Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-mail-logging domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /var/www/wp-includes/functions.php on line 6114
Cybersecurity Threat Advisory: Black Basta Ransomware Group Threat – DRP Solutions

Cybersecurity Threat Advisory: Black Basta Ransomware Group Threat

Cybersecurity Threat Advisory

In Partnership with Barracuda SKOUT Managed XDR

Threat Update

The Black Basta ransomware group is revamping an older malware known as Qbot, Qakbot and Plinkslipbot to exploit the Microsoft Exchange Server. A successful attack will allow threat actors the ability to gain target network access, collect critical personal information, and encrypt the network. Barracuda MSP recommends updating all vulnerable Microsoft Exchange Servers in your environment as soon as possible to avoid potential impact.

Technical Detail & Additional Information

What Is The Threat?

Microsoft Exchange Server vulnerability exists in the current Microsoft Exchange server. By exploiting an unpatched Microsoft Exchange Server, threat actors can gain access to the server and collect banking credentials, other financial information, and encrypt networks. Experts reported that threat actors are evading antivirus detection by disabling Windows Defender.

Why Is It Noteworthy?

This vulnerability exists in the current Microsoft Exchange Server which is a common tool for email communications for organizations and schools. The FBI warned in a flash alert that the BlackCat ransomware had been used to encrypt the networks of at least 60 organizations worldwide between November 2021 and March 2022. When news of vulnerabilities such as this breaks publicly, attackers are known to accelerate their attacks as they know the threat window will be closed soon.


What Is The Exposure Or Risk?

When exploited, this vulnerability allows a threat actor to have complete and unrestricted access to the target network. If a threat actor has network access, they can easily conduct a ransomware event that can lead to temporary or permanent loss of sensitive or proprietary information, disruption to regular operations, financial losses, and potential harm to an organization’s reputation.


What Are The Recommendations?

Barracuda MSP recommends the following actions to limit the impact of an arbitrary code execution attack:

  • To review their identity posture, monitor external access to their networks, and update all vulnerable Microsoft Exchange servers in their environment as soon as possible.
  • Keep all Servers updated to enforce security measures.
  • Continue to stay up to date with our threat advisories to avoid potential threats.

References

For more in-depth information about the recommendations, please visit the following links:

Black Basta Ransomware Teams Up with Malware Stalwart Qbot | Threatpost

Microsoft: Exchange servers hacked to deploy BlackCat ransomware (bleepingcomputer.com)

If you have any questions, please contact our Virtual CISO.

Like what you see?

For additional information about DRP Solutions’ Cybersecurity Services, be sure to contact us today. Â