CheckPoint Warns of Black Basta Ransomware as the Number of Victim Organizations Increases by 59%

Warns of RansomwareThis latest “new kid on the block” is gaining momentum and – according to CheckPoint – seeing successes with their attacks globally, calling their organizational structure “impressive.”

It’s not often a ransomware gang gets a nod from a security vendor, but in this case, it appears to be warranted. In a recent article focusing on the ransomware gang Black Basta, the security analysts at the Check Point Incident Response Team showcase some details about this newest addition to the long list of ransomware families we’ve encountered.

According to CheckPoint, Black Basta has successfully attacked, exfiltrated data from, and leaked data belonging to 89 high-profile organizations since May of this year. Despite nearly half (44%) of the victim organizations residing in the U.S., Black Basta has been successful in their attacks globally:

10-3-22 Image





Source: Checkpoint

Do keep in mind, that the list above doesn’t include those organizations that paid the ransom to avoid leaked data being published.

According to CheckPoint, Black Basta uses a combination of malicious Office documents, QakBot, CobaltStrike Beacon, and their own ransomware payload as part of their attacks.

To avoid becoming a victim of a ransomware attack, CheckPoint recommend maintaining viable backups, keeping systems updates, scanning for malicious email content, monitoring file activity, and Security Awareness Training as effective ways to prevent and mitigate attacks.

Free Ransomware Simulator Tool

Threat actors are constantly coming out with new strains to evade detection. Is your network effective in blocking all of them when employees fall for social engineering attacks?

KnowBe4’s "RanSim" gives you a quick look at the effectiveness of your existing network protection. RanSim will simulate 22 ransomware infection scenarios and 1 cryptomining infection scenario and show you if a workstation is vulnerable.

RansIm-Monitor3Here's how it works:

  • 100% harmless simulation of real ransomware and cryptomining infections
  • Does not use any of your own files
  • Tests 23 types of infection scenarios
  • Just download the install and run it 
  • Results in a few minutes!

Get RanSim!

PS: Don't like to click on redirected buttons? Cut & Paste this link in your browser:

Topics: Ransomware

Subscribe To Our Blog

Ransomware Hostage Rescue Manual

Get the latest about social engineering

Subscribe to CyberheistNews