Podcast Cover

Cybersecurity Advisory - United States

  • Advisory - Black Basta - CISA #StopRansomware

    22 MAY 2024 · In a coordinated effort to combat the growing threat of ransomware, the Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), Department of Health and Human Services (HHS), and Multi-State Information Sharing and Analysis Center (MS-ISAC) have released a joint Cybersecurity Advisory (CSA) detailing the tactics, techniques, and procedures (TTPs) of the Black Basta ransomware variant. The advisory, published on May 10, 2024, is part of the ongoing #StopRansomware campaign, which aims to provide critical information to network defenders to help protect against ransomware attacks. Black Basta, a ransomware-as-a-service (RaaS) variant first identified in April 2022, has been targeting organizations across at least 12 out of 16 critical infrastructure sectors, including the Healthcare and Public Health (HPH) Sector. According to the advisory, Black Basta affiliates have impacted over 500 organizations globally as of May 2024. The threat actors employ common initial access techniques, such as phishing and exploiting known vulnerabilities, before deploying a double-extortion model, encrypting systems and exfiltrating data. Victims are provided with a unique code and instructed to contact the ransomware group via a .onion URL, accessible through the Tor browser, to receive ransom demands and payment instructions. The joint advisory emphasizes the attractiveness of healthcare organizations as targets for cybercrime actors due to their size, technological dependence, access to personal health information, and the potential for patient care disruptions. To mitigate the risk of Black Basta and other ransomware attacks, the authoring organizations urge HPH Sector and all critical infrastructure organizations to implement the recommendations outlined in the advisory, which align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). Key mitigations include installing updates for operating systems, software, and firmware as soon as they are released, prioritizing the update of Known Exploited Vulnerabilities (KEV), requiring phishing-resistant multi-factor authentication (MFA) for as many services as possible, and implementing recommendations from joint phishing guidance to stop attacks at the initial phase. The advisory also provides a comprehensive list of indicators of compromise (IOCs), including malicious files, network indicators, and known Black Basta Cobalt Strike domains, to help organizations detect and respond to potential Black Basta infections. FBI, CISA, HHS, and MS-ISAC encourage organizations to promptly report ransomware incidents to the appropriate authorities, regardless of whether they have decided to pay the ransom. The authoring organizations emphasize that paying the ransom does not guarantee the recovery of files and may encourage further criminal activity. As the threat of ransomware continues to evolve, the joint advisory serves as a crucial resource for organizations seeking to enhance their cybersecurity posture and protect against the devastating impact of Black Basta and other ransomware variants. By implementing the recommended mitigations and staying vigilant, organizations can significantly reduce their risk of falling victim to these increasingly sophisticated attacks.
    Played 3m 26s

Stay ahead of cyber threats with "Cybersecurity Advisory," the go-to podcast for the latest updates on cybersecurity threats affecting the United States. Designed for professionals, businesses, and anyone concerned with...

show more
Stay ahead of cyber threats with "Cybersecurity Advisory," the go-to podcast for the latest updates on cybersecurity threats affecting the United States. Designed for professionals, businesses, and anyone concerned with digital security, this podcast provides timely and critical information to keep you informed and protected. Each episode covers:
  • Current Threats: In-depth analysis of the latest cyber threats, breaches, and vulnerabilities.
  • Regulatory Updates: Stay updated on the latest laws, regulations, and compliance requirements in the cybersecurity landscape.
  • Incident Response: Learn best practices for responding to cybersecurity incidents and minimizing damage.
Join us on "Cybersecurity Advisory" to stay informed, vigilant, and prepared in the ever-evolving world of cybersecurity. Subscribe now to ensure you never miss an update on critical cybersecurity threats and insights!
show less
Contacts
Information
Author QP3
Categories News
Website -
Email corboo@mac.com

Looks like you don't have any active episode

Browse Spreaker Catalogue to discover great new content

Current

Podcast Cover

Looks like you don't have any episodes in your queue

Browse Spreaker Catalogue to discover great new content

Next Up

Episode Cover Episode Cover

It's so quiet here...

Time to discover new episodes!

Discover
Your Library
Search