flashpoint.io Open in urlscan Pro
2606:4700::6812:fe2  Public Scan

URL: https://flashpoint.io/blog/understanding-black-basta-ransomware/
Submission: On May 29 via api from TR — Scanned from DE

Form analysis 3 forms found in the DOM

GET https://flashpoint.io/

<form role="search" method="get" id="searchBox" class="searchbox" action="https://flashpoint.io/">
  <input type="search" placeholder="Search for topics, resources and solutions" value="" name="s" required="">
  <button type="submit" form="searchBox" class="search-submit"><img src="https://flashpoint.io/wp-content/themes/flashpoint/img/icon-search.svg" type="image/svg+xml"></button>
</form>

GET https://flashpoint.io/

<form role="search" method="get" id="searchScrollBox" class="searchbox" action="https://flashpoint.io/">
  <input type="search" placeholder="What do you want to search for?" value="" name="s" required="">
  <button type="submit" form="searchScrollBox" class="search-submit"><img src="https://flashpoint.io/wp-content/themes/flashpoint/img/icon-search.svg" type="image/svg+xml"></button>
</form>

POST //translate.googleapis.com/translate_voting?client=te

<form id="goog-gt-votingForm" action="//translate.googleapis.com/translate_voting?client=te" method="post" target="votingFrame" class="VIpgJd-yAWNEb-hvhgNd-aXYTce"><input type="text" name="sl" id="goog-gt-votingInputSrcLang"><input type="text"
    name="tl" id="goog-gt-votingInputTrgLang"><input type="text" name="query" id="goog-gt-votingInputSrcText"><input type="text" name="gtrans" id="goog-gt-votingInputTrgText"><input type="text" name="vote" id="goog-gt-votingInputVote"></form>

Text Content

 * Platform
   Products
      
    * Flashpoint Ignite
      Cyber Threat Intelligence
      Vulnerability Management (VulnDB)
      Physical Security Intelligence
      National Security Intelligence
      Managed Attribution
   
   Services
    * Managed Intelligence
      Curated Alerting
      Proactive Acquisitions
      Tailored Reporting Service
      Request for Information (RFI)
    * Professional Services
      Threat Response & Readiness
      Threat Actor Engagment & Procurement
      Extortion Monitoring

 * Solutions
   By Threats and Risks
      
    * Fraud
    * Ransomware
    * Account Takeover
    * Brand and Reputation
    * Vulnerability
    * Physical Security
    * National Security
   
   By Industry
    * Financial Services
    * Retail
    * Healthcare & Pharmaceuticals
    * Technology
    * Public Sector & National Security

 * Resources
   Case study
   
   How Flashpoint Helped CSI (NY) Stop a Potential Synagogue Attack
    * Threat Intel Blog
    * Events & Webinars
    * Resource Library
    * Cybersecurity Glossary
    * Partners

 * Why Flashpoint
 * Company
      
    * About Us
    * Careers
    * News
    * Contact Us

 * Get a Demo
 * Log in
 * ▼
 * 


Why Flashpoint?
* Products
  * Flashpoint Ignite
    * Cyber Threat Intelligence
    * Vulnerability Management (VulnDB)
    * Physical Security Intelligence
    * National Security Intelligence
  * Managed Attribution
* Services
  * Ransomware Attack Response and Readiness
  * Professional Services
  * Tailored Reporting
  * Curated Alerting
  * Managed Intelligence
  * Request for Information
Solutions
* By Threats and Risks
  * Financial Fraud
  * Ransomware and Data Extortion
  * Account Takeover
  * Brand Reputation
  * Vulnerability
  * Physical Security
  * National Security
* By Industry
  * Financial Services
  * Retail
  * Healthcare & Pharmaceutical
  * Technology
  * Public Sector & National Security
Resource Library
* Threat Intelligence Blog
* Events & Webinars
* Resource Library
* Cybersecurity & Intelligence 101
* Partner With Flashpoint
Company
* About Us
* Flashpoint Careers
* Flashpoint News
* Contact Us



 * Platform
   Products
      
    * Flashpoint Ignite
      Cyber Threat Intelligence
      Vulnerability Management (VulnDB)
      Physical Security Intelligence
      National Security Intelligence
      Managed Attribution
   
   Services
    * Managed Intelligence
      Curated Alerting
      Proactive Acquisitions
      Tailored Reporting Service
      Request for Information (RFI)
    * Professional Services
      Threat Response & Readiness
      Threat Actor Engagment & Procurement
      Extortion Monitoring

 * Solutions
   By Threats and Risks
      
    * Fraud
    * Ransomware
    * Account Takeover
    * Brand and Reputation
    * Vulnerability
    * Physical Security
    * National Security
   
   By Industry
    * Financial Services
    * Retail
    * Healthcare & Pharmaceuticals
    * Technology
    * Public Sector & National Security

 * Resources
   Case study
   
   How Flashpoint Helped CSI (NY) Stop a Potential Synagogue Attack
    * Threat Intel Blog
    * Events & Webinars
    * Resource Library
    * Cybersecurity Glossary
    * Partners

 * Why Flashpoint
 * Company
      
    * About Us
    * Careers
    * News
    * Contact Us

 * Get a Demo
 * Log in
 * 
 * 




Blogs

BLOG


FROM ORIGINS TO OPERATIONS: UNDERSTANDING BLACK BASTA RANSOMWARE

Since its emergence in 2022, Black Basta has targeted over 500 organizations
worldwide, leveraging sophisticated tactics to become a leading ransomware
threat. Here’s a look at their methods of operation, notable attacks, and the
potential future of this formidable cybercriminal group.

SHARE THIS:
Flashpoint Intel Team
May 28, 2024

Table Of Contents

Table of Contents
What is Black Basta?
History and background
Global impact
How Black Basta attacks
Increasing sophistication and activity
Notable attacks
Financial impact
The future of Black Basta
Take action against ransomware threats


WHAT IS BLACK BASTA?

Black Basta is a ransomware group that has rapidly risen to prominence in the
cyber threat landscape since its first appearance in April 2022. Known for its
highly targeted and sophisticated attacks, Black Basta operates as a
Ransomware-as-a-Service (RaaS) enterprise. It most recently made news for
breaching over 500 organizations worldwide. Its victims have included critical
infrastructure sectors, according to a joint report by CISA and the FBI.

While some ransomware operators employ a scattergun approach, Black Basta
meticulously selects its victims to maximize each attack’s impact.

The group is believed to be composed of former members of the infamous
ransomware groups Conti and REvil. This connection is suggested by the
similarities in their tactics, techniques, and procedures (TTPs), as well as
their rapid establishment and effectiveness in the cybercriminal ecosystem. Like
other infamous ransomware groups, Black Basta’s operations are characterized by
their use of double extortion tactics, where they encrypt a victim’s data and
threaten to release sensitive information on their public leak site if the
ransom is not paid.


HISTORY AND BACKGROUND

Black Basta made its public debut with a series of attacks in late April 2022,
just a couple months after Conti ceased operations in February 2022. One of its
earliest victims was the German wind energy company Deutsche Windtechnik.
However, there are indications that the group may have been active as early as
February 2022. 

Since its inception, Black Basta has been highly active, amassing over 500
victims as of May 2024. The group utilizes top-tier hacking forums such as
Exploit and XSS to seek insiders within target organizations to facilitate
administrative access to networks.

Number of victim posts published by Black Basta by month since April 2022.
Source: Flashpoint.


GLOBAL IMPACT

Black Basta’s reach and impact are substantial, with the group targeting various
sectors, including critical infrastructure. The group primarily targets
organizations in the United States, Japan, Canada, the United Kingdom,
Australia, and New Zealand.

According to a joint advisory from the Cybersecurity and Infrastructure Security
Agency (CISA), the Federal Bureau of Investigation (FBI), the Department of
Health and Human Services (HHS), and the Multi-State Information Sharing and
Analysis Center (MS-ISAC), Black Basta has compromised over 500 organizations
worldwide. Their victims span 12 out of 16 critical infrastructure sectors,
including healthcare, public health, and energy.


HOW BLACK BASTA ATTACKS

Black Basta’s operations are characterized by their sophisticated and methodical
approach to ransomware attacks. The group leverages a combination of advanced
techniques and tools to infiltrate, compromise, and extort their targets.


INITIAL ACCESS

Black Basta employs several strategies to gain initial access to target
networks:

 * Spear-Phishing Campaigns: In its early campaigns, Black Basta used highly
   targeted spear-phishing emails to trick individuals into divulging their
   credentials or downloading malicious attachments.
 * Insider Information: The group is known to use illicit forums like Exploit
   and XSS to recruit insiders within target organizations, offering significant
   financial incentives for network access.
 * Buying Network Access: Black Basta has advertised on forums their intent to
   purchase corporate network access, collaborating with initial access brokers
   (IABs) to infiltrate target systems.

Ransomware text that is installed following encryption. (Source: Minerva Labs)




LATERAL MOVEMENT AND CREDENTIAL HARVESTING

Once inside a network, Black Basta employs a range of tactics to move laterally
and harvest credentials:

 * QakBot (QBot): Black Basta uses QakBot to steal credentials and gather
   information. QakBot is a versatile malware that can perform actions like
   brute-forcing, web injects, and loading other malware.
 * Mimikatz: This tool is used for credential dumping to extract passwords from
   memory.
 * Exploiting Vulnerabilities: The group exploits known vulnerabilities such as
   ZeroLogon, NoPac, and PrintNightmare to escalate privileges within the
   network.
 * Native Windows Tools: Black Basta utilizes tools like Windows Management
   Instrumentation (WMI), PowerShell, and PsExec to execute commands and move
   laterally across the network.


COMMAND AND CONTROL (C2)

For maintaining control over compromised systems, Black Basta uses various tools
and methods:

 * Cobalt Strike Beacons: This commercial penetration testing tool is frequently
   used for C2 operations, allowing the attackers to manage compromised systems
   remotely.
 * SystemBC: Used as a C2 proxy to hide traffic and communicate with the
   infected systems.
 * Rclone: A tool for data exfiltration, enabling the attackers to transfer
   stolen data to remote locations.


DATA EXFILTRATION AND ENCRYPTION

Before encrypting files, Black Basta takes steps to maximize their leverage:

 * Disabling Security Tools: The group uses PowerShell scripts to disable
   antivirus products and endpoint detection and response (EDR) tools.
 * Deleting Shadow Copies: To prevent recovery, they delete shadow copies using
   the command “vssadmin.exe delete shadows /all /quiet”.
 * Data Exfiltration: Tools like Rclone and WinSCP are used to exfiltrate
   sensitive data before encryption.


ENCRYPTION

To ensure maximum disruption, they meticulously execute the encryption phase:

 * Encryption Payload: Black Basta’s ransomware payload encrypts files using the
   XChaCha20 algorithm. They have transitioned from using the GNU Multiple
   Precision Arithmetic Library (GMP) to the Crypto++ encryption library.
 * File Extensions and Ransom Note: Encrypted files are appended with a “.basta”
   extension. A ransom note, typically named “readme.txt”, is placed on the
   victim’s desktop, directing them to a .onion site for ransom negotiations.
 * Advanced Obfuscation: The latest versions of their ransomware use heavy
   obfuscation and randomized filenames to evade detection by EDR products.


INCREASING SOPHISTICATION AND ACTIVITY

Black Basta continuously evolves its techniques to stay ahead of security
measures. Recently, the group has adopted a combination of email DDoS and
vishing (voice phishing) tactics. They flood targets with spam emails and then
call them posing as IT support, convincing them to install remote access tools
like AnyDesk or use Windows Quick Assist. Once access is gained, Black Basta
executes batch scripts that appear as legitimate updates to establish
persistence and exfiltrate credentials using Secure Copy Protocol (SCP). 

Black Basta has expanded its operations to include Linux-based VMware ESXi
virtual machines, using the ChaCha20 encryption algorithm. According to recent
intelligence and advisories from agencies like CISA and the FBI, Black Basta is
becoming increasingly sophisticated in its attacks. The group has been linked to
other major ransomware players such as FIN7, indicating a possible collaboration
or shared resources. Their use of advanced techniques and tools, combined with
their ability to adapt quickly, makes them a formidable threat in the
cybersecurity landscape.


NOTABLE ATTACKS


HYUNDAI EUROPE (APRIL 2022)

One of Black Basta’s earliest and most significant attacks targeted Hyundai
Europe, which led to significant operational disruptions and data breaches
within Hyundai’s European operations.


CAPITA (MARCH 2023)

UK-based outsourcing firm Capita fell victim to a Black Basta ransomware attack
In March 2023, which they reported directly cost them approximately $32 million.
The company also shared that indirect losses related to the attack, like
goodwill impairment, led to additional losses of upwards of $100 million


TORONTO PUBLIC LIBRARY (OCTOBER 2023)

The Toronto Public Library faced significant outages due to a Black Basta
ransomware attack that disrupted library services and affected access to public
resources.


CHILEAN GOVERNMENT CUSTOMS AGENCY (OCTOBER 2023)

The Chilean government issued a warning following a ransomware attack by Black
Basta on its customs agency. They reported that thanks to the work of their IT
teams, the incident would not affect the operational continuity of the Service.


THE AMERICAN DENTAL ASSOCIATION (APRIL 2022)

The American Dental Association experienced an attack from Black Basta that
forced them to take affected systems offline. The attack disrupted online
services, telephones, email, and webchat.


FINANCIAL IMPACT

Black Basta’s attacks have had profound effects on various sectors, including
automotive, outsourcing, public services, government, healthcare, and
telecommunications. Their attacks typically involve both encrypting data and
exfiltrating sensitive information. They hold this information hostage and
threaten to release it publicly unless they receive the ransom. This double
extortion tactic significantly increases the pressure on victims to comply with
ransom demands.

In late 2023, it was reported that Black Basta had accumulated at least $107
million in Bitcoin ransom payments.


THE FUTURE OF BLACK BASTA

Black Basta is poised to remain a significant ransomware threat, driven by their
ability to adapt and innovate. They are likely to continue refining their attack
methods, increasing their use of sophisticated social engineering tactics such
as email DDoS and vishing to gain access to networks. The incorporation of
advanced malware and the targeting of diverse platforms, including cloud
environments and IoT devices, are expected to enhance their capabilities.

Financial incentives remain a powerful motivator for Black Basta. With over $107
million in ransom payments, ransomware continues to be highly lucrative.
Collaboration with other cybercriminal groups could become more structured,
leading to the formation of ransomware cartels. These alliances might result in
more coordinated attacks and the sharing of advanced tools and techniques. Black
Basta’s connections with groups like FIN7 suggest further integration with
advanced persistent threats (APTs), providing them with state-sponsored tools
and expertise.

Law enforcement actions and improved defensive measures will also influence the
future of Black Basta. Intensified efforts by agencies like CISA and the FBI
could disrupt their operations, forcing the group to adapt or rebrand. As
organizations enhance their cybersecurity defenses, Black Basta will need to
innovate continuously to overcome these improved measures.


TAKE ACTION AGAINST RANSOMWARE THREATS

Flashpoint helps organizations deeply understand malware capabilities, origins,
and associated communication channels, along with tracking ransomware groups’
primary source communications, announcements about new victims, and trends
across victims, industries and locations. Gain insights into criminal
activities, dark web forums, and marketplaces, and expose the whereabouts of
threat actors, information leaks, encrypted chats, ransomware data leak sites,
vulnerabilities and victim auction marketplaces.  

Discover how Flashpoint’s advanced threat intelligence and comprehensive
security solutions can safeguard your critical assets. Don’t wait for an
attack—be proactive and prepared. Sign up for a demo to see Flashpoint in
action.


BEGIN YOUR FREE TRIAL TODAY.

Get a Free Trial

Contact Sales

6218 Georgia Avenue NW
Suite #1
PMB 3032
Washington, DC, 20011
United States

+1 (888) 468-3598

Contact us

 * 
 * 
 * 

 * Platform
   * Products
     * Flashpoint Ignite
       * Cyber Threat Intelligence
       * Vulnerability Management (VulnDB)
       * Physical Security Intelligence
       * National Security Intelligence
       * Managed Attribution
   * Services
     * Managed Intelligence
       * Curated Alerting
       * Proactive Acquisitions
       * Tailored Reporting Service
       * Request for Information (RFI)
     * Professional Services
       * Threat Response and Analysis
       * Threat Actor Engagement & Procurement
       * Extortion Monitoring
 * Solutions
   * By Threats & Risks
     * Ransomware
     * Financial Fraud
     * Account Takeover
     * Brand Risks
     * Vulnerability Risks
     * Physical Security Threats
     * Geopolitical Risk
   * By Industry
     * Financial Services
     * Retail
     * Healthcare & Pharmaceutical
     * Technology
     * Public Sector & National Security
 * Menu Item
   * Why Flashpoint
   * Resources
     * Threat Intelligence Blog
     * Events & Webinars
     * Resource Library
     * Cybersecurity Glossary
     * Partners
 * Company
   * About Us
   * Careers
   * News
   * Contact Us

© 2024 Flashpoint. All rights reserved.
 * Privacy Policy
 * Terms of Service
 * Cookie Policy
 * CCPA
 * Legal

Originaltext

Diese Übersetzung bewerten
Mit deinem Feedback können wir Google Übersetzer weiter verbessern



By clicking “Accept All Cookies”, you agree to the storing of cookies on your
device to enhance site navigation, analyze site usage, and assist in our
marketing efforts. Cookie Policy
Accept All Cookies

Cookies Settings


PRIVACY PREFERENCE CENTER

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.
More information
Allow All


MANAGE CONSENT PREFERENCES

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms.    You can set your browser to
block or alert you about these cookies, but some parts of the site will not then
work. These cookies do not store any personally identifiable information.

Cookies Details‎

FUNCTIONAL COOKIES

Functional Cookies

These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages.    If you do not allow these cookies then
some or all of these services may not function properly.

Cookies Details‎

PERFORMANCE COOKIES

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site.    All
information these cookies collect is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

Cookies Details‎

TARGETING COOKIES

Targeting Cookies

These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites.    They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

Cookies Details‎
Back Button


COOKIE LIST



Search Icon
Filter Icon

Clear
checkbox label label
Apply Cancel
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

Confirm My Choices