Get in Touch
During the first half of 2022, Black Basta targeted a diverse range of private sectors including:
– Professional Services
The diversity of targets suggests that all sectors are likely to be targets in the future.
Severity level: High – Compromise by Black Basta ransomware will almost certainly result in the encryption and theft of sensitive data and leveraged to extort the victim for financial gain.
First seen used in the wild back in April 2022, Black Basta is a ransomware gang that operates ransomware of the same name and makes money via their own exploitations, and by selling their product as a Ransomware as a Service (RaaS). RaaS allows malicious users with no indigenous tooling or infrastructure to exploit their chosen targets by renting a Black Basta licence to use in attacks. Little is known about the exact pricing of Black Basta, but most RaaS gangs price licences based on the perceived value of the intended target. Other RaaS licences have previously been distributed for as little as $100.
Black Basta is growing in popularity and can often be found on intelligence vendors’ trending pages. The gang mostly targets English speaking countries such as the UK, the US, Australia, Canada and New Zealand. However, other West European countries also appear to be high on the targeting profile.
The ransomware is written in C++ and affects both Windows and Linux operating systems, and encrypts systems as fast as possible by encrypting data in segments of 64 and 128 bytes. The aim of fast encryption is to try and compromise as much data as possible before defences are triggered and alert the user.
The main method of initial compromise for Black Basta ransomware is through spear phishing campaigns.
Successful system exploitation via Black Basta will almost certainly result in the compromise of confidentiality, availability and integrity of sensitive data and exposing the victim to extortion attempts and negative reputational impact.
In a recent ransomware attack against Pendragon, a ransom of $60M (£53M) was demanded, a sum that could soon be an average depending on the perceived net worth of the target victim.
Should the ransom threat be declined by the victim, then the attacker will highly likely publish the encrypted data on to dark web forums for others to see. This will result in a loss of company reputation and potential legal damages.
A comprehensive Endpoint Detection and Response (EDR) solution such as Microsoft Defender can provide additional protection against ransomware threats such as Black Basta. EDRs can alert system users of potential breaches and stop further progress before the malware can do significant damage.
If an EDR solution is not being used, the first instance of detection is likely to be the ransom note. The note will be labelled as:
– LinuxOS and Linux based VMware
Containment, Mitigations & Remediations
It is recommended that employees receive training on how to spot signs of spear phishing emails. The main method of initial compromise is spear phishing so some in-house training will go a long way to reducing the effectiveness of future campaigns.
As stated above, a main method of reducing the threat of Black Basta ransomware is to detect it in the early stages through the use of an effective and monitored EDR solution. An effective EDR will increase detection of malicious attempts of ransomware compromise and halt them if detected.
Organisations can also perform routine back-ups of sensitive data that is needed to run the business and to keep a copy offline in case back-ups are impacted by the attack. Therefore, if a breach occurs and the business can no longer function, a back-up is ready to use, and the business can continue to operate with little disruption. However, this does not nullify the fact that customer and employee data may have also been lost, and potentially released at will by the attacker if demands are not met.
Indicators of Compromise
Black Basta hashes:
Associated Black Basta IPs:
– cmd.exe /c C:\Windows\SysNative\vssadmin.exe delete shadows /all /quiet
– cmd.exe /c C:\Windows\System32\vssadmin.exe delete shadows /all /quiet
Registry key created:
Ransomware continues to be one of the prominent threats facing the private sector. The recent attack against automotive retailer Pendragon and the record breaking demand of £53 million suggests the threat is growing as criminal groups are becoming comfortable demanding ever-increasing ransoms.
Open source reporting suggests Black Basta ransomware was the third most-used ransomware in October 2022, up from the previous month. There is a realistic possibility this growth will continue and the ransomware will be seen in more and more attacks.
Previous attacks have predominantly been focused against Western companies, however, there is insufficient evidence to suggest the specific motivations of Western targeting.
Black Basta ransomware gang operates a double extortion technique. This means that not only does the group encrypt the private data of the victim and demand a ransom for the keys, but they also threaten victims with the publishing of the data on their own dark web site. This is likely designed to increase pressure on the victim and increase the chances of payment.
Despite the group’s relatively recent formation, it is highly likely that the group is made up of seasoned cybercriminals who have experience with ransomware extortion tactics, due to their double extortion technique and their fast rise to notoriety.
T1078 – Valid Accounts
T1566.001 – Phishing: Spear-phishing attachment
T1059– Command and Scripting Interpreter
T1047– Windows Management Instrumentation
T1112– Modify Registry
T1027 – Obfuscate Files or Information
T1562.001 – Impair Defences: Disable or Modify Tools
T1003 – OS Credential Dumping
T1082 – System Information Discovery
T1083– File and Directory Discovery
T1567 – Exfiltration Over Web Service
T1041 – Exfiltration Over C&C Channel
T1490 – Inhibit System Recovery
T1489 – Service Stop
T1486 – Data Encrypted for Impact