Arabic Arabic Chinese (Simplified) Chinese (Simplified) Dutch Dutch English English French French German German Italian Italian Portuguese Portuguese Russian Russian Spanish Spanish
| (844) 627-8267

Black Basta Ransomware Group Actively Targeting U.S. Companies: What You Need to Know | #hacking | #cybersecurity | #infosec | #comptia | #pentest | #ransomware


The Black Basta ransomware group is actively targeting U.S.-based companies using QakBot malware to create a first point of entry and move laterally within organizations’ networks. According to reports, several Black Basta infections using QakBot began on November 14, 2022. Here’s what we know.

Who is Black Basta?

Black Basta, which emerged in April 2022, specifically targets organizations in the U.S., Canada, United Kingdom, Australia and New Zealand. The group employs double extortion to steal sensitive data from targeted companies, then use it as leverage to extort cryptocurrency payments by threatening to release the stolen information.

What is QakBot?

QakBot (also called QBot or Pinkslipbot) is a banking trojan first discovered in 2007. The information-stealing malware helps threat actors abscond with financial data, browser information, keystrokes and credentials.

This is not the first time Black Basta has been observed using QakBot. Last month, security researchers also disclosed similar attacks that entailed the use of QakBot to deliver the Brute Ratel C4 framework, and was leveraged to drop Cobalt Strike.

This recent Black Basta intrusion activity cuts out Brute Ratel C4 from the equation, instead using QakBot to directly distribute Cobalt Strike on several machines in the infected environment. The attack chain commences with a spear-phishing email that has a malicious disk image file that kickstarts the execution of QBot, which connects to a remote server to retrieve the Cobalt Strike payload.

What kind of impacts have we seen from Black Basta?

Black Basta remains a highly active ransomware actor and has successfully targeted 25 companies in October 2022 alone, putting it behind LockBit, Karakurt and BlackCat.

What is Nuspire doing?

Nuspire actively threat hunts for indications of compromise (IoCs) within client environments.

What should I do?

We recommend you implement precautionary measures to prevent and detect Black Basta ransomware, including using anti-ransomware or anti-malware programs. Additionally, make sure you patch and update your systems to the latest version. Lastly, establish regular backups of your files to a remote server, and implement organizational firewalls, proxies, web filtering and mail filtering.

The post Black Basta Ransomware Group Actively Targeting U.S. Companies: What You Need to Know appeared first on Nuspire.

*** This is a Security Bloggers Network syndicated blog from Nuspire authored by Team Nuspire. Read the original post at: https://www.nuspire.com/blog/black-basta-ransomware-group-actively-targeting-u-s-companies-what-you-need-to-know/

——————————————————–


Click Here For The Original Source.

National Cyber Security

FREE
VIEW