Shockingly, individual losses were significant, with one victim losing $9 million and 17 others parting with over $1 million each. The group, suspected that they have links with the now-disbanded Conti Group, employs advanced double-extortion techniques in their cybercrimes.
A drop in attacks during the latter part of this year is credited to authorities dismantling the Qakbot malware’s botnet in August the tool frequently used by Black Basta. Investigation into Bitcoin blockchain connections indicates that 10% of the ransom funds were transferred to the Qakbot platform during its operation.
Using Elliptic Investigator, researchers exposed the gang’s money laundering activities lead to tracing millions of dollars to Garantex and a Russian cryptocurrency exchange that was also facing sanctions. Surprisingly, 35% of Black Basta’s victims opted to pay the ransom highlighting the unfortunate reality that many organizations succumb to the pressures of ransomware attacks.
Being Effective in managing IT security and staying informed about emerging threats while fostering collaboration between the public and private sectors are crucial in the ongoing fight against cybercrime.
Related Articles
Data Breach at 23andMe Exposes 7 Million Users
Data Breach at 23andMe Exposes 7 Million Users 23andMe, a prominent DNA testing and ancestry service, has confirmed a significant data breach affecting nearly 7 million of its customers. The breach, which occurred in October, exposed sensitive health-related...
Ransomware Group Targets Roblox and Twitch Through Tipalti Breach
Ransomware Group Targets Roblox and Twitch Through Tipalti Breach In a shocking turn of events, the online gaming community is on high alert as Roblox and Twitch find themselves ensnared in the web of the notorious ALPHV/BlackCat ransomware cartel. The assailants...
Update and Upgrade: Make sure all your software is up-to-date
In an era where cyber threats are constantly evolving, safeguarding your digital presence demands a proactive approach by updating and upgrading of your software for stronger cybersecurity. This article sheds light on the critical importance of this practice in your...

