Category | Details | References |
---|---|---|
Actors | ||
First Observed | April 2022 | 1 |
Threat Actors | TBD | |
Environment | ||
Platforms | Windows and Linux | 2 |
Artifacts | ||
Extensions | .basta | 2 |
Ransomware Notes | readme.txt | 2 |
Services It Disables | TBD | |
Other Observables | TBD | |
Automation | ||
Automatically Gains Access | No. Uses phishing/Quakbot | 2 |
Automatically Escalates Privileges | No. Black Basta exploits the PrintNightmare vulnerability (CVE-2021-34527) | 1 |
Requires Human Interaction | No | |
Automatic Exfiltration | No. Uses Cobeacon to exfiltrate the stolen data on an established command-and-control (C&C) server. It uses Rclone to exfiltrate data from compromised systems. | 1 |
Automatic Propagation | No | 1 |
Please note, this page was last updated at 2023-03-14 20:21.