Black Basta Threat Actor Emerges as a Major Threat to the Healthcare Industry
Update May 10, 2024, 6:06 pm ET.
New indicators of compromise (IOCs) and tactics, techniques, and procedures (TTPs) were made available through a joint Cybersecurity Advisory (CSA) from the Cybersecurity and Infrastructure Security Agency (CISA). Health-ISAC is sharing the updated information for overall awareness and action. The Health-ISAC bulletin, plus this CSA serves as a reminder of the recent Black Basta ransomware activity, whose actors have encrypted and stolen data from at least 12 of the 16 critical infrastructure sectors, including the Healthcare and Public Health (HPH) Sector.
The notorious ransomware group, Black Basta, has recently accelerated attacks against the healthcare sector. Health-ISAC is urging all Healthcare and Public Health (HPH) sector entities to review this threat bulletin and follow the recommended actions below.
May 10, 2024.
Black Basta emerged in early 2022 and quickly became one of the most active ransomware-as-a-service
(RaaS) threat actors. They use double extortion tactics, encrypting victims’ data and threatening to leak
sensitive information on their public leak site on Tor, named Basta News. The group has allegedly extorted
over 100 million dollars since its emergence, making it one of the most prolific active ransomware strains.
The threat actor is financially motivated and has opportunistically targeted the healthcare sector as a part of
their malicious operations. In the past month, at least two healthcare organizations, in Europe and in the
United States, have fallen victim to Black Basta ransomware and have suffered severe operational
disruptions. Taking these latest developments into consideration, Health-ISAC has assessed that Black
Basta represents a significant threat to the healthcare sector. Members are strongly advised to keep an eye
on the threat actor and their tactics, techniques and procedures (TTPs).
Black Basta’s malware, written in C++, targets both Windows and Linux systems. It encrypts data using
ChaCha20 and RSA-4096 and attempts to delete shadow copies and backups.
Please see the PDF for the full bulletin.
- Related Resources & News
- Leveraging ISO 81001-5-1 Amid Medical Device Procurement
- Mitigating risk as healthcare supply chain attacks prevail
- Enhancing Cybersecurity in Rural Hospitals
- Health-ISAC Hacking Healthcare 11-15-2024
- Cyber Incident Response: Playbook for Medical Product Makers
- Feds Warn of Godzilla Webshell Threats to Health Sector
- Trump’s Return: Impact on Health Sector Cyber, HIPAA Regs
- Health-ISAC Hacking Healthcare 11-7-2024
- Protecting the Healthcare Supply Chain Against Russian Ransomware Attacks
- All hospitals should be concerned about cyberattacks. Here’s why