home.social

#blackbasta — Public Fediverse posts

Live and recent posts from across the Fediverse tagged #blackbasta, aggregated by home.social.

  1. #cyber #cyberSecurity #conti #blackBasta

    infosec.exchange/@BleepingComp
    [email protected] - The identity of the Black Basta ransomware gang leader has been confirmed by law enforcement in Ukraine and Germany, and the individual has been added to the wanted list of Europol and Interpol.

    bleepingcomputer.com/news/secu

  2. Happy Monday everyone!

    Today's #readoftheday is brought to you by Trend Micro and they share their findings related to #BlackBasta and #CactusRansomware adding a piece of malware known as #BackConnect to their toolbox.

    The report states "The BackConnect malware is a tool that cybercriminals use to establish and maintain persistent control over compromised systems. Once infiltrated, it grants attackers a wide range of remote control capabilities, allowing them to execute commands on the infected machine. This enables them to steal sensitive data, such as login credentials, financial information, and personal files."

    Behaviors (MITRE ATT&CK):
    Initial Access - TA0001:
    Phishing: Spearphishing Voice - T1566.004 - The attackers conducted an email bombing campaign then contacted the victim posing as "IT Support" or "HelpDesk".

    Command and Control - TA0011:
    Remote Access Software - T1219 -
    The attackers used QuickAssist to access the victim's environment once they were successfully social engineered.

    Lateral Movement - TA0008:
    Remote Services: SMB/ Windows Admin Shares - T1021.002 -
    Remote Services: Windows Remote Management - T1021.006
    The attackers leveraged both SMB, shared folders, and WinRM for lateral movement.

    Go check out the rest of the technical details! Enjoy and Happy Hunting!

    Black Basta and Cactus Ransomware Groups Add BackConnect Malware to Their Arsenal
    trendmicro.com/en_us/research/

    Intel 471 Cyborg Security, Now Part of Intel 471 #ThreatIntel #ThreatHunting #ThreatDetection #HappyHunting

  3. "In addition to the new backConnect malware developed by Qbot operators, research has emerged tying zloader[4] activity to that of the BlackBasta ransomware operation. It is highly likely this new side loading backConnect malware has been or is going to be utilized to further ransomware attacks."
    ⬇️
    "Qbot is Back.Connect"
    👇
    medium.com/walmartglobaltech/q

    #CyberVeille #qbot #malware #BlackBasta

  4. Onapsis and Flashpoint produced a 29 report on the cyber threat landscape for SAP applications over the past 4 years. SAP is the world's largest provider of enterprise application software. The report highlights the material risk of SAP ransomware attacks and the growing maturity of cybercriminal capabilities. Their appendices at the bottom list known SAP vulnerabilities (if they're on CISA's Known Exploited Vulnerabilities (KEV) Catalog), as well as MITRE ATT&CK techniques associated with SAP exploitation, and threat actors (financially motivated and ransomware groups) targeting SAP-using organizations. 🔗 (PDF) go.onapsis.com/threat-report/c

    #SAP #vulnerability #cybercrime #threatintel #FIN13 #CobaltSpider #FIN7 #BlackCat #AlphV #BianLian #BlackBasta

  5. First #Cl0p; now #BlackBasta. #ENZ. It's not clear whether both extortions are based on the data obtained from the #MOVEit breach.

  6. 🔎 IcedID’s VNC Backdoors: Dark Cat, Anubis & Keyhole

    A summary of #VNC #backdoor capabilities reconstructed from network traffic.

    👀 Screenshots, videos and clipboard data at blog.nviso.eu/2023/03/20/icedi

    #Malware #PCAP #Reversing #DarkCat #Anubis #Keyhole #DarkVNC #IcedID #Karakurt #BlackBasta

  7. I have been seeing A LOT of verified compromises circulating hacker forums because of #BlackCat, #LockBit, #HiveRansomware, #Mallox, #BlackBasta #RoyalRansomware, #BianLian, #CubaRansomware, #BloodyRansomwareGang, #RansomEXX - I'm talking multiple terabytes of data, hundreds of millions of account details, across pretty much every single sector. Most common method of infection? #BusinessEmailCompromise! Be super mindful of the links you click on, the attachments you download, and the sites you visit

  8. BlackBasta ransomware group have been linked to FIN7 (Carbanak) according to Sentinel Labs. Apparently the connection was made through some specific EDR evasion tooling, some common TTPs and IPs used by the groups.

    BlackBasta is believed to be a reincarnate of the Conti group.

    sentinelone.com/labs/black-bas

    #ThreatIntelligence #CTI #BlackBasta #Ransomware #SentinelLabs