The Black Shrantac ransomware group, active since September 2025, has established itself as a formidable threat to a wide range of industries, including manufacturing and the public sector. A report from Marlink outlines the group's modus operandi, which centers on a double extortion model combined with sophisticated evasion techniques. The group gains initial access by exploiting known critical vulnerabilities, such as CVE-2024-3400 in Palo Alto Networks PAN-OS, then uses living-off-the-land (LOTL) tactics to remain undetected. After exfiltrating sensitive data, they deploy ransomware and pressure victims with a dual threat: pay to decrypt files and pay to prevent the public release of stolen data on their Tor-based leak site.
Black Shrantac operates opportunistically, without a clear focus on a single industry, but their tactics are particularly dangerous for industrial environments where operational uptime is critical.
CVE-2024-3400, a maximum-severity command injection flaw in PAN-OS GlobalProtect gateways. This gives them a direct foothold into the network perimeter.The double extortion model used by Black Shrantac places victims in an extremely difficult position. Even if they can restore from backups, the threat of having sensitive corporate data, intellectual property, or customer information leaked publicly creates immense pressure to pay the ransom. The group's use of LOTL techniques makes detection challenging for traditional signature-based antivirus, as they are using trusted tools for malicious purposes. This stealth allows them to dwell in the network longer, ensuring they can exfiltrate the most valuable data before revealing their presence with the ransomware deployment.
For industrial environments, the impact is magnified. An attack that encrypts systems controlling manufacturing processes or other operational technology (OT) can lead to complete production halts, safety risks, and massive financial losses.
PsExec.exe being used to move between workstations when that is not standard practice for your IT team.CVE-2024-3400 in firewall logs, followed by suspicious internal RDP connections or large data transfers to external destinations.CVE-2024-3400 highlights the necessity of immediately patching critical vulnerabilities in internet-facing devices.PsExec to only authorized users and systems. Constrain PowerShell execution policies to prevent unsigned scripts from running.Immediately patching critical vulnerabilities like CVE-2024-3400 in perimeter devices is the most effective way to prevent initial access.
Use application control and script blocking to prevent the abuse of legitimate tools like PowerShell and PsExec for malicious purposes.
Crucial for industrial environments to separate IT and OT networks, preventing ransomware from spreading to critical control systems.
Strictly controlling and monitoring privileged accounts makes it harder for attackers to move laterally and access sensitive data.
To counter Black Shrantac's heavy reliance on living-off-the-land (LOTL) techniques, organizations must control the execution of legitimate tools. Application allowlisting is a powerful defense. By creating a policy that only permits known, approved applications to run, you can block attackers from using tools like PsExec or other dual-use utilities for lateral movement. For PowerShell, which is a common LOTL tool, configure it to run in Constrained Language Mode and require all scripts to be digitally signed. This prevents attackers from running arbitrary malicious scripts. This approach moves security from a reactive, signature-based model to a proactive, 'default-deny' posture that is highly effective against fileless and LOTL attacks.
Given the threat to industrial environments, robust network segmentation is paramount. Broadcast Domain Isolation, a form of network segmentation, is crucial for separating the corporate (IT) network from the operational technology (OT) network. Create a demilitarized zone (DMZ) between IT and OT, and enforce strict access control lists (ACLs) on the firewall, allowing only necessary and authorized traffic to pass. This prevents a ransomware infection that starts on an IT system (e.g., via a phishing email) from spreading laterally to the sensitive industrial control systems. This isolation contains the impact of an attack, protecting physical processes from digital threats and is a foundational principle of ICS/OT security.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats