Page 115 - Cyber Defense eMagazine July 2024
P. 115

About Black Basta

            Black Basta is delivered as a ransomware-as-a-service  (RaaS) offering, making the barrier to entry for a
            potential attacker very low.  RaaS vendors generally provide their customers with full technical  support
            and make it a turn-key operation  for criminal enterprises.  Black Basta was first seen in the wild in April
            2022  and  has  targeted  over  500  private  industry  and  critical  infrastructure  organizations,  including
            healthcare  companies,  in North  America,  Europe  and  Australia.  In their  first few  months  of operation,
            they attacked 19 prominent enterprises and were responsible for more than 100 confirmed victims. The
            group uses a double extortion tactic, encrypting the victim’s data and servers, as well as ransoming their
            sensitive data on their public leak site. While most recent hacks and attempts have targeted healthcare
            systems,  such  as Ascension  Healthcare,  Black Basta  is also  responsible  for  several significant  hacks
            such as the attack on Dish Network, the American Dental Association, The Toronto Public Library system,
            Capita, ABB and many more.

            Today, Black Basta remains at large. The group’s structure has shifted, splitting off into smaller groups
            that can be linked through their similar attack practices  and vulnerabilities.  That said, there are ways to
            protect yourself and your organization from these threat actors.



            Prevention and Protection

            In response to the increasing cyber threats identified as the Black Basta group by the Cybersecurity and
            Infrastructure Security Agency (CISA), the Federal Bureau of Investigation  (FBI) and the Department of
            Health  and  Human  Services  (HHS),  healthcare  facilities  are  actively  searching  for  stronger  system
            security.  In their  advisory  they  offered  preventive  options  and  response  mitigation  suggestions  every
            organization should look into. These included:

               •  Backing up data regularly
               •  Storing data offline or off-network
               •  Continuously updating software and hardware as the latest security patches are released
               •  Using strong passwords and multi-factor authentication for all accounts and systems
               •  Requiring all employees to receive training on recognizing and avoiding phishing attempts
               •  Implementing network segmentation and access control policies to limit the exposure of sensitive
                   data and systems
               •  Using antivirus software and firewalls to detect and block malicious traffic and activity
               •  Reporting any ransomware incidents to your local FBI field office or CISA



            While  all  organizations  are  advised  to  utilize  antivirus  software,  use  caution  with  suspicious  emails,
            educate staff about phishing and back up their data, organizations are now also advised to bulk up their
            protection  through  more proactive  approaches,  such as is provided  by the IGEL Preventative  Security
            Model.

            This  model  prioritizes  proactive  prevention  over  merely  reactive  measures,  ensuring  that  healthcare
            organizations are responsive and fortified ahead of sophisticated  malware and ransomware attacks that




            Cyber Defense eMagazine – July 2024 Edition                                                                                                                                                                                                          115
            Copyright © 2024, Cyber Defense Magazine. All rights reserved worldwide.
   110   111   112   113   114   115   116   117   118   119   120