Security News > 2024 > May > Black Basta Ransomware Struck More Than 500 Organizations Worldwide
![Black Basta Ransomware Struck More Than 500 Organizations Worldwide](/static/build/img/news/black-basta-ransomware-struck-more-than-500-organizations-worldwide-medium.jpg)
A joint cybersecurity advisory from the Federal Bureau of Investigation, Cybersecurity and Infrastructure Security Agency, Department of Health and Human services and Multi-State Information Sharing and Analysis Center was recently released to provide more information about the Black Basta ransomware.
According to cybersecurity company SentinelOne, Black Basta is highly likely tied to FIN7, a threat actor also known as "Carbanak," active since 2012 and affiliated with several ransomware operations.
A countdown starts on the Black Basta Tor site, exposing company names and information about the data Black Basta owns.
According to Kaspersky in its latest findings about the state of ransomware in 2024, Black Basta is ranked the 12th most active ransomware family in 2023, with a 71% rise in the number of victims in 2023 as compared to 2022.
SEE: In 2022, Black Basta was considered one of the most dangerous and destructive ransomware groups.
Cybersecurity company Sophos in its yearly state of ransomware survey noted that, for the first time, more than half of the organizations that had fallen to ransomware admitted they paid the ransom to recover their data in 2023.
News URL
https://www.techrepublic.com/article/black-basta-ransomware-attack/
Related news
- CISA: Black Basta ransomware breached over 500 orgs worldwide (source)
- Black Basta Ransomware Strikes 500+ Entities Across North America, Europe, and Australia (source)
- Uncle Sam urges action after Black Basta ransomware infects Ascension (source)
- Windows Quick Assist abused in Black Basta ransomware attacks (source)
- Crims abusing Microsoft Quick Assist to deploy Black Basta ransomware (source)
- Black Basta ransomware gang linked to Windows zero-day attacks (source)
- Black Basta Ransomware May Have Exploited MS Windows Zero-Day Flaw (source)