Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Official RVTools Website Hacked to deliver malicious Bumblebe software

May 19, 2025

Band

May 19, 2025

Firefox Patches 2 Zero-Day

May 19, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » Researchers associate the ransom tactics with former Black Basta branches
Global Security

Researchers associate the ransom tactics with former Black Basta branches

AdminBy AdminMarch 4, 2025No Comments3 Mins Read
CACTUS Ransomware
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


04 March 2025Red LakshmananCybercrime / Intelligence threats

Ransomware Cactus

Subjects with the threat that deploy black bosom and cactus ransom have been found on the same Backconnect (BC) module to maintain constant control over the contaminated hosts, a sign that the branches associated with black bacon can go to the cactus.

“After penetration, it gives the attackers a wide range of remote controls, allowing them to perform commands on an infected machine,” – Trend Micro – Note Monday analysis. “This allows them to steal sensitive data such as login credentials, financial information and personal files.”

It is worth noting that the details of the BC module, which cybersecurity company tracks both qbackconnect with -wit with a qakbot loader, were First documented At the end of January 2025, both the Cyber ​​Intelligence Walmart team and the Sophos, the latter, appointed cluster the name Stac5777.

Cybersecurity

Over the past year on the Black Basta attack network there are increasingly debt E -mail bombing tactics to trick promising goals into installing an ambulance after addressing the actor threatened under the guise of IT support or service staff.

Then access is the pipes to download the malicious forklift dll (“Winhttp.dll”) called Reedbed using OneDrivestandaloneupdater.exe, legal execution responsible for updating Microsoft OneDrive. In the end, the loader deciphered and running a BC module.

Ransomware Cactus

Trend Micro said there was an attack on the ransom of cacti, which uses the same mode of operation to deploy feedback, but also goes beyond it to carry out various actions after operation, such as lateral movement and data operation. However, the victim network efforts ended with the right.

Convergence tactics acquires particular importance in light Latest Chat Black Basta Leaks This is a nude gang on electronic crimes Internal work and organizational structure.

Cybersecurity

Specifically, this is conclusion This financially -motivated crew members have shared true powers, some of which were received from magazines on theft. Some of the other known points of the original access are the desktop remote (RDP) and the final points of the VPN.

“The actors threatening use these tactics, methods and procedures (TTP) – hesitant, ambulance as a remote tool and backconnect – to deploy Black Basta Ransomware,” Trend Micro said.

“In particular, there are data that suggest that the members have moved from the Black Basta Ransomware group to a Cactus ransom group. This conclusion is made from the analysis of similar tactics, methods and procedures (TTPS) used by a group of cacti.”

Found this article interesting? Keep track of us further Youter  and LinkedIn To read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Official RVTools Website Hacked to deliver malicious Bumblebe software

May 19, 2025

Band

May 19, 2025

Firefox Patches 2 Zero-Day

May 19, 2025

Why CTEM – This is a winning rate for CISO in 2025

May 19, 2025

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Official RVTools Website Hacked to deliver malicious Bumblebe software

May 19, 2025

Band

May 19, 2025

Firefox Patches 2 Zero-Day

May 19, 2025

Why CTEM – This is a winning rate for CISO in 2025

May 19, 2025

New Httpbot Botnet Launches 200+ Precision Ddos Attacks to Game and Technology Sectors

May 16, 2025

10 best practices for effective data protection

May 16, 2025

Rat Remcos delivered via LNK files and mshta in attacks based on PowerShell

May 16, 2025

Researchers put up new flaws of the Intel processor that allows for memory leaks and attacks Spectre V2

May 16, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Official RVTools Website Hacked to deliver malicious Bumblebe software

May 19, 2025

Band

May 19, 2025

Firefox Patches 2 Zero-Day

May 19, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.