Cloud Threat Landscape
  • Incidents
  • Actors
  • Techniques
  • Defenses
  • Tools
  • Targeted Technologies
  • Posters & Newspapers
  • About
  • RSS
  • STIX
  • Back to wiz.io
Cloud Threat Landscape

Black Basta operator

Tags
RansomOps
Attribution
💰Cybercrime
Incidents
Black Basta Exploiting Vulnerabilities in Multiple Products
References
https://www.cisa.gov/news-events/alerts/2024/05/10/cisa-and-partners-release-advisory-black-basta-ransomware
Last edited
Aug 3, 2025 7:20 AM
Status
Finalized
Cloud-fluent
Targeted geography
United States/North AmericaEurope
Targeted industries
Healthcare/MedicalManufactoringFinanceEnergyEducation

Black Basta is a sophisticated ransomware-as-a-service (RaaS) operator that emerged in April 2022 and has since compromised over 500 organizations globally, primarily in the U.S. and allied countries. Believed to have ties to the former Conti group, Black Basta affiliates gain initial access through phishing emails, exploiting known vulnerabilities, or purchasing access from initial access brokers. Once inside, they deploy tools such as QakBot, Cobalt Strike, and remote monitoring software to move laterally and exfiltrate data.

Black Basta employs double extortion tactics—encrypting files and threatening to leak data on their leak site if ransoms aren’t paid. Affiliates use tools like SoftPerfect Network Scanner for reconnaissance and leverage remote desktop tools for persistence. Their use of legitimate tools and Living-off-the-Land Binaries (LOLBins) makes detection challenging.

Made with 💙 by Wiz

Last Updated: April 3, 2025