top of page
Black Basta
Name
Category
Type
Targeted OS
Description
Information
Black Basta
Malware
Ransomware
Windows & Linux
Black Basta (AKA BlackBasta) is a ransomware operator and Ransomware-as-a-Service (RaaS) criminal enterprise that first emerged in early 2022 and immediately became one of the most active RaaS threat actors in the world, racking up 19 prominent enterprise victims and more than 100 confirmed victims in its first few months of operation. Black Basta targets organizations in the US, Japan, Canada, the United Kingdom, Australia, and New Zealand in highly targeted attacks rather than employing a spray-and-pray approach. The group�s ransom tactics use a double extortion tactic, encrypting their victim�s critical data and vital servers and threatening to publish sensitive data on the group�s public leak site.
Black Basta�s core membership is thought to have spawned from the defunct Conti threat actor group due to similarities in their approach to malware development, leak sites, and communications for negotiation, payment, and data recovery. Black Basta has also been linked to the FIN7 (AKA Carbanak) threat actor through similarities in their custom Endpoint Detection and Response (EDR) evasion modules and overlapping use of IP addresses for command and control (C2) operations.
https://www.blackberry.com/us/en/solutions/endpoint-security/ransomware-protection/black-basta
NIL
Malpedia
Alienvault OTX
Playbook
NIL
CISA
Other Information
Mitre
Mitre Techniques
Mitre Techniques Navigator Link
NIL
NIL
['T1059', 'T1543', 'T1486', 'T1622', 'T1491', 'T1083', 'T1222', 'T1562', 'T1490', 'T1036', 'T1112', 'T1106', 'T1027', 'T1018', 'T1553', 'T1082', 'T1007', 'T1204', 'T1497', 'T1047']
bottom of page