
Massive Brute Force Attack Targeting Networking Devices
A large-scale brute force attack is underway, using nearly 2.8 million IP addresses daily to target networking devices from Palo Alto Networks, Ivanti, and SonicWall….
The Black Basta ransomware group has recently launched an aggressive social engineering campaign targeting businesses. Originating from the remnants of the disbanded Conti group, Black Basta has rapidly established itself as a formidable ransomware-as-a-service (RaaS) operation. This new campaign is a sophisticated blend of phishing and vishing (voice phishing) tactics aimed at exploiting human vulnerabilities to gain unauthorised access to organisations networks.
The campaign begins with a mass email spamming, where the targeted user’s email is inundated with thousands of spam emails. These emails often come from legitimate newsletter sign-ups, overwhelming the user’s email protection systems, and causing significant disruption.
Once the user is overwhelmed, the threat actor impersonates IT support staff, contacting the user via phone. The attacker offers to help resolve the spam issue and persuades the user to download a remote monitoring and management (RMM) tool such as AnyDesk or utilise the built-in Windows Quick Assist feature. This social engineering tactic leverages the user’s need for immediate help, making it easier for the attacker to gain remote access to the user’s system.
Upon gaining remote access, the attacker executes batch scripts that perform the following actions:
In some cases, Rapid7 observed the attacker attempting to deploy Cobalt Strike beacons disguised as legitimate DLL files to other assets within the compromised network.
If an organisation suspects or confirms a compromise, immediate actions should include:
The Black Basta ransomware group’s latest campaign highlights the importance of a multi-layered approach to cybersecurity. By combining technical defences with user education and robust incident response plans, organizations can better protect themselves against these sophisticated social engineering attacks. Staying vigilant and prepared is key to mitigating the risks posed by these evolving cyber threats.
Further information available at: