<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=363521274148941&amp;ev=PageView&amp;noscript=1">
Skip to content

NEW RELEASE: Cyderes Publishes DARC4 Labs Threat Landscape 2024 Report - Download


Threat Advisory: Insights & Recommendations for Defending Against BlackBasta

Delve into the nefarious tactics of BlackBasta, a Ransomware-as-a-Service threat actor, and learn how to defend your network against their sophisticated techniques.

In the realm of cybersecurity, vigilance is paramount. Today, we delve into the nefarious workings of BlackBasta, an insidious Ransomware-as-a-Service (RaaS) threat actor making waves with its sophisticated techniques. 

Meet BlackBasta: DEV-0506 

BlackBasta, alias DEV-0506 or no_name_software, operates with precision, employing double extortion tactics that blend ransomware deployment with data exfiltration. Their modus operandi begins innocuously—a phishing email carrying a link to a password-protected zip file. Unwittingly opening this file installs the Qakbot banking trojan, opening the backdoor to your system. 

The Anatomy of an Attack 

Once inside, BlackBasta's maneuvers unfold systematically: 

  1. Initial Access: Through phishing campaigns utilizing malicious attachments (ZIP, XLS, VBS), Qakbot infiltrates systems, setting the stage for subsequent stages of attack.
  2. Execution & Persistence: SystemBC and Cobalt Strike facilitate command and control, enabling sustained presence and control.
  3. Privilege Escalation: Utilizing Active Directory enumeration and credential theft (think Kerberoasting and Mimikatz), BlackBasta gains access to privileged accounts.
  4. Defense Evasion: BlackBasta disarms local Endpoint Detection and Response (EDR) tools, employing file obfuscation and randomized filenames to evade detection.
  5. Lateral Movement: Leveraging PowerShell, Psexec, RDP, and SMB, BlackBasta navigates laterally, expanding its foothold within networks.
  6. Data Collection & Exfiltration: Data exfiltration via rclone empowers the threat actor to encrypt files, engaging in double extortion and widespread disruption.

The Impact: Defending Against BlackBasta 

The repercussions of a BlackBasta attack are severe and impact organization in one or more of the following: 

  • Data theft and deletion of backups. 
  • Double extortion tactics that disrupt business operations. 
  • Significant financial and reputational damage. 

Our Recommendations: Building Resilience 

To fortify against BlackBasta and similar threats, consider these proactive measures: 

Security Awareness Training: Educate teams to recognize and thwart social engineering attacks. Compensate for human error through design, system architecture, and security tooling 

Multifactor Authentication (MFA): Restrict access and contain lateral movement with MFA. 

Endpoint Protection: Ensure every node—internal and external—has robust endpoint protection. 

Zero Trust Framework: Adopt a zero-trust approach, verifying every request. 

Continuous Monitoring: Maintain active surveillance and respond swiftly within Active Directory. 

PowerShell Logging: Enable and monitor PowerShell activity for encoded script execution. 

Regular Updates: Keep systems and applications up-to-date to mitigate known vulnerabilities. 

By understanding BlackBasta's tactics and fortifying our defenses accordingly, we can effectively combat this evolving threat landscape. Stay vigilant, stay secure. 



Enterprise security teams are adapting to meet evolving business needs. With DARC4 Labs℠ by Cyderes you can get real-time threat monitoring and correlation for enhanced security. We gather data from various threat intelligence sources to provide actionable insights. Through advanced analytics and automation, we help clients identify vulnerabilities, prioritize risks, and perform forensics analysis.