{"id":163019,"date":"2024-05-12T09:16:30","date_gmt":"2024-05-12T09:16:30","guid":{"rendered":"https:\/\/securityaffairs.com\/?p=163019"},"modified":"2024-05-12T09:16:31","modified_gmt":"2024-05-12T09:16:31","slug":"black-basta-ransomware-500-organizations","status":"publish","type":"post","link":"https:\/\/securityaffairs.com\/163019\/cyber-crime\/black-basta-ransomware-500-organizations.html","title":{"rendered":"As of May 2024, Black Basta ransomware affiliates hacked over 500 organizations worldwide"},"content":{"rendered":"
<\/div>\n

Black Basta ransomware affiliates have breached over 500 organizations between April 2022 and May 2024, FBI and CISA reported.<\/h2>\n\n\n\n

The FBI, CISA, HHS, and MS-ISAC have issued a joint Cybersecurity Advisory (CSA) regarding the Black <\/a>Basta ransomware<\/a> activity as part of the StopRansomware<\/a> initiative. <\/p>\n\n\n\n

Black Basta has targeted at least 12 critical infrastructure sectors, including Healthcare and Public Health. The alert provides Tactics, Techniques, and Procedures (TTPs) and Indicators of Compromise (IOCs) obtained from law enforcement investigations and reports from third-party security firms. <\/p>\n\n\n\n

Black Basta ransomware-as-a-service (RaaS) has been active since April 2022, it impacted several businesses and critical infrastructure entities across North America, Europe, and Australia. As of May 2024, Black Basta has impacted over 500 organizations worldwide.<\/p>\n\n\n\n

“Black Basta is a ransomware-as-a-service (RaaS) variant, first identified in April 2022. Black Basta affiliates have targeted over 500 private industry and critical infrastructure entities, including healthcare organizations, in North America, Europe, and Australia.” reads the CSA<\/strong><\/a>.<\/em><\/p>\n\n\n\n

<\/p>\n\n\n\n

In December 2023, Elliptic and Corvus Insurance published a joint research<\/strong><\/a> that revealed the group accumulated at least $107 million in Bitcoin ransom payments since early 2022. According to the experts, the ransomware gang has infected over 329 victims, including\u00a0ABB<\/a>,\u00a0Capita<\/a>,\u00a0Dish Network<\/a>, and\u00a0Rheinmetall<\/a>.\u00a0<\/p>\n\n\n\n

The researchers analyzed blockchain transactions, they discovered a clear link between Black Basta and the\u00a0Conti Group<\/a>.<\/p>\n\n\n\n

In 2022, the Conti gang discontinued its operations, coinciding with the emergence of the Black Basta group in the threat landscape.<\/p>\n\n\n\n

The group mainly laundered the illicit funds through the Russian crypto exchange Garantex<\/a>.<\/p>\n\n\n\n

\u201cBlack Basta is a Russia-linked ransomware that emerged in early 2022. It has been used to attack more than 329 organizations globally and has grown to become the fourth-most active strain of ransomware by number of victims in 2022-2023.\u201d\u00a0reads\u00a0<\/a>the Elliptic\u2019s report.<\/em>\u00a0\u201cOur analysis suggests that Black Basta has received at least $107 million in ransom payments since early 2022, across more than 90 victims. The largest received ransom payment was $9 million, and at least 18 of the ransoms exceeded $1 million. The average ransom payment was $1.2 million.\u201d<\/em><\/gwmw><\/p>\n\n\n\n

Most of the victims are in the manufacturing, engineering and construction, and retail sectors. 61,9% of the victims are in the US, 15.8% in Germany, and 5.9% in Canada.<\/gwmw><\/p>\n\n\n\n

Some of the victims\u2019 ransom payments were sent by both Conti and Black Basta groups to the gang behind the\u00a0Qakbot\u00a0<\/a>malware.<\/gwmw><\/p>\n\n\n\n

The US agencies recommend critical infrastructure organizations implement several mitigations. These align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and NIST, providing a minimum set of practices to protect against common threats. Recommendations provided in the report include installing updates promptly, using phishing-resistant multi-factor authentication (MFA), securing remote access software, making backups, and applying mitigations from the #StopRansomware Guide. <\/gwmw><\/p>\n\n\n\n

<\/gwmw><\/gwmw><\/p>\n\n\n\n

Follow me on Twitter: @securityaffairs<\/strong><\/a> and Facebook<\/strong><\/a> and Mastodon<\/a><\/p>\n\n\n\n

Pierluigi Paganini<\/strong><\/a><\/p>\n\n\n\n

(<\/strong>SecurityAffairs<\/strong><\/a>\u00a0\u2013<\/strong>\u00a0hacking,\u00a0cybercrime)<\/strong><\/gwmw><\/p>\n\n\n\n

<\/gwmw><\/gwmw><\/p>\n","protected":false},"excerpt":{"rendered":"

Black Basta ransomware affiliates have breached over 500 organizations between April 2022 and May 2024, FBI and CISA reported. The FBI, CISA, HHS, and MS-ISAC have issued a joint Cybersecurity Advisory (CSA) regarding the Black Basta ransomware activity as part of the StopRansomware initiative. Black Basta has targeted at least 12 critical infrastructure sectors, including […]<\/p>\n","protected":false},"author":1,"featured_media":106349,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3323,3,5,7],"tags":[12944,8913,88,73,4112,9508,9506,10918,687,544,841,1533],"class_list":["post-163019","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-breaking-news","category-cyber-crime","category-hacking","category-malware","tag-black-basta","tag-cisa","tag-cybercrime","tag-fbi","tag-hacking","tag-hacking-news","tag-information-security-news","tag-it-information-security","tag-pierluigi-paganini","tag-ransomware","tag-security-affairs","tag-security-news"],"yoast_head":"\n杭州江阴科强工业胶带有限公司