SecOpsNews / news

RSS items as GitHub Issues for the discerning engineering leader or security professional
http://secops.thechels.uk/
MIT License
53 stars 1 forks source link

[CISA] #StopRansomware: Black Basta #28379

Closed github-actions[bot] closed 3 weeks ago

github-actions[bot] commented 1 year ago

SUMMARY

Note: This joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) to help organizations protect against ransomware. Visit stopransomware.gov to see all #StopRansomware advisories and to learn more about other ransomware threats and no-cost resources.

The Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), Department of Health and Human Services (HHS), and Multi-State Information Sharing and Analysis Center (MS-ISAC) (hereafter referred to as the authoring organizations) are releasing this joint CSA to provide information on Black Basta, a ransomware variant whose actors have encrypted and stolen data from at least 12 out of 16 critical infrastructure sectors, including the Healthcare and Public Health (HPH) Sector.

This joint CSA provides TTPs and IOCs obtained from FBI investigations and third-party reporting. Black Basta is considered a ransomware-as-a-service (RaaS) variant and was first identified in April 2022. Black Basta affiliates have impacted a wide range of businesses and critical infrastructure in North America, Europe, and Australia. As of May 2024, Black Basta affiliates have impacted over 500 organizations globally.

Black Basta affiliates use common initial access techniques—such as phishing and exploiting known vulnerabilities—and then employ a double-extortion model, both encrypting systems and exfiltrating data. Ransom notes do not generally include an initial ransom demand or payment instructions. Instead, the notes provide victims with a unique code and instructs them to contact the ransomware group via a .onion URL (reachable through the Tor browser). Typically, the ransom notes give victims between 10 and 12 days to pay the ransom before the ransomware group publishes their data on the Black Basta TOR site, Basta News.

Healthcare organizations are attractive targets for cybercrime actors due to their size, technological dependence, access to personal health information, and unique impacts from patient care disruptions. The authoring organizations urge HPH Sector and all critical infrastructure organizations to apply the recommendations in the Mitigations section of this CSA to reduce the likelihood of compromise from Black Basta and other ransomware attacks. Victims of ransomware should report the incident to their local FBI field office or CISA (see the Reporting section for contact information).

TECHNICAL DETAILS

Note: This advisory uses the MITRE ATT&CK for Enterprise framework, version 15. See the MITRE ATT&CK Tactics and Techniques section for a table of the threat actors’ activity mapped to MITRE ATT&CK® tactics and techniques. For assistance with mapping malicious cyber activity to the MITRE ATT&CK framework, see CISA and MITRE ATT&CK’s Best Practices for MITRE ATT&CK Mapping and CISA’s Decider Tool.

Initial Access

Black Basta affiliates primarily use spearphishing [ T1566] to obtain initial access. According to cybersecurity researchers, affiliates have also used Qakbot during initial access.[ 1]

Starting in February 2024, Black Basta affiliates began exploiting ConnectWise vulnerability CVE-2024-1709 [ CWE-288] [ T1190]. In some instances, affiliates have been observed abusing valid credentials [ T1078].

Discovery and Execution

Black Basta affiliates use tools such as SoftPerfect network scanner ( netscan.exe) to conduct network scanning. Cybersecurity researchers have observed affiliates conducting reconnaissance using utilities with innocuous file names such as Intel or Dell, left in the root drive C:\ [ T1036].[ 1]

Lateral Movement

Black Basta affiliates use tools such as BITSAdmin and PsExec, along with Remote Desktop Protocol (RDP), for lateral movement. Some affiliates also use tools like Splashtop, Screen Connect, and Cobalt Strike beacons to assist with remote access and lateral movement.

Privilege Escalation and Lateral Movement

Black Basta affiliates use credential scraping tools like Mimikatz for privilege escalation. According to cybersecurity researchers, Black Basta affiliates have also exploited ZeroLogon ( CVE-2020-1472, [ CWE-330]), NoPac ( CVE-2021-42278 [ CWE-20] and CVE-2021-42287 [ CWE-269]), and PrintNightmare ( CVE-2021-34527, [ CWE-269]) vulnerabilities for local and Windows Active Domain privilege escalation [ T1068].[ 1],[ 2]

Exfiltration and Encryption

Black Basta affiliates use RClone to facilitate data exfiltration prior to encryption. Prior to exfiltration, cybersecurity researchers have observed Black Basta affiliates using PowerShell [ T1059.001] to disable antivirus products, and in some instances, deploying a tool called Backstab, designed to disable endpoint detection and response (EDR) tooling [ T1562.001].[ 3] Once antivirus programs are terminated, a ChaCha20 algorithm with an RSA-4096 public key fully encrypts files [ T1486]. A .basta or otherwise random file extension is added to file names and a ransom note titled readme.txt is left on the compromised system.[ 4] To further inhibit system recovery, affiliates use the vssadmin.exe program to delete volume shadow copies [ T1490].[ 5]

Leveraged Tools

See Table 1 for publicly available tools and applications used by Black Basta affiliates. This includes legitimate tools repurposed for their operations.

Disclaimer: Use of these tools and applications should not be attributed as malicious without analytical evidence to support threat actor use and/or control.

Table 1: Tools Used by Black Basta AffiliatesTool Name**Description**BITSAdminA command-line utility that manages downloads/uploads between a client and server by using the Background Intelligent Transfer Service (BITS) to perform asynchronous file transfers.Cobalt StrikeA penetration testing tool used by security professions to test the security of networks and systems. Black Basta affiliates have used it to assist with lateral movement and file execution.MimikatzA tool that allows users to view and save authentication credentials such as Kerberos tickets. Black Basta affiliates have used it to aid in privilege escalation.PSExecA tool designed to run programs and execute commands on remote systems.PowerShellA cross-platform task automation solution made up of a command-line shell, a scripting language, and a configuration management framework, which runs on Windows, Linux, and macOS.RCloneA command line program used to sync files with cloud storage services such as Mega.SoftPerfectA network scanner ( netscan.exe) used to ping computers, scan ports, discover shared folders, and retrieve information about network devices via Windows Management Instrumentation (WMI), Simple Network Management Protocol (SNMP), HTTP, Secure Shell (SSH) and PowerShell. It also scans for remote services, registry, files, and performance counters. ScreenConnectRemote support, access, and meeting software that allows users to control devices remotely over the internet.SplashtopRemote desktop software that allows remote access to devices for support, access, and collaboration.WinSCPWindows Secure Copy is a free and open source SSH File Transfer Protocol, File Transfer Protocol, WebDAV, Amazon S3, and secure copy protocol client. Black Basta affiliates have used it to transfer data from a compromised network to actor-controlled accounts.

MITRE ATT&CK TACTICS AND TECHNIQUES

See Tables 2–6 for all referenced threat actor tactics and techniques in this advisory.

Table 2: Black Basta ATT&CK Techniques for Initial AccessTechnique Title**ID**UsePhishingT1566Black Basta affiliates have used spearphishing emails to obtain initial access.Exploit Public-Facing ApplicationT1190Black Basta affiliates have exploited ConnectWise vulnerability CVE-2024-1709 to obtain initial access.

Table 3: Black Basta ATT&CK Techniques for Privilege EscalationTechnique Title**ID**UseExploitation for Privilege EscalationT1068Black Basta affiliates have used credential scraping tools like Mimikatz, Zerologon, NoPac and PrintNightmare for privilege escalation.

Table 4: Black Basta ATT&CK Techniques for Defense EvasionTechnique Title**ID**UseMasqueradingT1036Black Basta affiliates have conducted reconnaissance using utilities with innocuous file names, such as Intel or Dell, to evade detection.Impair Defenses: Disable or Modify ToolsT1562.001

Black Basta affiliates have deployed a tool called Backstab to disable endpoint detection and response (EDR) tooling.

Black Basta affiliates have used PowerShell to disable antivirus products.

Table 5: Black Basta ATT&CK Techniques for ExecutionTechnique Title**ID**UseCommand and Scripting Interpreter: PowerShellT1059.001Black Basta affiliates have used PowerShell to disable antivirus products.

Table 6: Black Basta ATT&CK Techniques for ImpactTechnique Title**ID**UseInhibit System RecoveryT1490Black Basta affiliates have used the vssadmin.exe program to delete shadow copies. Data Encrypted for ImpactT1486Black Basta affiliates have used a public key to fully encrypt files.

INDICATORS OF COMPROMISE

See Table 7 for IOCs obtained from FBI investigations.

Table 7: Malicious Files Associated with Black Basta RansomwareHash**Description**0112e3b20872760dda5f658f6b546c85f126e803e27f0577b294f335ffa5a298rclone.exed3683beca3a40574e5fd68d30451137e4a8bbaca8c428ebb781d565d6a70385eWinscp.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

See Tables 8–11 for IOCs obtained from trusted third-party reporting.

Disclaimer: The authoring organizations recommend network defenders investigate or vet IP addresses prior to taking action, such as blocking, as many cyber actors are known to change IP addresses, sometimes daily, and some IP addresses may host valid domains.

Table 8: Network IndicatorsIP Address**Description**66.249.66[.]180gpw.588027fa.dns.realbumblebee[.]net, dns.trailshop[.]net, dns.artspathgroupe[.]net66.249.66[.]18my.2a91c002002.588027fa.dns.realbumblebee[.]net66.249.66[.]18fy9.39d9030e5d3a8e2352daae2f4cd3c417b36f64c6644a783b9629147a1.afd8b8a4615358e0313bad8c544a1af0d8efcec0e8056c2c8eee96c7.b06d1825c0247387e38851b06be0272b0bd619b7c9636bc17b09aa70.a46890f27.588027fa.dns.realbumblebee[.]net95.181.173[.]227adslsdfdsfmo[.]worldfy9.36c44903529fa273afff3c9b7ef323432e223d22ae1d625c4a3957d57.015c16eff32356bf566c4fd3590c6ff9b2f6e8c587444ecbfc4bcae7.f71995aff9e6f22f8daffe9d2ad9050abc928b8f93bb0d42682fd3c3.445de2118.588027fa.dns.realbumblebee[.]net207.126.152[.]242xkpal.d6597fa.dns.blocktoday.net

nuher.3577125d2a75f6a277fc5714ff536c5c6af5283d928a66daad6825b9a.7aaf8bba88534e88ec89251c57b01b322c7f52c7f1a5338930ae2a50.cbb47411f60fe58f76cf79d300c03bdecfb9e83379f59d80b8494951.e10c20f77.7fcc0eb6.dns.blocktoday[.]net72.14.196[.]50.rasapool[.]net, dns.trailshop[.]net72.14.196[.]192.rasapool[.]net72.14.196[.]2.rasapool[.]net72.14.196[.]226.rasapool[.]net46.161.27[.]151207.126.152[.]242nuher.1d67bbcf4.456d87aa6.2d84dfba.dns.specialdrills[.]com185.219.221[.]13664.176.219[.]1065.78.115[.]67your-server[.]de207.126.152[.]242xkpal.1a4a64b6.dns.blocktoday[.]net46.8.16[.]77185.7.214[.]79VPN Server185.220.100[.]240Tor exit107.189.30[.]69Tor exit5.183.130[.]92185.220.101[.]149Tor exit188.130.218[.]39188.130.137[.]18146.8.10[.]134155.138.246[.]12280.239.207[.]200winklen[.]ch183.181.86[.]147Xserver[.]jp34.149.120[.]3104.21.40[.]7234.250.161[.]14988.198.198[.]90your-server[.]de; literoved[.]ru151.101.130[.]15935.244.153[.]4435.212.86[.]5534.251.163[.]23634.160.81[.]20334.149.36[.]179104.21.26[.]14583.243.40[.]1035.227.194[.]5135.190.31[.]5434.120.190[.]48116.203.186[.]17834.160.17[.]71Table 9: File IndicatorsFilename**Hash**C:\Users\Public\Audio\Jun.exeb6a4f4097367d9c124f51154d8750ea036a812d5badde0baf9c5f183bb53dd24C:\Users\Public\Audio\esx.zipC:\Users\Public\Audio\7zG.exef21240e0bf9f0a391d514e34d4fa24ecb997d939379d2260ebce7c693e55f061C:\Users\Public\Audio\7z.dllC:\Users\Public\Audio\db_Usr.sqlC:\Users\Public\Audio\hv2.ps1C:\Users\Public\7zG.exeC:\Users\Public\7z.dllC:\Users\Public\BitLogic.dllC:\Users\Public\NetApp.exe4c897334e6391e7a2fa3cbcbf773d5a4C:\Users\Public\DataSoft.exe2642ec377c0cee3235571832cb472870C:\Users\Public\BitData.exeb3fe23dd4701ed00d79c03043b0b952eC:\Users\Public\DigitalText.dllC:\Users\Public\GeniusMesh.exe\Device\Mup\{redacted}\C$\Users\Public\Music\PROCEXP.sys\Device\Mup\{redacted}\C$\Users\Public\Music\DumpNParse86.exe\Device\Mup\{redacted}\C$\Users\Public\Music\POSTDump.exe\Device\Mup\{redacted}\C$\Users\Public\Music\DumpNParse.exeC:\Users\Public\socksps.ps1C:\Users\Public\Thief.exe034b5fe047920b2ae9493451623633b14a85176f5eea0c7aadc110ea1730ee79C:\Users\All Users\{redacted}\GWT.ps1  C:\Program Files\MonitorIT\GWT.ps1 8C68B2A794BA3D148CAE91BDF9C8D357289752A94118B5558418A36D95A5A45F

Winx86.exe

Comment: alias for cmd.exe

C:\Users\Public\eucr.exe3c65da7f7bfdaf9acc6445abbedd9c4e927d37bb9e3629f34afc338058680407C:\Windows\DS_c1.dll808c96cb90b7de7792a827c6946ff48123802959635a23bf9d98478ae6a259f9C:\Windows\DS_c1.dll3a8fc07cadc08eeb8be342452636a754158403c3d4ebff379a4ae66f8298d9a6C:\Windows\DS_c1.dll4ac69411ed124da06ad66ee8bfbcea2f593b5b199a2c38496e1ee24f9d04f34aC:\Windows\DS_c1.dll819cb9bcf62be7666db5666a693524070b0df589c58309b067191b30480b0c3aC:\Windows\DS_c1.dllc26a5cb62a78c467cc6b6867c7093fbb7b1a96d92121d4d6c3f0557ef9c881e0C:\Windows\DS_c1.dlld503090431fdd99c9df3451d9b73c5737c79eda6eb80c148b8dc71e84623401f*\instructions_read_me.txtTable 10: Known Black Basta Cobalt Strike DomainsDomain**Date/Time (UTC)/Time (UTC)**trailshop[.]net5/8/2024 6:37realbumblebee[.]net5/8/2024 6:37recentbee[.]net5/8/2024 6:37investrealtydom[.]net5/8/2024 6:37webnubee[.]com5/8/2024 6:37artspathgroup[.]net5/8/2024 6:37buyblocknow[.]com5/8/2024 6:37currentbee[.]net5/8/2024 6:37modernbeem[.]net5/8/2024 6:37startupbusiness24[.]net5/8/2024 6:37magentoengineers[.]com5/8/2024 6:37childrensdolls[.]com5/8/2024 6:37myfinancialexperts[.]com5/8/2024 6:37limitedtoday[.]com5/8/2024 6:37kekeoamigo[.]com5/8/2024 6:37nebraska-lawyers[.]com5/8/2024 6:37tomlawcenter[.]com5/8/2024 6:37thesmartcloudusa[.]com5/8/2024 6:37rasapool[.]net5/8/2024 6:37artspathgroupe[.]net5/8/2024 6:37specialdrills[.]com5/8/2024 6:37thetrailbig[.]net5/8/2024 6:37consulheartinc[.]com3/22/2024 15:35otxcosmeticscare[.]com3/15/2024 10:14otxcarecosmetics[.]com3/15/2024 10:14artstrailman[.]com3/15/2024 10:14ontexcare[.]com3/15/2024 10:14trackgroup[.]net3/15/2024 10:14businessprofessionalllc[.]com3/15/2024 10:14securecloudmanage[.]com3/7/2024 10:42oneblackwood[.]com3/7/2024 10:42buygreenstudio[.]com3/7/2024 10:42startupbuss[.]com3/7/2024 10:42onedogsclub[.]com3/4/2024 18:26wipresolutions[.]com3/4/2024 18:26recentbeelive[.]com3/4/2024 18:26trailcocompany[.]com3/4/2024 18:26trailcosolutions[.]com3/4/2024 18:26artstrailreviews[.]com3/4/2024 18:26usaglobalnews[.]com2/15/2024 5:56topglobaltv[.]com2/15/2024 5:56startupmartec[.]net2/15/2024 5:56technologgies[.]com1/2/2024 18:16jenshol[.]com1/2/2024 18:16simorten[.]com1/2/2024 18:16investmentgblog[.]net1/2/2024 18:16protectionek[.]com1/2/2024 18:16_Table 11: Suspected Black Basta Domains_airbusco[.]netallcompanycenter[.]comanimalsfast[.]netaudsystemecll[.]netauuditoe[.]combluenetworking[.]netbrendonline[.]combusinesforhome[.]comcaspercan[.]comclearsystemwo[.]netcloudworldst[.]netconstrtionfirst[.]comerihudeg[.]comgarbagemoval[.]comgartenlofti[.]comgetfnewsolutions[.]comgetfnewssolutions[.]cominvestmendvisor[.]netinvestmentrealtyhp[.]netionoslaba[.]comjessvisser[.]comkarmafisker[.]comkolinileas[.]commaluisepaul[.]commasterunix[.]netmonitor-websystem[.]netmonitorsystem[.]netmytrailinvest[.]netprettyanimals[.]netreelsysmoona[.]netseohomee[.]comseptcntr[.]comsoftradar[.]netstartupbizaud[.]netstartuptechnologyw[.]netsteamteamdev[.]netstockinvestlab[.]nettaskthebox[.]nettrailgroupl[.]nettreeauwin[.]netunitedfrom[.]comunougn[.]comwardeli[.]comwelausystem[.]netwellsystemte[.]netwithclier[.]com

MITIGATIONS

The authoring organizations recommend all critical infrastructure organizations implement the mitigations below to improve your organization’s cybersecurity posture based on Black Basta’s activity. These mitigations align with the Cross-Sector Cybersecurity Performance Goals (CPGs) developed by CISA and the National Institute of Standards and Technology (NIST). The CPGs provide a minimum set of practices and protections that CISA and NIST recommend all organizations implement. CISA and NIST based the CPGs on existing cybersecurity frameworks and guidance to protect against the most common and impactful threats, tactics, techniques, and procedures. Visit CISA’s Cross-Sector Cybersecurity Performance Goals for more information on the CPGs, including additional recommended baseline protections.

The authoring organizations also recommend network defenders of HPH Sector and other critical infrastructure organizations to reference CISA’s Mitigation Guide: Healthcare and Public Health (HPH) Sector and HHS’s HPH Cybersecurity Performance Goals, which provide best practices to combat pervasive cyber threats against organizations. Recommendations include the following:

VALIDATE SECURITY CONTROLS

In addition to applying mitigations, the authoring organizations recommend exercising, testing, and validating your organization’s security program against the threat behaviors mapped to the MITRE ATT&CK for Enterprise framework in this advisory. The authoring organizations recommend testing your existing security controls inventory to assess how they perform against the ATT&CK techniques described in this advisory.

To get started:

  1. Select an ATT&CK technique described in this advisory (see Tables 2-6).
  2. Align your security technologies against the technique.
  3. Test your technologies against the technique.
  4. Analyze your detection and prevention technologies’ performance.
  5. Repeat the process for all security technologies to obtain a set of comprehensive performance data.
  6. Tune your security program, including people, processes, and technologies, based on the data generated by this process.

The authoring organizations recommend continually testing your security program, at scale, in a production environment to ensure optimal performance against the MITRE ATT&CK techniques identified in this advisory.

REFERENCES

  1. SentinelOne: Black Basta Ransomware | Attacks Deploy Custom EDR Evasion Tools Tied to FIN7 Threat Actor
  2. Trend Micro: Ransomware Spotlight - Black Basta
  3. Kroll: Black Basta - Technical Analysis
  4. Who Is Black Basta? (blackberry.com)
  5. Palo Alto Networks: Threat Assessment - Black Basta Ransomware

REPORTING

Your organization has no obligation to respond or provide information back to FBI in response to this joint CSA. If, after reviewing the information provided, your organization decides to provide information to FBI, reporting must be consistent with applicable state and federal laws.

FBI is interested in any information that can be shared, to include boundary logs showing communication to and from foreign IP addresses, a sample ransom note, communications with threat actors, Bitcoin wallet information, decryptor files, and/or a benign sample of an encrypted file.

Additional details of interest include: a targeted company point of contact, status and scope of infection, estimated loss, operational impact, transaction IDs, date of infection, date detected, initial attack vector, and host- and network-based indicators.

FBI, CISA, and HHS do not encourage paying ransom as payment does not guarantee victim files will be recovered. Furthermore, payment may also embolden adversaries to target additional organizations, encourage other criminal actors to engage in the distribution of ransomware, and/or fund illicit activities. Regardless of whether you or your organization have decided to pay the ransom, FBI and CISA urge you to promptly report ransomware incidents to FBI’s Internet Crime Complain Center (IC3), a local FBI Field Office, or CISA via the agency’s Incident Reporting System or its 24/7 Operations Center ( report@cisa.gov or by calling 1-844-Say-CISA [1-844-729-2472]).

DISCLAIMER

The information in this report is being provided “as is” for informational purposes only. FBI, CISA, HHS, and MS-ISAC do not endorse any commercial entity, product, company, or service, including any entities, products, or services linked within this document. Any reference to specific commercial entities, products, processes, or services by service mark, trademark, manufacturer, or otherwise, does not constitute or imply endorsement, recommendation, or favoring by FBI, CISA, HHS, and MS-ISAC.

VERSION HISTORY

May 10, 2024: Initial version.

https://www.cisa.gov/news-events/cybersecurity-advisories/aa24-131a

github-actions[bot] commented 3 weeks ago

This issue is stale because it has been open 1 day with no activity. Remove stale label or comment or this will be closed in 1 day.

github-actions[bot] commented 3 weeks ago

This issue was closed because it has been stale with no activity.