Connect with us

Threat Actors

Black Basta Ransomware Group: A Deep Dive

Published

on

1       Background

Black Basta is a Ransomware-as-a-Service (RaaS) group that first appeared in April 2022 and quickly gained notoriety for targeting various sectors, including construction, healthcare, manufacturing, finance, retail, and entertainment. Black Basta has reportedly compromised over 500 organisations worldwide. The group meticulously chooses its victims to maximise each attack’s impact.

2       Black Basta’s Tactics and Techniques

Black Basta employs a multi-stage attack that leverages a combination of sophisticated techniques and readily available tools to infiltrate, compromise, and extort its targets. The group is known for its use of double extortion, where they not only encrypt a victim’s data but also threaten to release sensitive information publicly if the ransom is not paid.

Here’s a breakdown of the typical attack chain:

2.1      Initial Access

Black Basta utilises various methods to gain a foothold in the target network:

  1. Social Engineering: Attackers commonly use phishing emails, posing as IT helpdesk personnel, to trick employees into installing remote access tools like AnyDesk or Quick Assist.
  2. Exploiting Vulnerabilities: Black Basta exploits known vulnerabilities like CVE-2024-1709 (ConnectWise) and others to gain initial access or escalate privileges within the network.
  3. Insider Information and Purchased Access: The group actively seeks insiders within target organisations or purchases network access from initial access brokers (IABs) on underground forums like Exploit and XSS12.

2.2      Lateral Movement and Credential Harvesting

Once inside, the attackers move laterally to identify and compromise critical systems:

  1. Malware Deployment: They deploy tools like QakBot, SystemBC, and Cobalt Strike beacons for credential theft, data exfiltration, and command and control (C2) operations.
  2. Credential Dumping: Tools like Mimikatz allow attackers to extract passwords from memory.
  3. Exploiting Native Windows Tools: Attackers leverage tools like PowerShell, PsExec, and WMI for executing commands and moving laterally within the compromised network.

2.3      Data Exfiltration and Encryption

Before deploying the ransomware, Black Basta prepares the target environment:

  1. Disabling Security Measures: Attackers use PowerShell scripts to disable antivirus software and endpoint detection and response (EDR) systems.
  2. Deleting Shadow Copies: They delete shadow copies using the vssadmin.exe tool to prevent system recovery.
  3. Exfiltrating Sensitive Data: Tools like RClone and WinSCP are used to transfer stolen data to attacker-controlled servers.

2.4      Encryption and Ransom Demand

The final stage involves deploying the ransomware and demanding payment:

  1. Ransomware Deployment: Black Basta’s ransomware typically uses the ChaCha20 encryption algorithm to encrypt files. Encrypted files are appended with a “.basta” extension.
  2. Ransom Note: They leave a ransom note, usually named “readme.txt,” which directs victims to a .onion site for ransom negotiations. Black Basta often sets a deadline of 10-12 days for payment before publishing the stolen data on their data leak site, Basta News.

3       Black Basta’s Evolving Sophistication

Black Basta has shown a continuous evolution in its tactics and techniques:

  1. Email Bombing and Vishing: The group has incorporated email DDoS (bombing) and vishing (voice phishing) tactics to overwhelm targets with spam emails and trick them into installing remote access tools.
  2. Microsoft Teams Exploitation: They leverage Microsoft Teams by creating accounts posing as IT support to contact victims and deceive them into granting access.
  3. Targeting Linux Systems: Black Basta has expanded its operations to target Linux-based VMware ESXi virtual machines.

4       Possible Links to Other Threat Actors

There is speculation that Black Basta may have connections to other prominent ransomware groups:

  1. Conti: Similarities in tactics, techniques, and procedures (TTPs) suggest a possible link to the now-defunct Conti group.
  2. FIN7: The use of a custom EDR evasion tool and overlapping C2 infrastructure points to a potential connection with the FIN7 (Carbanak) group3638.
  3. Impact and Mitigation

5       Potential Business Risks

Black Basta’s attacks have had significant consequences for organisations across various areas, such as:

  1. Financial Losses: Ransom payments, data recovery costs, and potential legal repercussions contribute to significant financial burdens.
  2. Reputational Damage: Data leaks and public exposure of sensitive information can damage an organisation’s reputation and erode customer trust.
  3. Operational Disruption: Attacks can disrupt critical business operations, leading to downtime and productivity loss.

6       Risk Mitigation

Organisations can mitigate the risk of Black Basta attacks by:

  1. Implementing strong cybersecurity measures: This includes multi-factor authentication, robust firewalls, regular software updates and patching, and effective antivirus and EDR solutions.
  2. Employee Training: Educating employees about phishing techniques, social engineering tactics, and best practices for handling suspicious emails is crucial.
  3. Robust Backup and Disaster Recovery Plans: Regularly backing up critical data and having a well-defined disaster recovery plan in place can help minimise the impact of an attack.
  4. Secure Remote Access: Ensuring that remote access protocols are secure and properly configured is essential to prevent unauthorised access.
  5. Proactive Threat Hunting: Using tools like Qualys EDR and implementing threat hunting queries can help detect suspicious activities related to Black Basta and other ransomware threats.

7       Indicators of Compromise  

There is a wide array of indicators that can help identify a potential or ongoing Black Basta ransomware attack. These indicators encompass network activities, file modifications, and suspicious user behaviours.

7.1      Network-Based Indicators

  1. Suspicious Domain Naming: Black Basta actors often use Microsoft Teams for social engineering. They create fake accounts with deceptive names like “Help Desk” using fraudulent Entra ID tenants1. The domain names often follow the *.onmicrosoft.com convention, with examples like cybersecurityadmin.onmicrosoft.com and supportserviceadmin.onmicrosoft.com.
  2. Command and Control (C2) Communication: Monitor network traffic for communication with known Black Basta C2 domains, many of which utilize Cobalt Strike. Examples include trailshop[.]net, realbumblebee[.]net, and numerous others.
  3. Specific IP Addresses: Although threat actors frequently change IP addresses, some recent ones associated with Black Basta activity include 170.130.165[.]73 (likely Cobalt Strike infrastructure), 66.42.118[.]54 (exfiltration server), and others.
  4. Tor Network Usage: Black Basta uses Tor hidden services for ransom negotiations and data leak sites. Increased Tor traffic might be an indicator of compromise.

7.2      File-Based Indicators

  1. File Extension Modification: Black Basta ransomware typically appends the “.basta” extension to encrypted files. However, they may also use random extensions.
  2. Ransom Note Presence: Look for ransom notes, often named “readme.txt,” on the victim’s desktop. The note provides a unique code and instructions to contact the ransomware group via a .onion URL.
  3. Unique Encryption Scheme: Black Basta utilizes a specific encryption scheme, prepending each file with a 133-byte ephemeral NIST P-521 public key, a 32-byte key XChaCha20, a 24-byte nonce, and a 20-byte HMAC, followed by null byte padding and a 12-byte campaign identifier.
  4. YARA Rules: The sources provide YARA rules that can be used to identify Black Basta ransomware files based on specific strings and file characteristics.

7.3      Behavioural Indicators

  1. Sudden Increase in Spam Emails: Black Basta may initiate an attack with email bombing to flood an employee’s inbox with spam, followed by Microsoft Teams contact under the guise of IT help desk support.
  2. Requests for Remote Access: Be wary of unsolicited requests for remote access, especially from individuals claiming to be IT support staff.
  3. Unexpected Software Installations: Observe for unusual software installations, particularly those disguised as anti-spam programs like AntispamConnectUS.exe.
  4. Disabling of Security Software: Black Basta often attempts to disable antivirus and EDR solutions before encrypting files.
  5. Deletion of Shadow Copies: Attackers use the vssadmin.exe tool to delete shadow copies to prevent system recovery.

8       Threat Hunting and Mitigation

There are several tools and techniques for hunting for Black Basta activity and mitigating its impact:

  1. Qualys EDR Hunting Queries: The sources provide hunting queries specifically designed to detect suspicious activities associated with Black Basta ransomware within the Qualys EDR environment.
  2. MITRE ATT&CK Mapping: The sources provide comprehensive mapping of Black Basta’s tactics and techniques to the MITRE ATT&CK framework, allowing security teams to understand the adversary’s behaviour and develop countermeasures.
  3. Proactive Security Measures: Implement robust security practices, including strong passwords, multi-factor authentication, regular software updates, and effective security software.
  4. Employee Awareness Training: Educate employees on phishing techniques, social engineering tactics, and best practices for secure online behaviour.

9       Conclusion

Black Basta poses a serious and evolving threat to organisations worldwide. Their use of sophisticated tactics, combined with their ability to adapt and innovate, makes them a formidable adversary. By understanding Black Basta’s methods and implementing robust security measures, organisations can reduce their risk of falling victim to their attacks.

Continue Reading
1 Comment

1 Comment

  1. Pingback: The Black Basta Menace: A Deep Dive – CXO Corner

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

CISO Blog

The Black Basta Menace: A Deep Dive

Published

on

This ransomware gang is a real pain in the neck. They’re relentless, sophisticated, and they’re not afraid to target anyone, from small businesses to large corporations…..you are not unlucky if they hit you they TARGET you
These cybercriminals are like digital pirates, sailing the high seas of the internet and plundering unsuspecting Spanish Galleons. They use every trick in the book, from phishing emails to exploiting vulnerabilities. And once they’re in, they wreak havoc, encrypting data and demanding a ransom.

So, what can you do to protect yourself from these cyber pirates? Well, for starters, you need to be vigilant. Don’t click on suspicious links, keep your software up-to-date, and use strong, unique passwords. And if you’re really serious about security, invest in a good cybersecurity solution.

 
Remember, the best defense is a good offense. Stay informed, stay vigilant, and most importantly, stay safe.
 
 
Want to know more? Take a look at my complete writeup of Black Basta
Continue Reading

Threat Actors

The Russian Bear Unleashed: The Cyber Threat of APT28

Beyond its majestic image, the Russian Bear has a darker side. Delve into the world of cyber espionage and uncover the advanced tactics and tools employed by APT28 to steal sensitive information and disrupt critical systems.

Published

on

The Russian Bear, a symbol deeply ingrained in Russian culture, is often associated with the Eurasian brown bear. This majestic creature, known for its immense strength and solitary nature, embodies the vast and untamed landscapes of Russia. From the dense forests of Siberia to the remote wilderness of Kamchatka, the Russian Bear roams freely, captivating imaginations and evoking a sense of awe and respect.

APT28, also known as Fancy Bear, amongst other aliases, does not evoke the same sense of awe and respect, well not from a Cyber Defenders perspective. AP28 is a highly sophisticated cyber espionage group assessed to be linked to the Russian General Staff Main Intelligence Directorate (GRU) 85th special Service Centre (GTsSS) Military Intelligence Unit.

Estonian and British intelligence services have also associated APT28 with Russian military intelligence (GRU). The United States believes that GRU units 26165 and 74455 form part of this threat actor. APT28 has been active since at least 2004.

Targets and Objectives

APT28 primarily targets:

  • Governments
  • Military organisations
  • Media outlets
  • Research institutions
  • Private sector companies

The group’s objectives include:

  • Gathering intelligence
  • Stealing sensitive information
  • Disrupting systems
  • Influencing political processes
  • Criminal financial gain

Tactics, Techniques and Procedures (TTPs)

APT28 is known for its sophisticated and constantly evolving TTPs, which include:

  • Spearphishing: They send targeted emails with malicious attachments or links, often disguised as legitimate communications, to trick victims into revealing their credentials or installing malware.
  • Exploiting vulnerabilities: They exploit software vulnerabilities in operating systems, applications and network devices to gain unauthorised access to systems. These may include zero-day exploits, taking advantage of vulnerabilities before patches are available.
  • Watering hole attacks: They compromise websites frequently visited by target organisations and inject malicious code to deliver malware to visitors.
  • Credential harvesting: They create spoofed websites mimicking legitimate organisations to steal user credentials.
  • Brute-force attacks: They use brute-force techniques, including password spraying, to gain access to accounts.
  • Lateral movement: Once inside a network, they move laterally to other systems using techniques such as pass-the-hash and exploiting the EternalBlue vulnerability, expanding their access and searching for valuable data.
  • Data exfiltration: They steal sensitive information such as intellectual property, trade secrets and personal data, often using encrypted channels to avoid detection.
  • Command and control (C2) infrastructure: They utilise various protocols, including HTTP and DNS, to communicate with malware and exfiltrate data, making it difficult to detect and block their activities25. They may also leverage compromised infrastructure, including routers and network devices, to act as C2 servers.

Notable Malware and Tools

APT28 uses a range of custom-developed and publicly available malware and tools, including:

  • Sednit/Sofacy: A modular suite of malware tools designed for surveillance, data theft and persistence.
  • XAgent: A remote access trojan (RAT) that runs on iOS, Unix and Windows and currently protects communications with SSL/TLS. XAgent does key logging and file extraction.
  • X-Tunnel: A network tunnelling tool used to create encrypted tunnels for secure data exfiltration.
  • CompuTrace/Lojack: Legitimate software modified by APT28 to enable persistence.
  • Responder: An open source tool used to facilitate NetBIOS Name Service (NBT-NS) poisoning and steal usernames and hashed passwords.
  • EternalBlue: An exploit for a vulnerability in Microsoft’s SMB protocol, used for lateral movement.
  • Empire: A post-exploitation framework, including PowerShell and Python versions, used for various malicious activities.

Notable Attacks

APT28 has been linked to several high-profile cyberattacks, including:

  • Interference in the 2016 US presidential election: The group targeted the Democratic National Committee (DNC) and the Hillary Clinton campaign, stealing sensitive emails and other information that were later leaked to the public.
  • Attack on the German parliament in 2015: This attack involved data theft and the disruption of email accounts belonging to German Members of Parliament (MPs) and the Vice Chancellor.
  • Attempted attack on the Organisation for the Prohibition of Chemical Weapons (OPCW) in 2018: This attack was intended to disrupt independent analysis of chemical weapons used by the GRU in the UK.
  • Compromising a satellite communications provider in 2023: This intrusion targeted a provider with critical infrastructure customers.
  • Targeting the hospitality sector in 2017: APT28 targeted hotels throughout Europe and the Middle East, using techniques such as sniffing passwords from Wi-Fi traffic and spreading laterally via EternalBlue.

Mitigating the Threat

Organisations can take steps to mitigate the threat posed by APT28 and other advanced persistent threats:

  • Implement strong password policies: Enforce strong, unique passwords for all accounts and implement multi-factor authentication where possible.
  • Keep systems and software up to date: Regularly patch systems and applications to address known vulnerabilities.
  • Educate employees on security best practices: Train employees on how to identify and avoid phishing attacks and other social engineering tactics.
  • Network segmentation: Divide networks into smaller segments to limit the impact of a potential breach.
  • Employ advanced security tools: Utilise intrusion detection systems, firewalls, endpoint protection solutions, and security information and event management (SIEM) systems to detect and respond to malicious activity.
  • Develop and test incident response plans: Establish procedures for responding to security incidents and regularly test these plans.
  • Threat intelligence sharing: Participate in information sharing with other organisations and industry groups to stay informed about the latest threats and TTPs.
Continue Reading

Threat Actors

Sidewinder: A Comprehensive Look at the India-Linked APT Group

Sidewinder Cyber Threat Actor, also known as Razor Tiger, Rattlesnake, and T-APT-04, is a sophisticated, state-sponsored cyber-espionage group believed to originate from India. Active since at least 2012, it’s considered one of the oldest nation-state threat actors. While initially known for targeting military infrastructure in Pakistan, recent research reveals a broader range of targets across Asia, Africa, the Middle East, and Europe. This article explores Sidewinder’s typical attack chain, the newly discovered StealerBot malware, and the group’s evolving tactics

Published

on

I love the names Threat actors get or chose; some are strange but other come close to the way in which they operate. Enter Sidewinder!

First off we have the original, the snake.

Now this nasty gets its name from the way it moves. Most snakes get from A to B by bending their bodies into S-shapes and slithering forward headfirst. A few species, however — found in the deserts of North America, Africa and the Middle East — have an odder way of getting around. Known as “sidewinders,” these snakes lead with their mid-sections instead of their heads, slinking sideways across loose sand.

Finally we have Sidewinder Cyber Threat Actor, also known as Razor Tiger, Rattlesnake, and T-APT-04, is a sophisticated, state-sponsored cyber-espionage group believed to originate from India. Active since at least 2012, it’s considered one of the oldest nation-state threat actors. While initially known for targeting military infrastructure in Pakistan, recent research reveals a broader range of targets across Asia, Africa, the Middle East, and Europe. This article explores Sidewinder’s typical attack chain, the newly discovered StealerBot malware, and the group’s evolving tactics.

Typical Attack Chain:

A Deadly Venom: Sidewinder’s Attack Chain Like its namesake, the sidewinder snake, this APT group is known for its stealthy and targeted attacks.

Here’s a breakdown of their typical attack chain:

  1. Spear-Phishing: Sidewinder begins by sending carefully crafted spear-phishing emails containing malicious attachments, often disguised as legitimate documents or files.
  2. Social Engineering: These emails often leverage social engineering tactics to entice victims to open the attachments, such as using personalized information or exploiting current events.
  3. Malware Delivery: Once opened, the attachments deliver malicious payloads, such as remote template injection files or exploit kits, that exploit vulnerabilities in Microsoft Office software.
  4. Payload Execution: The malware payloads execute on the victim’s system, often bypassing security measures and establishing a backdoor for further attacks.
  5. Data Exfiltration: Sidewinder uses this backdoor to steal sensitive data, including confidential documents, credentials, and intellectual property.

StealerBot: A Modular Arsenal of Espionage

Sidewinder’s arsenal includes a powerful modular implant known as StealerBot. This .NET-based tool is designed to evade detection and conduct a variety of espionage activities. StealerBot’s modules include:

  • ModuleInstaller: Installs the Trojan that maintains a foothold on the compromised system.
  • Orchestrator: Communicates with Sidewinder’s command-and-control (C2) server and manages other modules.
  • Espionage Modules: Capture screenshots, log keystrokes, steal passwords and files, phish Windows credentials, and bypass User Account Control (UAC).

StealerBot is a .NET-based, modular implant designed for espionage. It deviates from typical malware by loading components into memory instead of the infected machine’s filesystem.

ModuleInstaller: This module acts as a backdoor loader, deploying the Trojan used to maintain a foothold on compromised systems. It drops files, including a legitimate application to sideload a malicious library, a configuration manifest, a malicious library, and an encrypted payload.

Orchestrator: This is the main module that communicates with Sidewinder’s command-and-control (C2) server and manages other malware plugins.

StealerBot Modules: The malware includes modules for various espionage activities: installing additional malware, capturing screenshots, logging keystrokes, stealing passwords and files, phishing Windows credentials, and bypassing User Account Control (UAC).

Evolving Tactics and Targets

While initially perceived as a low-skilled group, Sidewinder’s recent attacks show increasing sophistication and an expanding scope.

Polymorphism: Sidewinder uses polymorphism techniques to evade traditional antivirus detection by constantly changing the appearance of its malicious code. This makes analysis and detection challenging for security researchers.

Targeting Maritime Facilities: Recent campaigns have targeted maritime facilities in countries like Egypt and Sri Lanka. Sidewinder uses falsified documents related to ports, employing themes like job termination and salary reductions to lure victims.

Exploiting Older Vulnerabilities: Despite using sophisticated techniques, Sidewinder often exploits older vulnerabilities, such as the CVE-2017-0199 flaw in Microsoft Office dating back to 2017. This highlights the importance of patching systems, even for seemingly outdated vulnerabilities.

Expanding Geographic Reach: Sidewinder’s targets have expanded beyond traditional rivals to include countries in the Middle East, Africa, and even Europe. This shift suggests evolving geopolitical interests and a willingness to target a broader range of entities.

Final Thoughts

Sidewinder is a persistent and evolving threat that poses significant risks to governments, military organizations, and critical infrastructure worldwide. The group’s use of sophisticated tools like StealerBot, coupled with its evolving tactics and expanding targets, demands increased vigilance from security professionals. Understanding Sidewinder’s attack chain and staying informed about its latest activities is crucial for mitigating the threat it poses.

Continue Reading

Trending

Copyright © 2017 Keller Holdings