Ransomware Rumble: Black Basta & CACTUS Share the Same Nasty Secret!

Threat actors are using the same BackConnect module for both Black Basta and CACTUS ransomware. Affiliates might have switched loyalties, like changing from Pepsi to Coke. This module grants attackers remote control, allowing them to pilfer sensitive data faster than a raccoon in a dumpster.

Pro Dashboard

Hot Take:

Looks like the ransomware world is playing a game of musical chairs, and Black Basta and CACTUS are sharing the same seat! These cybercriminals are using the same BackConnect module like it’s the latest fashion trend in the dark web. Who knew cybercrime could be so collaborative? Next, they’ll be forming a ransomware boy band—BackSync, anyone?

Key Points:

– Black Basta and CACTUS ransomware families are using the same BackConnect module for persistent control.
– The BC module, also known as QBACKCONNECT, has ties to QakBot loader.
– Black Basta has been using email bombing and IT support scams to deploy malware.
– CACTUS ransomware employs similar tactics but had a hiccup in encrypting a network.
– Chat log leaks reveal Black Basta’s internal workings and shared credentials.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?