Skip to content

Commit 2dfad3c

Browse files
author
Michael Butt
committed
Update titles, menus, and add tags to simplify finding infrastructure setup
1 parent 458a52c commit 2dfad3c

11 files changed

Lines changed: 52 additions & 8 deletions

File tree

Enterprise/cl0p/README.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,10 @@ The [Resources Folder](./Resources/) contains the emulated software source code.
2020
All other pre-built executables have been removed. To rebuild the binaries,
2121
follow the documentation for the respective binary.
2222

23+
#### Infrastructure Configuration
24+
25+
The [Resources/setup folder](./Resources/setup/) contains the infrastructure setup, including Terraform, Ansible, and related configurations and code.
26+
2327
### Emulation Key Software 💻
2428

2529
- [SDBbot](./Resources/sdbbot/)
Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,11 @@
1-
# CL0P, LockBit, DPRK and Standalone Protections Setup Information
1+
---
2+
tags: [infrastructure, terraform, setup, ansible, enterprise2024]
3+
---
4+
5+
# Infrastructure - CL0P, LockBit, DPRK and Standalone Protections Setup Information
26

37
## Infrastructure Configuration
48

59
The CL0P, DPRK, and LockBit adversaries as well as the Protections micros share an infrastructure configuration.
610

7-
See the [setup documentation](../../../cl0p/Resources/setup/README.md) for the [CL0P](../../../cl0p/Resources/setup/README.md) adversary infrastructure setup for guidance on setting up the shared infrastructure configuration.
11+
See the [setup documentation](../../../cl0p/Resources/setup/README.md) for the [CL0P](../../../cl0p/Resources/setup/README.md) adversary infrastructure setup for guidance on setting up the shared infrastructure configuration.

Enterprise/lockbit/README.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,10 @@ The [Resources Folder](./Resources/) contains the emulated software source code.
2020
All other pre-built executables have been removed. To rebuild the binaries,
2121
follow the documentation for the respective binary.
2222

23+
#### Infrastructure Configuration
24+
25+
The [Resources/setup folder](./Resources/setup/) contains the infrastructure setup, including Terraform, Ansible, and related configurations and code.
26+
2327
### Emulation Key Software 💻
2428

2529
- [Firepwd](./Resources/firepwd/)
Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,11 @@
1-
# CL0P, LockBit, DPRK and Standalone Protections Setup Information
1+
---
2+
tags: [infrastructure, terraform, setup, ansible, enterprise2024]
3+
---
4+
5+
# Infrastructure - CL0P, LockBit, DPRK and Standalone Protections Setup Information
26

37
## Infrastructure Configuration
48

59
The CL0P, DPRK, and LockBit adversaries as well as the Protections micros share an infrastructure configuration.
610

7-
See the [setup documentation](../../../cl0p/Resources/setup/README.md) for the [CL0P](../../../cl0p/Resources/setup/README.md) adversary infrastructure setup for guidance on setting up the shared infrastructure configuration.
11+
See the [setup documentation](../../../cl0p/Resources/setup/README.md) for the [CL0P](../../../cl0p/Resources/setup/README.md) adversary infrastructure setup for guidance on setting up the shared infrastructure configuration.

Enterprise/protections/2024/README.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -28,6 +28,10 @@ The [Resources Folder](./Resources/) contains the emulated software source code.
2828
All other pre-built executables have been removed. To rebuild the binaries,
2929
follow the documentation for the respective binary.
3030

31+
#### Infrastructure Configuration
32+
33+
The [Resources/setup folder](./Resources/setup/) contains the infrastructure setup, including Terraform, Ansible, and related configurations and code.
34+
3135
### Protections Micro Walkthrough
3236

3337
- [Ransomware Protections Micros](./Emulation_Plan/ER6_Ransomware_Protections.md): Step by step

Enterprise/protections/2024/Resources/setup/README.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,7 @@
1+
---
2+
tags: [infrastructure, terraform, setup, ansible, enterprise2024]
3+
---
4+
15
# CL0P, LockBit, DPRK and Standalone Ransomware Protections Setup Information
26

37
## Infrastructure Configuration

ManagedServices/alphv_blackcat/README.md

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ Based on open-source intelligence, the MITRE ATT&CK® Evaluations team create
1212

1313
ALPHV BlackCat, also known as Noberus, was a prolific Russian-speaking, ransomware-as-a-service (RaaS) group that emerged in 2021 and was linked to BlackMatter, DarkSide, REvil, and other RaaS groups [1](https://www.ic3.gov/Media/News/2022/220420.pdf). ALPHV BlackCat utilized ransomware coded in Rust, allowing for enhanced performance, flexibility, and cross-platform capabilities. During it's tenure, ALPHV BlackCat consistently upgraded its tooling and tradecraft, with the last variant, Sphynx, rewritten with enhanced defense evasion capabilities, according to the group [2](https://twitter.com/vxunderground/status/1649094229413761030), [3](https://aspr.hhs.gov/cyber/Documents/stopransomware-508.pdf). The group is alleged to have targeted over a thousand victims across the globe [4](https://www.state.gov/reward-for-information-alphv-blackcat-ransomware-as-a-service/). In December 2023, The United States (U.S.) Department of Justice announced they had disrupted group operations and developed an decryption tool for victims [5](https://www.justice.gov/opa/pr/justice-department-disrupts-prolific-alphvblackcat-ransomware-variant). The group announced it was removing restrictions previously placed on affiliates, and the most recent targets included [MGM Resorts](https://blog.morphisec.com/mgm-resorts-alphv-spider-ransomware-attack) and [Change Healthcare](https://www.reuters.com/technology/cybersecurity/cyber-security-outage-change-healthcare-continues-sixth-straight-day-2024-02-26/) in March 2024. Following the Change Healthcare incident, the Department of State issued a [reward offer](https://www.state.gov/rewards-for-justice-reward-offer-for-information-on-alphv-blackcat-linked-cyber-actors-targeting-u-s-critical-infrastructure/) for information on the group due to its targeting of U.S. Critical Infrastructure.
1414

15-
# Quick Links
15+
## Quick Links
1616

1717
### Resources
1818

@@ -21,6 +21,10 @@ The [Resources Folder](./Resources/) contains the emulated software source code.
2121
All other pre-built executables have been removed. To rebuild the binaries,
2222
follow the documentation for the respective binary.
2323

24+
#### Infrastructure Configuration
25+
26+
The [Resources/setup folder](./Resources/setup/) contains the infrastructure setup, including Terraform, Ansible, and related configurations and code.
27+
2428
### Emulation Key Software 💻
2529

2630
- [BlackCat ransomware](./Resources/blackcat/)

ManagedServices/alphv_blackcat/Resources/setup/README.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,10 +1,14 @@
1-
# ALPHV BlackCat and menuPass Setup Information
1+
---
2+
tags: [infrastructure, terraform, setup, ansible, managedservices2023]
3+
---
4+
5+
# Infrastructure - ALPHV BlackCat and menuPass Setup Information
26

37
## Infrastructure Configuration
48

59
For guidance on setting up the overall infrastructure used for emulation of ALPHV BlackCat and menuPass, please see [Getting Started](./GettingStarted.md). This includes both the victim hosts as well as the attacker platform configuration.
610

7-
**NOTE**: Access to an AWS account with permissions to create required resources, a basic understanding of Terraform, Ansible, AWS, and AWS billing are considered prerequisites to deploy the infrastructure configuration.
11+
**NOTE**: Access to an AWS account with permissions to create required resources, a basic understanding of Terraform, Ansible, AWS, and AWS billing are considered prerequisites to deploy the infrastructure configuration.
812

913
## Infrastructure Overview
1014

ManagedServices/menupass/README.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,10 @@ The [Resources Folder](./Resources/) contains the emulated software source code.
2727
All other pre-built executables have been removed. To rebuild the binaries,
2828
follow the documentation for the respective binary.
2929

30+
#### Infrastructure Configuration
31+
32+
The [Resources/setup folder](./Resources/setup/) contains the infrastructure setup, including Terraform, Ansible, and related configurations and code.
33+
3034
### Emulation Key Software 💻
3135

3236
- [SigLoader](./Resources/SigLoader/)

ManagedServices/menupass/Resources/README.md

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,7 @@
1+
---
2+
tags: [infrastructure, terraform, setup, ansible, managedservices2023]
3+
---
4+
15
# Resources
26

37
The Resources directory contains the following:

0 commit comments

Comments
 (0)