Oasis Ticket Sales Scams: How to Stay Safe
During our weekly meetings with the banking industry and Police Scotland, we continue to see a significant increase in ticket scams over the last three…
The Black Basta ransomware group has recently launched an aggressive social engineering campaign targeting businesses. Originating from the remnants of the disbanded Conti group, Black Basta has rapidly established itself as a formidable ransomware-as-a-service (RaaS) operation. This new campaign is a sophisticated blend of phishing and vishing (voice phishing) tactics aimed at exploiting human vulnerabilities to gain unauthorised access to organisations networks.
The campaign begins with a mass email spamming, where the targeted user’s email is inundated with thousands of spam emails. These emails often come from legitimate newsletter sign-ups, overwhelming the user’s email protection systems, and causing significant disruption.
Once the user is overwhelmed, the threat actor impersonates IT support staff, contacting the user via phone. The attacker offers to help resolve the spam issue and persuades the user to download a remote monitoring and management (RMM) tool such as AnyDesk or utilise the built-in Windows Quick Assist feature. This social engineering tactic leverages the user’s need for immediate help, making it easier for the attacker to gain remote access to the user’s system.
Upon gaining remote access, the attacker executes batch scripts that perform the following actions:
In some cases, Rapid7 observed the attacker attempting to deploy Cobalt Strike beacons disguised as legitimate DLL files to other assets within the compromised network.
If an organisation suspects or confirms a compromise, immediate actions should include:
The Black Basta ransomware group’s latest campaign highlights the importance of a multi-layered approach to cybersecurity. By combining technical defences with user education and robust incident response plans, organizations can better protect themselves against these sophisticated social engineering attacks. Staying vigilant and prepared is key to mitigating the risks posed by these evolving cyber threats.
Further information available at: