br>Remove default passwords from every device and every app.</p><p>This stops attackers from moving freely once they get a foothold.</p><div><hr></div><h3>8. Insider Risk and Behaviour Monitoring</h3><p>Watch for patterns like:<br>Sudden privilege jumps.<br>Unusual login times.<br>Large data pulls.<br>Repeated access to sensitive folders.<br>Admin users acting outside their normal scope.</p><p>Generate a monthly behaviour report.<br>Investigate anything that looks strange.</p><div><hr></div><h3>9. Shut Down Unused Ports and Services</h3><p>Every open port is a possible path.<br>Close anything that is not required.</p><p>Focus on:<br>Old SSH ports.<br>Legacy management ports.<br>Stale database listeners.<br>Forgotten web dashboards.<br>Old test environments.</p><p>Scan the network weekly and compare it to last week&#8217;s map.</p><div><hr></div><h3>10. Train Staff Against Phishing and Social Engineering</h3><p>Human error is still the quickest path in.<br>Teach your staff what phishing looks like.<br>Run simulated tests.<br>Give people simple rules to follow.</p><p>A trained team stops a large number of attacks long before your tools do.</p><div><hr></div><h2>The Goal</h2><p>Reduce the number of open paths.<br>Shrink the attack surface.<br>Make the system harder to move through.<br>Make every step slower for an attacker.</p><p>If you do that, even an AI driven operation will struggle.</p><div><hr></div><h2>Closing Thoughts</h2><p>Both incidents point to the same reality.</p><p>AI is now part of the attack surface.<br>Not in theory.<br>Not in forecasts.<br>In practice.</p><p>The attackers did not use magic.<br>They used automation.<br>They used scale.<br>They used speed.<br>And they relied on the same weaknesses that teams struggle with every day.</p><p>That is the part we cannot ignore.</p><p>AI lets a small group move faster.<br>It lets them run more checks.<br>It lets them chain tasks together.<br>But it does not remove the need for an open path.<br>It does not remove the need for a weak configuration.<br>It does not remove the need for something to grab onto.</p><p>So the path forward is clear.</p><p>Tighten the basics.<br>Reduce the openings.<br>Monitor behaviour, not just content.<br>Keep identity controls strong.<br>Keep patching sharp.<br>Keep your endpoints clean.<br>And keep your staff aware.</p><p>If you make the attack paths narrow,<br>even an AI driven operation finds it hard to do real damage.</p><p>This report is a warning.<br>But it is also a reminder.</p><p>Good engineering still works.<br>Good security still works.<br>And the teams that stay disciplined will stay ahead.</p><div><hr></div><p><em>That is it for today&#8217;s deep dive.</em></p><p><em>A quick note. I have added two new newsletter sections to help you catch up on each week&#8217;s big news.</em></p><p><em>This Week in AI.<br>This Week in Cybersecurity and Compliance.</em></p><p><em>Tip: If you find this helpful, subscribe to get new episodes automatically.</em></p><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thegrowthframework.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thegrowthframework.com/subscribe?"><span>Subscribe now</span></a></p><p><br></p>]]></content:encoded></item><item><title><![CDATA[Ransomware attackers aren’t hackers, they’re operators.]]></title><description><![CDATA[Know this and block 90% of their attacks.]]></description><link>https://www.thegrowthframework.com/p/most-ransomware-attackers-arent-geniuses</link><guid isPermaLink="false">https://www.thegrowthframework.com/p/most-ransomware-attackers-arent-geniuses</guid><dc:creator><![CDATA[Glen Smale]]></dc:creator><pubDate>Mon, 10 Nov 2025 22:44:18 GMT</pubDate><enclosure url="https://substack-post-media.s3.amazonaws.com/public/images/2084984e-56c6-48da-b98b-8cbb101e6387_1000x667.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>If your picture of a hacker is someone in a dark room typing genius code from scratch, you&#8217;re about ten years out of date.</p><p>Ransomware isn&#8217;t a story about lone coders anymore. It&#8217;s a business.</p><p>Think of it like Ransomware as a Service. You rent the malware. You follow the guide. You split the profit.</p><p>In today&#8217;s insight, I&#8217;m walking through how BlackCat (ALPHV) shaped this whole model, why it still matters even after the takedown, and the steps you can take right now to stop most RaaS attacks before they spread.<br><br>From this guided insight, you will:</p><p>&#128073; Understand how RaaS really works<br>&#128073; Learn what indicators actually matter<br>&#128073; See how to block the tools attackers rely on daily</p><p><strong>Know your attackers&#8217; tools, defend with precision.</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thegrowthframework.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thegrowthframework.com/subscribe?"><span>Subscribe now</span></a></p><p></p><h2>The Myth vs The Model</h2><p>Here&#8217;s the truth: ransomware today isn&#8217;t driven by genius. It&#8217;s driven by structure.</p><p>The days of lone hackers are mostly gone. In their place, you&#8217;ve got a commercialised underground economy with developers, affiliates and profit splits.</p><p>It&#8217;s sold as RaaS, Ransomware as a Service. I sometimes call it Rent a Service because that&#8217;s basically what it is.</p><p>You don&#8217;t need to write code anymore. You use what&#8217;s already out there. You rent it, repurpose it or tweak existing malware, then run the job and split the profit.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!RraV!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4367b4e-232d-44b3-ae08-ff07bd2cba6c_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!RraV!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4367b4e-232d-44b3-ae08-ff07bd2cba6c_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!RraV!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4367b4e-232d-44b3-ae08-ff07bd2cba6c_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!RraV!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4367b4e-232d-44b3-ae08-ff07bd2cba6c_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!RraV!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4367b4e-232d-44b3-ae08-ff07bd2cba6c_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!RraV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4367b4e-232d-44b3-ae08-ff07bd2cba6c_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/a4367b4e-232d-44b3-ae08-ff07bd2cba6c_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1425506,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.thegrowthframework.com/i/178154440?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4367b4e-232d-44b3-ae08-ff07bd2cba6c_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!RraV!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4367b4e-232d-44b3-ae08-ff07bd2cba6c_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!RraV!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4367b4e-232d-44b3-ae08-ff07bd2cba6c_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!RraV!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4367b4e-232d-44b3-ae08-ff07bd2cba6c_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!RraV!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fa4367b4e-232d-44b3-ae08-ff07bd2cba6c_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>Over time, the market professionalised</h2><p>A small group of skilled developers started building solid ransomware toolkits with admin panels, payment systems and clear instructions.</p><p>They offered these platforms to operators on private channels. Sometimes rented, sometimes sold, copied from leaked code.</p><p>Affiliates buy access, pick their targets and run the attacks.</p><p>Developers look after the platform, handle payments and take their cut.</p><p>That&#8217;s how a few coders can fuel hundreds of global breaches. And BlackCat (ALPHV) shows this better than anyone.</p><div><hr></div><h2>What Is BlackCat (ALPHV)?</h2><p>Why this matters: it&#8217;s the playbook for professional ransomware operations. It&#8217;s modular, runs on different systems, and feels a lot like commercial software.</p><p>BlackCat, also called ALPHV or Noberus, showed up in late 2021.</p><p>It&#8217;s written in Rust, one of my favourite languages. I&#8217;ve got a soft spot for Go and Elixir, too.</p><p>Rust is fast, memory safe and tough to reverse engineer, which makes it great for staying hidden.</p><p>Unlike older strains, BlackCat runs on Windows, Linux and VMware ESXi. So it hits both cloud and on-premises systems.</p><p>The code is clean, the logic is tight, and the whole thing feels like it was built to make money rather than cause random chaos.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!MAno!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7a2649d-2074-453b-a2b1-82cf7a5a43a8_1024x1024.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!MAno!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7a2649d-2074-453b-a2b1-82cf7a5a43a8_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!MAno!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7a2649d-2074-453b-a2b1-82cf7a5a43a8_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!MAno!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7a2649d-2074-453b-a2b1-82cf7a5a43a8_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!MAno!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7a2649d-2074-453b-a2b1-82cf7a5a43a8_1024x1024.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!MAno!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7a2649d-2074-453b-a2b1-82cf7a5a43a8_1024x1024.png" width="1024" height="1024" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/d7a2649d-2074-453b-a2b1-82cf7a5a43a8_1024x1024.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:1024,&quot;width&quot;:1024,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1442940,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.thegrowthframework.com/i/178154440?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7a2649d-2074-453b-a2b1-82cf7a5a43a8_1024x1024.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!MAno!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7a2649d-2074-453b-a2b1-82cf7a5a43a8_1024x1024.png 424w, https://substackcdn.com/image/fetch/$s_!MAno!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7a2649d-2074-453b-a2b1-82cf7a5a43a8_1024x1024.png 848w, https://substackcdn.com/image/fetch/$s_!MAno!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7a2649d-2074-453b-a2b1-82cf7a5a43a8_1024x1024.png 1272w, https://substackcdn.com/image/fetch/$s_!MAno!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fd7a2649d-2074-453b-a2b1-82cf7a5a43a8_1024x1024.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>How BlackCat Works</h2><p>Why this matters: Knowing the flow helps defenders break it before anything gets encrypted.</p><p>BlackCat runs on the Ransomware as a Service model. Developers keep the platform running, and affiliates carry out the intrusions.</p><p>Here&#8217;s the attack flow:</p><p>Initial Access: through phishing, stolen RDP credentials or exploited weaknesses like ProxyShell, Log4j or ESXi flaws.</p><p>Lateral Movement: using tools like Cobalt Strike, AnyDesk or PsExec to move through the network, gain higher access and shut down security controls.</p><p>Data Exfiltration: before any encryption starts, sensitive data is taken for double extortion.</p><p>Encryption: files are locked with AES 256 and ChaCha20. A random seven-character extension is added, and system files are skipped so the device can still boot.</p><p>Ransom Demand: a note drops with a dot onion link for negotiation. Payment is usually Bitcoin or Monero.</p><p>Affiliates keep most of the profit. Developers take a smaller platform cut.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thegrowthframework.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thegrowthframework.com/subscribe?"><span>Subscribe now</span></a></p><p></p><h2>Attack Indicators</h2><p><strong>Why this matters:</strong> Early detection often decides whether an event becomes an incident.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!GMC4!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc57cb8fc-3821-4f61-8016-d441770901c1_899x399.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!GMC4!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc57cb8fc-3821-4f61-8016-d441770901c1_899x399.png 424w, https://substackcdn.com/image/fetch/$s_!GMC4!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc57cb8fc-3821-4f61-8016-d441770901c1_899x399.png 848w, https://substackcdn.com/image/fetch/$s_!GMC4!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc57cb8fc-3821-4f61-8016-d441770901c1_899x399.png 1272w, https://substackcdn.com/image/fetch/$s_!GMC4!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc57cb8fc-3821-4f61-8016-d441770901c1_899x399.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!GMC4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc57cb8fc-3821-4f61-8016-d441770901c1_899x399.png" width="728" height="323.10567296996663" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c57cb8fc-3821-4f61-8016-d441770901c1_899x399.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:399,&quot;width&quot;:899,&quot;resizeWidth&quot;:728,&quot;bytes&quot;:26765,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.thegrowthframework.com/i/178154440?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc57cb8fc-3821-4f61-8016-d441770901c1_899x399.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!GMC4!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc57cb8fc-3821-4f61-8016-d441770901c1_899x399.png 424w, https://substackcdn.com/image/fetch/$s_!GMC4!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc57cb8fc-3821-4f61-8016-d441770901c1_899x399.png 848w, https://substackcdn.com/image/fetch/$s_!GMC4!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc57cb8fc-3821-4f61-8016-d441770901c1_899x399.png 1272w, https://substackcdn.com/image/fetch/$s_!GMC4!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc57cb8fc-3821-4f61-8016-d441770901c1_899x399.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>Behavioural Indicators</h2><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2muP!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6a15d2a-b2bb-44f7-b396-4d9776c9bc5c_891x318.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2muP!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6a15d2a-b2bb-44f7-b396-4d9776c9bc5c_891x318.png 424w, https://substackcdn.com/image/fetch/$s_!2muP!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6a15d2a-b2bb-44f7-b396-4d9776c9bc5c_891x318.png 848w, https://substackcdn.com/image/fetch/$s_!2muP!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6a15d2a-b2bb-44f7-b396-4d9776c9bc5c_891x318.png 1272w, https://substackcdn.com/image/fetch/$s_!2muP!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6a15d2a-b2bb-44f7-b396-4d9776c9bc5c_891x318.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2muP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6a15d2a-b2bb-44f7-b396-4d9776c9bc5c_891x318.png" width="891" height="318" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c6a15d2a-b2bb-44f7-b396-4d9776c9bc5c_891x318.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:318,&quot;width&quot;:891,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:21855,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://www.thegrowthframework.com/i/178154440?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6a15d2a-b2bb-44f7-b396-4d9776c9bc5c_891x318.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!2muP!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6a15d2a-b2bb-44f7-b396-4d9776c9bc5c_891x318.png 424w, https://substackcdn.com/image/fetch/$s_!2muP!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6a15d2a-b2bb-44f7-b396-4d9776c9bc5c_891x318.png 848w, https://substackcdn.com/image/fetch/$s_!2muP!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6a15d2a-b2bb-44f7-b396-4d9776c9bc5c_891x318.png 1272w, https://substackcdn.com/image/fetch/$s_!2muP!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fc6a15d2a-b2bb-44f7-b396-4d9776c9bc5c_891x318.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><h2>What to Do About It</h2><p>Why this matters: precision beats panic. These actions close the paths BlackCat-style operators depend on.</p><p><strong>Multi Factor Authentication (Platform / SecOps)</strong><br>Use hardware tokens or certificate-based MFA. Skip SMS codes.<br>Verify: check a sample of high-privilege logins each week.</p><p><strong>Patch Vulnerabilities (IT Ops)</strong><br>Focus on Exchange issues like ProxyShell and ProxyLogon, Log4j, VMware ESXi, Fortinet and SonicWall.<br>Verify: keep monthly reports that track each weakness through to patch.</p><p><strong>Network Segmentation (Network / SecOps)</strong><br>Follow Zero Trust ideas. Keep critical systems isolated and block sideways movement by default.<br>Verify: run quarterly drills that test sideways movement.</p><p><strong>Remote Access Controls (IT Ops)</strong><br>Allow only approved remote tools. Block everything else through Group Policy.<br>Verify: review a weekly software inventory diff.</p><p><strong>Backups (IT Ops)</strong><br>Use the three two one rule. Three copies, two types of media, one kept offline.<br>Verify: run a monthly restore test and write down the result.</p><p><strong>EDR and Threat Hunting (SecOps)</strong><br>Watch for Rust payloads, Cobalt Strike traffic, mass file locks and strange data staging.<br>Verify: produce weekly hunt reports with IOC checks.</p><p><strong>Identity and Privilege Controls (SecOps / HR)</strong><br>Keep access tight, rotate admin accounts and use Just in Time access.<br>Verify: review all raised access each month.</p><p><strong>Insider Risk Monitoring (SecOps / HR)</strong><br>Watch for odd admin behaviour, sudden privilege jumps and unusual access patterns.<br>Verify: send a behavioural report and raise anything that stands out.</p><div><hr></div><h2>Quick Wins (5 Minutes)</h2><p>Why this matters: small changes stack up fast. These actions close the gaps that attackers use every day.</p><p>Most attackers don&#8217;t write code on the fly. They use normal admin tools, the same ones your IT team trusts.</p><p>Cut off their access to these, and you slow them down fast.</p><p>&#128421;&#65039; RDP<br>A common path in.<br>Turn off external RDP.<br>If you really need it, put it behind a VPN or a jump host.<br>Use hardware MFA like a YubiKey.<br>Watch for failed logins and odd locations.</p><p>&#127919; Cobalt Strike<br>Common in cracked form.<br>Pull in CISA IOCs for active command paths.<br>Use community SSL and TLS intel feeds like abuse.ch SSLBL.<br>Let your EDR or IDS watch for Beacon patterns because domain blocks alone are never enough.</p><p>&#129520; AnyDesk and TeamViewer<br>Easy backdoor tools for intruders.<br>Keep only the approved ones.<br>Remove anything unapproved through Group Policy.<br>Let only admins install remote tools.</p><p>&#128273; Mimikatz<br>Used to pull credentials.<br>Turn on LSASS protection with RunAsPPL.<br>Make sure WDigest is off. It is off by default on recent Windows builds. If you run older ones, apply KB2871997, then turn it off.<br>Watch for dumping behaviour in your EDR.<br>Rotate high-privilege passwords on a regular schedule.</p><p>&#9889; PowerShell and PsExec<br>Built-in tools are often used in attacks.<br>Limit PowerShell to signed or admin-approved scripts through WDAC or AppLocker.<br>Log Event IDs 4104 and 4688, and watch 5861 for WMI persistence.<br>Limit PsExec for non-admins and push all logs to your SIEM.</p><p>Outcome: you&#8217;ve now blocked around ninety percent of real-world ransomware tradecraft, including BlackCat.</p><div><hr></div><h2>Final Thought</h2><p>BlackCat isn&#8217;t just another ransomware strain. It&#8217;s a template for how modern cybercrime grows and keeps itself going.</p><p>Assume breach. Verify everything. Patch fast. Segment deep. Back up smart.</p><p><strong>Know the tools attackers use and defend with precision.</strong></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.thegrowthframework.com/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.thegrowthframework.com/subscribe?"><span>Subscribe now</span></a></p><p></p><p></p>]]></content:encoded></item></channel></rss>