Query Details

Black Suitbublupexfil

Query

# Rule : Detection of Data Exfiltration to Bublup.com

## Description
This detection rule identifies potential **data exfiltration** attempts by monitoring network connections to `bublup.com`, a legitimate file sharing and storage platform that has been **abused by threat actors**, including the **BlackSuit ransomware group**. During documented intrusions, adversaries used this service to upload exfiltrated data, often as part of double extortion campaigns.

Connections to `bublup.com` may be uncommon in enterprise environments. When observed—especially outside known business workflows—they may represent staging or exfiltration activity in the later stages of an attack.

- [The DFIR Report: Fake Zoom Ends in BlackSuit Ransomware](https://thedfirreport.com/2025/03/31/fake-zoom-ends-in-blacksuit-ransomware/)
- [Unit 42: BlackSuit Ransomware – Ignoble Scorpius](https://unit42.paloaltonetworks.com/threat-assessment-blacksuit-ransomware-ignoble-scorpius/)

## Detection Logic
- Monitors `DeviceNetworkEvents` where:
  - The `RemoteUrl` contains `"bublup.com"`.

## Tags
- Data Exfiltration
- Cloud Abuse
- Bublup
- BlackSuit Ransomware
- Post-Exploitation
- Suspicious Network Activity

## Search Query
```kql
DeviceNetworkEvents
| where RemoteUrl contains "bublup.com"
```

Explanation

This query is designed to detect potential data theft by monitoring network activity for connections to the website bublup.com. Bublup is a legitimate file-sharing platform, but it has been misused by cybercriminals, including the BlackSuit ransomware group, to upload stolen data. The query looks for any network events where the URL includes "bublup.com," as such connections are rare in business settings and could indicate malicious activity, especially if they occur outside normal business operations. The goal is to identify suspicious network behavior that might suggest data is being prepared for or is in the process of being exfiltrated.

Details

Ali Hussein profile picture

Ali Hussein

Released: April 9, 2025

Tables

DeviceNetworkEvents

Keywords

DeviceNetworkEventsRemoteUrl

Operators

wherecontains

Actions