Shockingly, individual losses were significant, with one victim losing $9 million and 17 others parting with over $1 million each. The group, suspected that they have links with the now-disbanded Conti Group, employs advanced double-extortion techniques in their cybercrimes.
A drop in attacks during the latter part of this year is credited to authorities dismantling the Qakbot malware’s botnet in August the tool frequently used by Black Basta. Investigation into Bitcoin blockchain connections indicates that 10% of the ransom funds were transferred to the Qakbot platform during its operation.
Using Elliptic Investigator, researchers exposed the gang’s money laundering activities lead to tracing millions of dollars to Garantex and a Russian cryptocurrency exchange that was also facing sanctions. Surprisingly, 35% of Black Basta’s victims opted to pay the ransom highlighting the unfortunate reality that many organizations succumb to the pressures of ransomware attacks.
Being Effective in managing IT security and staying informed about emerging threats while fostering collaboration between the public and private sectors are crucial in the ongoing fight against cybercrime.
Related Articles
Unprecedented Data Breach Exposes Millions to Identity Theft at Mr. Cooper
Mr. Cooper, a leading U.S. mortgage servicer, has revealed a significant data breach that occurred on October 30, 2023, impacting nearly 14.7 million individuals, comprising both current and former customers. The details of this breach were outlined in an SEC filing...
Hiring Managers Become Latest Targets of Emerging Malware Scam.
Hiring Managers Become Latest Targets of Emerging Malware Scam. In online security, a fresh threat has surfaced, and it's targeting hiring managers and recruiters. Let's take a closer look at this cyber danger and understand how it works. The TA4557 Cyber Threat...
Trojan-Proxy Exploits Target macOS Users via Cracked Software
Trojan-Proxy Exploits Target macOS Users via Cracked Software Cybersecurity experts have uncovered a growing threat to macOS users through a Trojan-proxy embedded within cracked applications distributed on unauthorized websites. This insidious malware not only poses...

