Search for an article

Select a plan

Choose a plan from below, subscribe, and get access to our exclusive articles!

Monthly plan

$
13
$
0
billed monthly

Yearly plan

$
100
$
0
billed yearly

All plans include

  • Donec sagittis elementum
  • Cras tempor massa
  • Mauris eget nulla ut
  • Maecenas nec mollis
  • Donec feugiat rhoncus
  • Sed tristique laoreet
  • Fusce luctus quis urna
  • In eu nulla vehicula
  • Duis eu luctus metus
  • Maecenas consectetur
  • Vivamus mauris purus
  • Aenean neque ipsum
Customize Consent Preferences

We use cookies to help you navigate efficiently and perform certain functions. You will find detailed information about all cookies under each consent category below.

The cookies that are categorized as "Necessary" are stored on your browser as they are essential for enabling the basic functionalities of the site. ... 

Always Active

Necessary cookies are required to enable the basic features of this site, such as providing secure log-in or adjusting your consent preferences. These cookies do not store any personally identifiable data.

No cookies to display.

Functional cookies help perform certain functionalities like sharing the content of the website on social media platforms, collecting feedback, and other third-party features.

No cookies to display.

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics such as the number of visitors, bounce rate, traffic source, etc.

No cookies to display.

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

No cookies to display.

Advertisement cookies are used to provide visitors with customized advertisements based on the pages you visited previously and to analyze the effectiveness of the ad campaigns.

No cookies to display.

HomeCyber BalkansPreventing Black Basta

Preventing Black Basta

Published on

spot_img

Since the emergence of the Black-Basta group in 2022, more and more companies have been facing the aggressive attack methods employed by this group. The attacks are targeting various industries and are based on highly developed encryption techniques with the sole purpose of locking data and demanding ransom payments.

These attacks often follow the principle of double extortion, where in addition to encrypting data, the attackers threaten to release sensitive information to exert additional pressure on the victims.

The group sends out large-scale spam campaigns to deceive employees and gain access to networks. They often pose as IT helpdesk employees in chat conversations, asking for the installation of remote access software like Anydesk to gain direct access to systems.

Towards the end of 2024, there were a series of attacks linked to the Black-Basta group aimed at extorting money during the holiday season. This timeframe is particularly sensitive as many companies operate with reduced staff during the holidays, limiting their capacity for countermeasures.

To protect against these relatively new attack methods by the Black-Basta group, IT leaders and CISOs need to instruct all employees to critically evaluate emails. Employees should carefully check the sender’s email addresses and be particularly skeptical of unknown or unusual addresses. Clicking on links or attachments in suspicious messages is a big no-go and can lead to unforeseen damages. It is also advisable to scrutinize communication channels like Microsoft Teams; any external or unverified users posing as IT staff in chats should be questioned and any unusual chat requests reported to the IT department immediately.

Moreover, installing software without consulting the IT department, especially remote access tools that grant extensive access rights to third parties, should be avoided. Employee awareness and training are also crucial. Regular security awareness training sessions help employees stay informed about current attack methods and sharpen their awareness of typical signals.

IT departments can take targeted measures to enhance security in light of the recent wave of attacks. Implementing white-listing in Microsoft Teams can ensure that only trusted external users or domains interact with the company. External access should be restricted to specific, verified domains while blocking all others.

Blocking the Anydesk domain in the proxy or firewall prevents the software from being downloaded or used within the company network, making it significantly harder for attackers to use the software as an attack vector. Disabling file downloads in Teams can prevent users from downloading potentially harmful files distributed by attackers through Teams chats, reducing the attack surface and protecting against malware installation.

It is essential to recognize that these are just some of the attack methods used by the group, and for comprehensive security, a solid foundational protection strategy across the entire attack surface is crucial.

In conclusion, as the threat of ransomware attacks continues to evolve and grow, it is imperative for companies to stay vigilant, educate their employees, and implement robust security measures to protect against such threats effectively.

Source link

Latest articles

The Silent Cryptocurrency Hijacker: Cyber Criminals Scamming Digital Wallets

A recent revelation in the realm of cybersecurity has exposed a nefarious new malware...

94% of Wi-Fi networks vulnerable to deauthentication attacks

A recent report released by Nozomi Networks Labs unveils a concerning revelation about the...

1 Million Geschäfts- und Privat-PCs im Eiltempo kompromittiert

A recent report from Microsoft has highlighted the increasing concerns faced by Chief Information...

Ensuring Business Continuity: BCDR Trends and Challenges for 2025

In today's rapidly evolving IT landscape, businesses are facing new challenges when it comes...

More like this

The Silent Cryptocurrency Hijacker: Cyber Criminals Scamming Digital Wallets

A recent revelation in the realm of cybersecurity has exposed a nefarious new malware...

94% of Wi-Fi networks vulnerable to deauthentication attacks

A recent report released by Nozomi Networks Labs unveils a concerning revelation about the...

1 Million Geschäfts- und Privat-PCs im Eiltempo kompromittiert

A recent report from Microsoft has highlighted the increasing concerns faced by Chief Information...