Press ESC to close

BLACK BASTA : RANSOMWARE

CategoryDetails
Threat ActorsBlack Basta (Ransomware-as-a-Service Group)
Campaign OverviewOperates via phishing, vulnerability exploitation, social engineering (Microsoft Teams impersonation). Targets include various industries globally. Uses double extortion (data theft + ransomware).
Target RegionsGlobal; major attacks in sectors like healthcare, finance, construction, manufacturing, retail, and entertainment.
MethodologySpam emails followed by direct Microsoft Teams contact; masquerades as IT help desk. Leverages remote desktop software (e.g., AnyDesk, Quick Assist). Deploys payloads systematically: AntispamConnectUS.exe (SystemBC) → Cobalt Strike.
Product TargetedMicrosoft Teams; endpoint vulnerabilities exploited.
Malware ReferenceSystemBC (proxy malware/RAT), Cobalt Strike (used for lateral movement and remote control).
Tools UsedAnyDesk, Quick Assist, BITSAdmin, Qakbot, PowerShell, RClone, Cobalt Strike, SystemBC, Splashtop, EvilProxy, Netcat, WinSCP, and others.
Vulnerabilities ExploitedMicrosoft Teams external communication setup, user susceptibility to phishing, and outdated systems/applications.
TTPs (MITRE)Initial Access (T1566, T1190), Execution (T1059.001, T1047), Persistence (T1543.003), Defense Evasion (T1112, T1497), Credential Access (T1003), Lateral Movement (T1570), Impact (T1486).
AttributionNotable attacks since April 2022; over 500 organizations targeted globally. Associated with the use of SystemBC in campaigns alongside other malware families.
RecommendationsStrategic: Maintain secure backups, adopt zero-trust architecture, enable MFA. Management: Develop breach prevention plans, invest in employee cybersecurity training. Tactical: Regularly update software, monitor/block IOCs, implement Sigma rules for anomaly detection.
SourceCYFIRMA

Read full article : Read More

Disclaimer: The above summary has been generated by an AI language model.

Leave a Reply

Your email address will not be published. Required fields are marked *