Shockingly, individual losses were significant, with one victim losing $9 million and 17 others parting with over $1 million each. The group, suspected that they have links with the now-disbanded Conti Group, employs advanced double-extortion techniques in their cybercrimes.
A drop in attacks during the latter part of this year is credited to authorities dismantling the Qakbot malware’s botnet in August the tool frequently used by Black Basta. Investigation into Bitcoin blockchain connections indicates that 10% of the ransom funds were transferred to the Qakbot platform during its operation.
Using Elliptic Investigator, researchers exposed the gang’s money laundering activities lead to tracing millions of dollars to Garantex and a Russian cryptocurrency exchange that was also facing sanctions. Surprisingly, 35% of Black Basta’s victims opted to pay the ransom highlighting the unfortunate reality that many organizations succumb to the pressures of ransomware attacks.
Being Effective in managing IT security and staying informed about emerging threats while fostering collaboration between the public and private sectors are crucial in the ongoing fight against cybercrime.
Related Articles
What Happens After a Ransomware Attack?
What Happens After a Ransomware Attack? RANSOMWARE ATTACKS have unfortunately become a REAL PROBLEM for many of us. They're causing trouble for some Businesses nd Institutions and sometimes even disrupt people's lives. So, what's the Aftermath of a Ransomware Attack...
What to expect during a Ransomware attack
What to expect during a Ransomware attack? Ransomware, a malicious software, has a modus operandi that involves encrypting your precious data and subsequently extorting a ransom for its decryption. Here’s how such an attack often progresses. Ransomware typically...
How Cyber-criminals Infiltrate Networks?
HOW CYBER-CRIMINALS INFILTRATE NETWORKS? CYBER-CRIMINALS are constantly on the lookout for opportunities to Infiltrate Networks and Compromise Security. Their objective is to either STEAL DATA, ACQUIRE MONEY or INDUCE CHAOS by exploiting vulnerabilities and gaining...

