Cyber Security News

Black Basta Ransomware Leverages Microsoft Teams To Deliver Malicious Payloads

In a resurgence since May 2024, the Black Basta ransomware campaign has exhibited a troubling escalation in its attack methods, incorporating a multi-stage infection chain that blends social engineering, a custom packer, a mix of malware payloads, and advanced delivery techniques. 

In order to distribute malicious commands that serve as the initial infection vector, the attackers take advantage of the trust that members of collaboration platforms like Microsoft Teams have in one another. 

When unsuspecting users execute these commands, a custom packer of unknown origin obfuscates a diverse arsenal of payloads that may include a credential harvester designed to steal login credentials for lateral movement within the network or obfuscated variants of the Black Basta ransomware itself. 

An operator stalls for time.

YARA rules have been developed and made available to the public by security researchers in order to identify this custom packer, which will assist defenders in early detection.

Leveraging 2024 MITRE ATT&CK Results for SME & MSP Cybersecurity Leaders – Attend Free Webinar  

Beyond the custom packer, Black Basta has also been observed leveraging DarkGate, a malicious shellcode capable of a comprehensive range of harmful actions. 

DarkGate can be used to terminate processes, steal information, manipulate the system (reboot, shutdown, crash), and potentially re-infect compromised machines.

The inclusion of Zbot, a credential-stealing trojan, within Black Basta’s malware arsenal strengthens the argument for a multi-stage attack structure.  

The credential harvesting prompt shown to the user upon executing the DLL

The initial phase, likely involving social engineering tactics delivered via malicious Teams commands, seeks to bypass security defenses and establish a foothold within the target network. 

Following a successful compromise, the custom packer unpacks the next-stage payload, which could be either the credential harvester or the obfuscated ransomware executable. 

The credential harvester steals login credentials to facilitate lateral movement within the compromised network, while the ransomware encrypts critical data to extort a ransom payment from the victim. 

DarkGate displays its version using a debug message box.

Once a foothold is established and credentials are harvested, Black Basta injects DarkGate, which can then be used to achieve lateral movement within the network, steal sensitive data from various sources, potentially establish persistence on the compromised system to ensure continued access even after a reboot, and potentially re-infect the machine in case of reboot attempts. 

According to Rapid7, effective defenses should be able to identify these social engineering ploys, unpack malicious payloads using tools like the aforementioned YARA rules, and ultimately thwart ransomware deployment. 

Organizations should prioritize educating employees on cybersecurity best practices, including remaining vigilant of suspicious messages or commands within collaboration platforms and reporting such instances immediately. 

By implementing a layered security approach that combines technical controls with user awareness training, organizations can significantly enhance their defenses against the evolving tactics of the Black Basta ransomware campaign.

Analyse Real-World Malware & Phishing Attacks With ANY.RUN - Get up to 3 Free Licenses

Aman Mishra

Recent Posts

The Rise of AI-Generated Professional Headshots

It’s clear that a person’s reputation is increasingly influenced by their online presence, which spans…

9 hours ago

Hackers Abuse Google Ads To Attacking Graphic Design Professionals

Researchers identified a threat actor leveraging Google Search ads to target graphic design professionals, as…

11 hours ago

Hackers Using New IoT/OT Malware IOCONTROL To Control IP Cameras, Routers, PLCs, HMIs And Firewalls

Recent cyberattacks targeting critical infrastructure, including fuel management systems and water treatment facilities in Israel…

11 hours ago

Hackers Exploiting Apache Struts2 Vulnerability to Upload Malicious Payloads

Hackers have begun exploiting a newly discovered vulnerability in Apache Struts2, a widely used open-source…

12 hours ago

Hackers Weaponizing Microsoft Teams to Gain Remote Access

Recent cybersecurity research has uncovered a concerning trend where hackers are exploiting Microsoft Teams to…

13 hours ago

“Password Era is Ending,” Microsoft to Delete 1 Billion Passwords

Microsoft has announced that it is currently blocking an astounding 7,000 password attacks every second,…

2 days ago