Press ESC to close

Ransomware Diaries Volume 6: Lie to me. A Bassterlord Ransomware Story

 

Category Details
Threat Actors Bassterlord (also known as AL3xL7, Fisheye, Sinner911)
Campaign Overview Involved in ransomware operations, specifically with National Hazard Agency (NHA) and LockBit
Target Regions (Or Victims) Companies worldwide, primarily in Russia and Ukraine
Methodology HUMINT engagements, OSINT research, comparison of known events and threat data
Product Targeted Ransomware (LockBit, REvil, Hive, RansomEXX, etc.)
Malware Reference LockBit ransomware, other affiliated ransomware groups
Tools Used OSINT tools, Maltego, email tracking, geolocation analysis
Vulnerabilities Exploited No specific vulnerabilities mentioned
TTPs Use of aliases, leveraging stolen identities, social engineering, working with multiple gangs
Attribution Bassterlord and Ivan Kondratyev are the same person based on evidence (e.g., passport, IP data)
Recommendations Ongoing vigilance against ransomware, collaboration with law enforcement
Source Analyst1

Read full article: https://analyst1.com/ransomware-diaries-volume-6-lie-to-me-a-bassterlord-ransomware-story/

Disclaimer: The above summary has been generated by an AI language model

Source: Analyst1

Published on: November 14, 2024

Leave a Reply

Your email address will not be published. Required fields are marked *