Tuesday, April 1, 2025
Homecyber securityBlack Basta Ransomware Gang Infiltrates Networks Using Penetration Testing Tools

Black Basta Ransomware Gang Infiltrates Networks Using Penetration Testing Tools

Published on

SIEM as a Service

Follow Us on Google News

The distribution of QAKBOT malware is resurrected once again by operators of the Black Basta ransomware group on September 8, 2022, after a short leisure break.

While the latest distribution mechanism and campaign were identified by cybersecurity researchers at Trend Micro and the attackers using Penetration Testing tools to infiltrate the targeted networks.

In this latest campaign, the threat actors are distributing the QAKBOT malware with the help of the following malicious payloads:-

  • SmokeLoader
  • Emotet
  • Malicious spam (BB and Obama20x IDs)
  • Brute Ratel C4 framework

As a second-stage payload, the attackers deployed the Qakbot malware in their recent attacks by exploiting the Brute Ratel C4 framework payload. During the attack, Cobalt Strike was also used to move laterally as part of the attack.

Technical Analysis

A malicious email ignites the whole campaign and this email contains a malicious URL that redirects the victims to a download page. Here, an archive file containing documents and files will be downloaded.

There are two things that you will find in the archive:-

  • An LNK file in the form of an ISO file
  • Two hidden subdirectories

There is a geographical distribution of C&C servers among compromised hosts, which makes the infrastructure difficult to detect. There are 28 countries where all these hosts are found within ISP broadband networks.

Each C&C server is used once by the operators of the QAKBOT malware, as they don’t use a server repeatedly, instead, they always keep changing them for more complexity. It has even been found that some of them have been saved in more than one QAKBOT configuration.

QAKBOT launches a reconnaissance operation on the network and then it drops the Brute Ratel DLL within 6 minutes of its introduction. 

The following things are identified during the subsequent reconnaissance process in the environment:- 

  • Privileged users
  • Active Directory
  • Group policies
  • Domains
  • Computers
  • Users

In order to prepare the data for exfiltration, the files are then packaged into a ZIP file, and it takes only a few seconds to accomplish this data extraction process.

QAKBOT C&C Server Countries

Here, we have compiled a list of the countries in which the C&C servers for the QAKBOT are located:-

  • Afghanistan
  • Algeria
  • Argentina
  • Austria
  • Brazil
  • Bulgaria
  • Canada
  • Chile
  • Colombia
  • Egypt
  • India
  • Indonesia
  • Japan
  • Mexico
  • Mongolia
  • Morocco
  • Netherlands
  • Qatar
  • Russia
  • South Africa
  • Taiwan
  • Thailand
  • Turkey
  • United Arab Emirates
  • United Kingdom
  • United States
  • Vietnam
  • Yemen

Apart from this, it has been detected that attackers are also using the HTML Smuggling method to deliver a password-protected ZIP file. Malicious code can be injected into HTML attachments or web pages through this technique.

Recommendations

Here below we have mentioned all the recommendations provided:-

  • Always verify the email sender.
  • Do not open or download any suspicious attachments received from an unknown sender.
  • Do not click or open any suspicious links.
  • Always verify the authenticity of embedded links by hovering over them.
  • Prior to taking any action, it is recommended that you verify if the email actually comes from the company that claims to have sent it.

Also Read: Download Secure Web Filtering – Free E-book

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Rockwell Automation Vulnerability Allows Attackers to Execute Arbitrary Commands

Rockwell Automation has identified a critical flaw in its Verve Asset Manager software, exposing industrial systems...

Check Point Confirms Data Breach, Says Leaked Information is ‘Old’

Cybersecurity giant Check Point has confirmed that a recent post on a notorious dark...

CrushFTP Security Vulnerability Under Attack After PoC Release

A recently disclosed security vulnerability in CrushFTP, identified as CVE-2025-2825, has become the target...

CISA Warns of Cisco Smart Licensing Utility Credential Flaw Exploited in Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) has issued a security advisory warning organizations...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Rockwell Automation Vulnerability Allows Attackers to Execute Arbitrary Commands

Rockwell Automation has identified a critical flaw in its Verve Asset Manager software, exposing industrial systems...

Check Point Confirms Data Breach, Says Leaked Information is ‘Old’

Cybersecurity giant Check Point has confirmed that a recent post on a notorious dark...

CrushFTP Security Vulnerability Under Attack After PoC Release

A recently disclosed security vulnerability in CrushFTP, identified as CVE-2025-2825, has become the target...