Two months have passed since the Black Basta Ransomware first surfaced. Nearly 50 victims have already been reported from the following countries:-
This ransomware is a ransomware-as-a-service, which means that you can contract the malware and use it for a fee.
The Cybereason security experts claimed that Black Basta ransomware is observed to target industries across a wide range, and here they are mentioned below:-
The threat actors who are behind Black Basta ransomware are known for extorting sensitive information from their victims in order to run their operations.
The operators of the ransomware start blackmailing people with threats of publishing stolen information online, and then it demands a digital payment to free up their data.
Ransomware attacks are a rapidly evolving problem worldwide due to advancing technology and the digitalization of society. While the very first ransomware attack occurred back in 1989.
The Black Basta exploits Qakbot to gain access to devices and move from one device to another collecting information from them.
Here below we have mentioned all the key highlights of Black Basta:-
There have been some theories regarding the origins of this ransomware, considering the speed at which it has risen to prominence. In some cases, people have speculated that this ransomware may be related to Conti; however, that has not been confirmed yet.
After infecting the target network the ransomware performs the following actions:-
In order to gain access to the Domain Controller, the attacker needs to harvest the credentials as well as understand the network structure and then using PsExec traverse to the next computer.
In the case of a successful breach, the attacker will perform a final procedure aimed at avoiding detection in order to hide their illicit activities.
Moreover, before encrypting files themselves, ransomware typically deletes shadow copies of files and other backups using VSSadmin.exe. At the end of the attack, the ransomware is deployed to the targeted endpoints, and this completes the final stage of the attack.
Here below we have mentioned all the security recommendations:-
You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates.
In a recent development, the SPAWNCHIMERA malware family has been identified exploiting the buffer overflow…
A significant vulnerability in Sitevision CMS, versions 10.3.1 and earlier, has been identified, allowing attackers…
Chinese cybersecurity entities have accused the U.S. National Security Agency (NSA) of orchestrating a cyberattack…
The ACRStealer malware, an infostealer disguised as illegal software such as cracks and keygens, has…
A security vulnerability in Nagios XI 2024R1.2.2, tracked as CVE-2024-54961, has been disclosed, allowing unauthenticated…
Ubiquiti Networks has issued an urgent security advisory (Bulletin 046) warning of multiple critical vulnerabilities…