Skip to content

At The Identity Organisation, we're here to help!

    Your privacy is important to us, and we want to communicate with you in a way which has your consent and which is in line with UK Law on data protection. As a result of a change in UK law on 25th May 2018, by providing us with your personal details you consent to us processing your data in line with current GDPR requirements.

    Here is where you can review our Privacy & GDPR Statement

    To remove consent at any time, please e-mail info@tidorg.com with the word "unsubscribe" as the subject.

    +44 (0) 1628 308038 info@tidorg.com

    CheckPoint Warns of Black Basta Ransomware as the Number of Victim Organizations Increases by 59%

    This latest “new kid on the block” is gaining momentum and – according to CheckPoint – seeing successes with their attacks globally, calling their organizational structure “impressive.”

    It’s not often a ransomware gang gets a nod from a security vendor, but in this case, it appears to be warranted. In a recent article focusing on the ransomware gang Black Basta, the security analysts at the Check Point Incident Response Team showcase some details about this newest addition to the long list of ransomware families we’ve encountered.

    According to CheckPoint, Black Basta has successfully attacked, exfiltrated data from, and leaked data belonging to 89 high-profile organizations since May of this year. Despite nearly half (44%) of the victim organizations residing in the U.S., Black Basta has been successful in their attacks globally:

    10-3-22 Image

    Source: Checkpoint

    Do keep in mind, that the list above doesn’t include those organizations that paid the ransom to avoid leaked data being published.

    According to CheckPoint, Black Basta uses a combination of malicious Office documents, QakBot, CobaltStrike Beacon, and their own ransomware payload as part of their attacks.

    To avoid becoming a victim of a ransomware attack, CheckPoint recommend maintaining viable backups, keeping systems updates, scanning for malicious email content, monitoring file activity, and Security Awareness Training as effective ways to prevent and mitigate attacks.


    Free Ransomware Simulator Tool

    Threat actors are constantly coming out with new strains to evade detection. Is your network effective in blocking all of them when employees fall for social engineering attacks?

    KnowBe4’s “RanSim” gives you a quick look at the effectiveness of your existing network protection. RanSim will simulate 22 ransomware infection scenarios and 1 cryptomining infection scenario and show you if a workstation is vulnerable.

    Here’s how it works:

    • 100% harmless simulation of real ransomware and cryptomining infections
    • Does not use any of your own files
    • Tests 23 types of infection scenarios
    • Just download the install and run it 
    • Results in a few minutes!

    PS: Don’t like to click on redirected buttons? Cut & Paste this link in your browser: https://info.knowbe4.com/ransomware-simulator-tool-partner?partnerid=001a000001lWEoJAAW

    Sign Up to the TIO Intel Alerts!

    Back To Top