Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 1 / 2
23 résultats taggé BlackBasta  ✕
Inside Black Basta: Uncovering the Secrets of a Ransomware Powerhouse https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/inside-black-basta-uncovering-the-secrets-of-a-ransomware-powerhouse/
09/04/2025 20:28:20
QRCode
archive.org
thumbnail

In February 2025, the cybersecurity community witnessed an unprecedented leak that exposed the internal operations of Black Basta.

trustwave EN 2025 BlackBasta leak analysis
Inside BRUTED: Black Basta (RaaS) Members Used Automated Brute Forcing Framework to Target Edge Network Devices https://blog.eclecticiq.com/inside-bruted-black-basta-raas-members-used-automated-brute-forcing-framework-to-target-edge-network-devices
17/03/2025 21:13:53
QRCode
archive.org
thumbnail

On February 11, 2025, a Russian speaking actor using the Telegram handle @ExploitWhispers [1], leaked internal chat logs of Black Basta Ransomware-as-a-Service (RaaS) members [2]. These communications, spanning from September 2023 to September 2024, provide an insider look on the group's operational tactics.

eclecticiq EN 2025 BRUTED BlackBasta Bruteforce
Ransomware : sur la piste trouble de l’un des leaders de Black Basta https://www.lemagit.fr/actualites/366619470/Ransomware-sur-la-piste-trouble-de-lun-des-leaders-de-Black-Basta
27/02/2025 10:03:48
QRCode
archive.org
thumbnail

Les échanges internes au groupe Black Basta divulgués la semaine dernière offrent une nouvelle opportunité d’enquêter sur l’un de ses leaders : tramp. Il pourrait avoir été arrêté en Arménie en juin 2024, avant d’être relâché.

lemagit FR 2025 BlackBasta Tramp leak Ransomware
Black Basta is latest ransomware group to be hit by leak of chat logs https://therecord.media/black-basta-ransomware-group-chat-logs-leaked
21/02/2025 16:53:01
QRCode
archive.org
thumbnail

Cybersecurity researchers are analyzing about 200,000 messages from inside the high-profile Black Basta ransomware operation that were leaked recently.

therecord EN 2025 BlackBasta ransomware dataleak messages logs
Qbot is Back.Connect https://medium.com/walmartglobaltech/qbot-is-back-connect-2d774052369f
21/01/2025 09:29:03
QRCode
archive.org

In addition to the new backConnect malware developed by Qbot operators, research has emerged tying zloader[4] activity to that of the BlackBasta ransomware operation. It is highly likely this new side loading backConnect malware has been or is going to be utilized to further ransomware attacks.

walmartglobaltech EN 2025 qbot back.connect malware operators BlackBasta
Medion hack? BlackBasta ransomware has allegedly copied 1.5 TB of data | heise online https://www.heise.de/en/news/Medion-hack-BlackBasta-ransomware-has-allegedly-copied-1-5-TB-of-data-10216148.html
21/12/2024 00:00:48
QRCode
archive.org
thumbnail

Cyber criminals claim to have successfully attacked Medion, a distributor of electronic products.

heise EN 2024 BlackBasta Cyberangriff Hacking MEDION Ransomware
Black Basta ransomware gang hit BT Group https://securityaffairs.com/171668/breaking-news/black-basta-ransomware-attack-bt-group.html
05/12/2024 16:54:18
QRCode
archive.org
thumbnail

BT Group (formerly British Telecom)'s Conferencing division shut down some of its servers following a Black Basta ransomware attack.

securityaffairs EN 2024 BT Group BlackBasta ransomware
ReliaQuest Uncovers New Black Basta Social Engineering Technique - ReliaQuest https://www.reliaquest.com/blog/black-basta-social-engineering-technique-microsoft-teams/
30/10/2024 12:10:47
QRCode
archive.org
thumbnail

ReliaQuest has observed a new Black Basta social engineering campaign targeting users via Microsoft Teams and malicious QR codes.

reliaquest EN 2024 social-engineering BlackBasta Microsoft Teams QRCode analysis
Ongoing Social Engineering Campaign Refreshes Payloads https://www.rapid7.com/blog/post/2024/08/12/ongoing-social-engineering-campaign-refreshes-payloads/
12/08/2024 16:56:27
QRCode
archive.org
thumbnail

On June 20, 2024, Rapid7 identified multiple intrusion attempts by threat actors utilizing Techniques, Tactics, and Procedures (TTPs) that are consistent with an ongoing social engineering campaign being tracked by Rapid7.

rapid7 EN 2024 TTPs Social-engineering Campaign analysis BlackBasta
Black Basta ransomware switches to more evasive custom malware https://www.bleepingcomputer.com/news/security/black-basta-ransomware-switches-to-more-evasive-custom-malware/
03/08/2024 21:04:49
QRCode
archive.org
thumbnail

The Black Basta ransomware gang has shown resilience and an ability to adapt to a constantly shifting space, using new custom tools and tactics to evade detection and spread throughout a network.

bleepingcomputer EN 2024 BlackBasta Initial-Access Malware Ransomware mandiant UNC4393
UNC4393 Goes Gently into the SILENTNIGHT https://cloud.google.com/blog/topics/threat-intelligence/unc4393-goes-gently-into-silentnight/?hl=en
03/08/2024 21:04:00
QRCode
archive.org
thumbnail

In mid-2022, Mandiant's Managed Defense detected multiple intrusions involving QAKBOT, leading to the deployment of BEACON coupled with other pre-ransomware indicators. This marked Mandiant's initial identification of UNC4393, the primary user of BASTA ransomware. Mandiant has responded to over 40 separate UNC4393 intrusions across 20 different industry verticals. While healthcare organizations have not traditionally been a focus for UNC4393, several breaches in the industry this year indicate a possible expansion of their interests. However, this represents only a fraction of the cluster's victims, with the Black Basta data leak site purporting over 500 victims since inception.

Over the course of this blog post, Mandiant will detail the evolution of UNC4393's operational tactics and malware usage throughout its active lifespan, with a focus on the period following the QAKBOT botnet takedown. We will highlight the cluster's transition from readily available tools to custom malware development as well as its evolving reliance on access brokers and diversification of initial access techniques.

Mandiant EN 2024 QAKBOT UNC4393 BlackBasta SILENTNIGHT UNC4393
PikaBot: a Guide to its Deep Secrets and Operations - Sekoia.io Blog https://blog.sekoia.io/pikabot-a-guide-to-its-deep-secrets-and-operations/
04/06/2024 11:15:28
QRCode
archive.org
thumbnail

Uncover an in-depth analysis of PikaBot, a malware loader used by Initial Access Brokers for network compromise and ransomware deployment.

sekoia EN 2024 PikaBot malware analysis TA577 BlackBasta
From Origins to Operations: Understanding Black Basta Ransomware https://flashpoint.io/blog/understanding-black-basta-ransomware/
29/05/2024 10:12:06
QRCode
archive.org
thumbnail

Explore the rise of Black Basta as a top ransomware threat, their sophisticated tactics, notable attacks, and future implications for cybersecurity.

flashpoint EN 2024 BlackBasta ransomware threat research
Threat actors misusing Quick Assist in social engineering attacks leading to ransomware https://www.microsoft.com/en-us/security/blog/2024/05/15/threat-actors-misusing-quick-assist-in-social-engineering-attacks-leading-to-ransomware/
16/05/2024 16:15:33
QRCode
archive.org
thumbnail

Microsoft Threat Intelligence has observed Storm-1811 misusing the client management tool Quick Assist to target users in social engineering attacks that lead to malware like Qakbot followed by Black Basta ransomware deployment.

microsoft EN 2024 QuickAssist Ransomware Qakbot BlackBasta
Cyberattaque contre Franz Carl Weber: données d'employés publiées sur le darknet (update) https://www.ictjournal.ch/news/2024-03-18/cyberattaque-contre-franz-carl-weber-donnees-demployes-publiees-sur-le-darknet
18/03/2024 18:47:21
QRCode
archive.org
thumbnail

Des cybercriminels ont attaqué le vendeur de jouets Franz Carl Weber.

ictjournal CH FR Franz-Carl-Weber BlackBasta rasomware leak Publication
le team sa - Informations sur le cyberincident chez leteam sa https://www.team.jobs/fr/blog/posts/cyber-incident
29/02/2024 09:26:01
QRCode
archive.org

En décembre 2023, leteam sa a été victime d'une cyber-attaque. Un groupe de ransomware connu a pu accéder au réseau et crypter plusieurs disques. Grâce à une réaction rapide de l'équipe informatique et d'experts en sécurité externes, l'attaque a pu être rapidement contrée et les systèmes restaurés. L'analyse de l'incident a révélé une fuite de certaines données, mais celle-ci a été jugée à l'époque comme étant partiellement critique. Un monitoring a été mis en place pour surveiller une éventuelle publication de données.

team.jobs FR incident ransomware BlackBasta informations
Suisse: Le Team a été hackée, ce qu'on sait sur le ransomware https://www.watson.ch/fr/suisse/cybercrime/414451442-suisse-le-team-a-ete-hackee-ce-qu-on-sait-sur-le-ransomware
22/02/2024 13:27:07
QRCode
archive.org
thumbnail

Un groupe de hackers russe a volé près de 200 Go de données à une entreprise de placement suisse et les a divulgués sur le darknet.

watson FR CH 2024 Suisse Cybercrime Russie Ransomware exfiltration BlackBasta
TAG Aviation: Black Basta pirate une compagnie romande https://www.watson.ch/fr/suisse/technologie/155927204-tag-aviation-black-basta-pirate-une-compagnie-romande
14/06/2023 17:05:24
QRCode
archive.org
thumbnail

La société TAG Aviation a été victime d'une attaque par ransomware. Les recherches de watson révèlent que Black Basta est à l'origine de cette attaque.

watson CH FR Suisse TAG Aviation ransomware BlackBasta Technologie Informatique hacker Cybercrime Genève
German arms company Rheinmetall confirms Black Basta ransomware group behind cyberattack https://therecord.media/rheinmetall-confirms-black-basta-ransomware-group-behind-cyberattack
24/05/2023 18:04:05
QRCode
archive.org
thumbnail

Rheinmetall confirmed on Monday that the Black Basta ransomware group was behind a cyberattack it detected last month.

therecord EN 2023 Rheinmetall ransomware BlackBasta
Black Basta claims it's selling off stolen Capita data https://www.theregister.com/2023/04/18/capita_breach_gets_worse/
19/04/2023 11:41:34
QRCode
archive.org
thumbnail

No worries, outsourcer only handles government tech contracts worth billions

theregister EN 2023 BlackBasta Capita ransomware
page 1 / 2
4503 links
Shaarli - The personal, minimalist, super-fast, database free, bookmarking service par la communauté Shaarli - Theme by kalvn - Curated by Decio