Skull with locks around it Skull with locks around it

Black Basta’s Ransomware Reign: 500 Breaches and Counting

Black Basta, one of the most prominent ransomware operators, has recently been attributed to having breached over 500 organizations between April 2022 and May 2024. The gang has encrypted and stolen data from 12 critical infrastructure sectors, including healthcare organizations across North America, Europe, and Australia.

Black Basta, a Russian-speaking group, is believed to originate from the now-defunct Conti group, the successor of the Ryuk ransomware. It also has ties to FIN7, an advanced persistent threat group, due to overlapping C2 IP addresses.

The group operates as a Ransomware-as-a-Service (RaaS) model, where affiliates are paid a portion of the ransom upon a successful infection. Most alarmingly, Black Basta’s attacks seem highly targeted, with each infection having a tailored code depending on the organization being targeted. They also utilize double-extortion tactics, meaning organizations risk their data being encrypted and published publicly.

Attack Lifecycle

Black Basta’s attacks are incredibly complex and well-planned. Unique TTPs are utilized to infect the victim, spread laterally, execute the ransomware, and exfiltrate data. Various tools used during the attack, including QakBot, SystemBC, MimiKatz, CobaltStrike, and RClone, play a pivotal role in the entire attack process.

Figure 1 – Black Basta Attack Lifecycle (Source: Unit42)

1. Initial Infection

The majority of attacks’ initial infection occurs from malicious zip files sent in phishing campaigns to target organizations. In numerous cases, Black Basta was also observed attempting to overwhelm email protection solutions by sending a large number of spam emails, which is often successful.

Figure 2 – Example of a malicious phishing email sent to a victim (Source: Kroll)

When the malicious file is executed, Javascript files are fetched remotely to compile and install Qakbot, a banking trojan with numerous capabilities. However, in these attacks, it is used to deliver further tooling.

SystemBC and CobaltStrike are then delivered via Qakbot to establish a C2 connection and conduct network reconnaissance.

2. Propogation and Persistence

With Anti-Virus tools becoming standard and of utmost importance on all systems, it makes sense that the earliest scripts deployed by QakBot are batch scripts, which disable or remove anti-virus software like Windows Defender or Malwarebytes, further solidifying access by hindering detection.

Figure 3 – Batch Script 3: Remove Windows Defender (Source: Kroll)

In addition to these batch scripts, if remote access tools were not already installed during the initial infection phase, they are now installed and configured to maintain persistence. Some of these tools include AnyDesk, AteraAgent, or Splashtop.

3. Data Exfiltration and Encryption

After the previous phases establish access and lateral movement, two tools are used to exfiltrate data without the user’s knowledge. One of these is RClone, an open-source program used to transfer data. Black Basta also utilizes MimiKatz to extract Windows Administrator credentials.

Once data is successfully extracted from the system, ransomware binaries are executed to encrypt the entire system, displaying a ransom note and rendering all files inaccessible.

Figure 4 – Black Basta Ransom Desktop and Note (Source: Stormshield)

Indicators of Compromise (IOCs)

Hundreds of indicators of compromise exist for the Black Basta Ransomware since each attack is tailored toward the intended victim. However, an example of some consistent IOCs are as follows:

File NameMD5 HashPurpose
av.batDD4816841F1BAFDC0482EFC933BA8FE5Script to remove Windows Defender
1.bat5E601E8AA6A9A346E7907BA300EE1C3FScript to remove MalwareBytes
UpdaterUISCC.exe325B90384EBDD794221C9A010C4A73B1SystemBC
<Random String>20D03F8272648FA3FD31E222B8E2220FRansomware Binary
<Random String>AB79DBF72D25701F8703E0B5457A535BRansomware Binary
ILUg69ql1.bat95E196B9DE3C8E05B835B091B8EC1436Windows Defender removal script
ILUg69ql2.bat01FF5E75096FE6A8A45BFA9C75BFEB96Windows Defender removal script
ILUg69ql3.bat978D3DFDAB9CD0ED684ED4CCDCB3AAF4Windows Defender removal script
<Unknown>3635C0E80E526C9A92C26EF95BEA95F9QakBot Zip File
File/Hash Based IOCs (Source: Kroll)
IP Address/URLComment
104.243.42.239CobaltStrike C2
213.227.15.194CobaltStrike C2
155.138.194.253SystemBC IP
limitedtoday.comCobaltStrike C2 Domain
thetrailbig.netCobaltStrike C2 Domain
IP/URL Based IOCs (Source: Kroll)

For a full list of IOCs, visit TrendMicro and Rapid7.

Target Profiles

Black Basta’s typical target does vary quite widely; however, there are a few consistencies visible in the 500 organizations that have been confirmed to be victims of Black Basta.

Countries Affected

Figure 5 – Source: TrendMicro

Unsurprisingly, USA organizations account for almost half of all targets.

Significantly, Black Basta’s strategic focus is on Western countries, particularly those in the Fourteen Eyes alliance. Disturbingly, countries with authoritarian-leaning governments, like Russia or China, remain untouched.

Industries Affected

Figure 6 – Source: TrendMicro

There seems to be a diverse range of industry targets, indicating that the group is not targeting any particular industry but any that suits its target profile.

However, based on recent news by BleepingComputer, we know that critical infrastructure is frequently targeted, and that health-care related organizations are a growing target of Black Basta.

Conclusion

Black Basta’s ransomware is highly complex and is a growing concern among US Federal Agencies due to its impact on critical infrastructure and health-care-related systems. As of late 2023, the gang has recorded a total of at least $100m in ransom payments; however, this amount could be much larger as of the current date.

In today’s rapidly evolving digital landscape, organizations of all sizes must recognize the importance of implementing a robust and comprehensive cybersecurity strategy. As the complexity and sophistication of cyber threats continue to grow, attackers show no discrimination in their targets, making it crucial for every organization, regardless of its size, to prioritize security. To effectively combat these threats, it is imperative to foster a culture of continuous education and awareness within organizations, ensuring that all stakeholders stay informed about the latest threats.

Leave a Reply

Your email address will not be published. Required fields are marked *