ReliaQuest Discovers Innovative Social Engineering Tactic Used by Black Basta

ReliaQuest identified a Black Basta campaign that shifted to social engineering via Microsoft Teams and QR codes to gain initial access, signaling evolving ransomware-like tactics. The campaign shows high activity across multiple sectors, with impersonation of help desk staff and use of remote access tools, aiming to deploy ransomware. #BlackBasta #MicrosoftTeams #QRcodes #AnyDesk #Impacket #CobaltStrike #ReliaQuest

Keypoints

  • Black Basta has shifted tactics to include Microsoft Teams chats and QR codes for social engineering.
  • The group previously relied on overwhelming email spam to initiate contact with users.
  • Attackers impersonate help desk staff using external Microsoft Teams accounts with misleading display names.
  • Malicious QR codes are sent to users, potentially leading to further malicious infrastructure.
  • ReliaQuest has observed a significant increase in email spam and vishing attacks related to this campaign.
  • Recommendations include blocking malicious domains, disabling external Teams communication, and enhancing email security measures.
  • Ongoing training for employees on social engineering tactics is crucial for defense.

MITRE Techniques

  • [T1566] Phishing – β€œAttackers use email spam and Teams messages to trick users into downloading malicious software.”
  • [T1003] Credential Dumping – β€œUsing tools like Impacket to capture Kerberos password hashes for lateral movement.”
  • [T1219] Remote Access Software – β€œThreat actors entice users to download RMM tools like AnyDesk under false pretenses.”
  • [T1071] Command and Control – β€œUtilizing Cobalt Strike beacons to communicate with compromised hosts.”

Indicators of Compromise

  • [Domain] QR-code phishing domains – qr-s1[.]com, qr-s2[.]com – used in QR-code phishing activities
  • [Domain] Cobalt Strike beacon domains – companymartec[.]com, hessetechnology[.]com – used for beaconing / C2
  • [File] Antispam-related executables – AntispamAccount.exe, AntispamUpdate.exe – used in post-infection activity
  • [Email Address] Spam sender addresses – noreply@domain[.]com, support@domain[.]com – used in spam campaigns

Read more: https://www.reliaquest.com/blog/black-basta-social-engineering-technique-microsoft-teams/