Shockingly, individual losses were significant, with one victim losing $9 million and 17 others parting with over $1 million each. The group, suspected that they have links with the now-disbanded Conti Group, employs advanced double-extortion techniques in their cybercrimes.
A drop in attacks during the latter part of this year is credited to authorities dismantling the Qakbot malware’s botnet in August the tool frequently used by Black Basta. Investigation into Bitcoin blockchain connections indicates that 10% of the ransom funds were transferred to the Qakbot platform during its operation.
Using Elliptic Investigator, researchers exposed the gang’s money laundering activities lead to tracing millions of dollars to Garantex and a Russian cryptocurrency exchange that was also facing sanctions. Surprisingly, 35% of Black Basta’s victims opted to pay the ransom highlighting the unfortunate reality that many organizations succumb to the pressures of ransomware attacks.
Being Effective in managing IT security and staying informed about emerging threats while fostering collaboration between the public and private sectors are crucial in the ongoing fight against cybercrime.
Related Articles
Google Chrome Fixes Empty Tabs Issue
Many web browsers have encountered issues with displaying webpages correctly, and a recent bug in Google Chrome caused frustration for users who experienced temporary page disappearance when switching tabs. The Problem Reports surfaced on online forums where users...
The Importance of Keeping Your Browser Updated
Is your browser updated? What about your company’s preferred browser? If not, your business, employees, and customers might be facing security vulnerabilities on its various operating systems. A Recent Example of Google Chrome V8’s Cybersecurity Vulnerability...
Essential IT Policies Every Business Should Have
Clear information technology (IT) policies make up part of the backbone of a secure and thriving business. Companies are becoming more reliant on IT, necessitating guidelines that protect both the technology and the business. Let’s explore these guidelines and their...

