BlogNews25TH OCT 2024
AuthorSamir Yawar
4 min read
News

BlackBasta Ransomware Tactics: Using Microsoft Teams for Cyberattacks

Twitter
Facebook
WhatsApp
Email
LinkedIn
blackbasta ransomware blog image

BlackBasta, a notorious ransomware group, has recently evolved its tactics to target corporations through Microsoft Teams, disguising themselves as help desk personnel. This new approach is a troubling development in social engineering attacks, showing how cybercriminals are adapting to breach security through sophisticated impersonation methods.

Since emerging in April 2022, BlackBasta has been involved in hundreds of ransomware attacks on businesses worldwide. Initially, the group gained notoriety following the disbanding of the Conti cybercrime syndicate. While the Conti group fractured into several splinter groups after significant data leaks, BlackBasta quickly rose as a formidable faction from this breakup.

How BlackBasta Operates: Key Attack Vectors

To access corporate networks, BlackBasta employs a range of methods:

  • Exploiting System Vulnerabilities: By finding weak spots in company systems.

  • Collaborations with Botnets: Partnering with botnets to spread malware.

  • Social Engineering Tactics: Conducting phishing campaigns and manipulating employees.

Social Engineering in Action: Overloading Inboxes

Earlier this year, BlackBasta launched a wave of social engineering attacks focusing on employee inboxes:

  1. Flooding Emails: The attackers inundate targeted employees with non-malicious emails, including newsletters, sign-up confirmations, and other notifications, filling inboxes with thousands of messages.

  2. Posing as IT Support: After creating chaos in the inbox, BlackBasta members contact employees by phone, impersonating the company’s IT support. They offer to help manage the “spam attack,” using this trust to request remote access.

  3. Using Remote Tools: Victims are guided to install the AnyDesk remote access tool or open Windows Quick Assist. With these tools, attackers execute scripts to gain unauthorized access, installing malicious software like ScreenConnect, NetSupport Manager, and Cobalt Strike for continuous control.

The Move to Microsoft Teams: A New Tactic

In October, ReliaQuest reported that BlackBasta affiliates shifted from phone-based social engineering to a new approach on Microsoft Teams:

  • Impersonating IT Help Desk on Teams: Attackers now masquerade as IT help desk personnel on Microsoft Teams, contacting employees directly through external accounts. These accounts, created under Entra ID, appear genuine with names such as “securityadminhelper.onmicrosoft[.]com” or “supportadministrator.onmicrosoft[.]com.”

  • Creating Trust with Display Names: The attackers set their display names to include “Help Desk” or similar phrases to appear credible. By positioning themselves in OneOnOne chats, they foster a sense of urgency and legitimacy.

  • Sending QR Codes: Occasionally, they also send QR codes that link to domains like “qr-s1[.]com.” Although the QR code’s purpose remains unclear, researchers suspect it may play a role in the group’s manipulation tactics.

The Goal: Gaining Remote Access and Lateral Movement

After establishing initial contact, BlackBasta aims to trick employees into installing AnyDesk or launching Quick Assist for device access. Once connected, the attackers deploy malicious payloads such as “AntispamAccount.exe” and “AntispamUpdate.exe,” often flagged on security platforms as dangerous.

These payloads ultimately lead to the installation of Cobalt Strike, a powerful tool allowing BlackBasta to fully compromise the device. From here, they can expand their reach within the corporate network, elevate privileges, exfiltrate data, and deploy ransomware to encrypt files.

Recommendations for Organizations: How to Mitigate Risk

With BlackBasta’s tactics constantly evolving, organizations need robust security strategies to counter these threats. ReliaQuest suggests several key steps:

  • Limit External Communication on Microsoft Teams: Restrict communication with external users unless verified and necessary.

  • Enable Logging and Monitor Chats: Activate chat logging, especially for “ChatCreated” events, to track unusual activity and identify potential risks.

  • Employee Training and Awareness: Regularly educate employees on social engineering tactics and the importance of verifying unexpected IT support contacts.

Conclusion

As ransomware groups like BlackBasta and DarkAngels develop increasingly sophisticated social engineering tactics, vigilance and proactive security measures are crucial. Companies can protect their networks by maintaining strict communication protocols, ensuring rigorous logging, and empowering employees with knowledge of the latest threat landscapes.

Samir Yawar
Samir Yawar / Content Lead
Samir wants a world where people can instinctively whack online scams and feel accomplished without the need for psychic powers. As an ISC2 member, he is doing his bit to turn cybersecurity awareness training into a fun concept with simple, approachable and accessible content. Reach out to him at X @yawarsamir
FAQsFrequently Asked Questions
Ransomware attacks can result in data loss, financial losses, operational disruptions, and reputational damage. Depending on the severity of the attack and the importance of the encrypted data, organizations and individuals may face significant consequences.