Press ESC to close

Black Basta Ransomware Uses MS Teams, Email Bombing to Spread Malware

Attribute Details
Threat Actors Black Basta ransomware group (aka UNC4393)
Campaign Overview Sophisticated social engineering campaign using email bombing, impersonation, and refined malware payloads targeting global organizations.
Target Regions Global
Methodology Social engineering via email bombing, impersonation (Microsoft Teams), and remote access tools to gain unauthorized access.
Product Targeted Organizational IT systems, employee credentials, sensitive data
Malware Reference Black Basta ransomware, Zbot, DarkGate
Tools Used QuickAssist, AnyDesk, TeamViewer, OpenSSH, custom DLL loaders, rundll32.exe
Vulnerabilities Exploited Social engineering (human factors), weak MFA implementation
TTPs Credential harvesting, lateral movement, data exfiltration, payload obfuscation, ransomware deployment
Attribution Associated with Black Basta ransomware operators (UNC4393)
Recommendations Stronger password policies, employee security awareness training, advanced security solutions, MFA enforcement
Source The Record

Read full article:https://hackread.com/black-basta-gang-ms-teams-email-bombing-malware/

Disclaimer: The above summary has been generated by an AI language model

Source: Hackread

Published on: December 10, 2024

Leave a Reply

Your email address will not be published. Required fields are marked *