23 min read
Cyber Threat Intelligence Report
This week, we briefed our clients on Anthropic's announcement of Claude Mythos Preview and its alleged ability to discover and exploit...
5 min read
PacketWatch Team Sixty43
:
May 20, 2024
This week, we explore Black Basta ransomware gang tactics, techniques, and procedures, and a vulnerability roundup of CVEs for Google Chrome, F5 BIG-IP, and the Cacti Network Monitoring Framework.
Reporting from CISA and Microsoft in recent days highlights updated tactics, techniques, and procedures (TTPs) for the Black Basta ransomware gang.

Black Basta has been in operation since 2022, and is believed to be comprised of former Conti ransomware members. During this two year active streak, the group has targeted over 500 entities across the globe. Like many of their ransomware counterparts, Black Basta is a double-extortion group, where they will encrypt systems in the target environment as well as exfiltrate and disclose data if the ransom is not paid.
Black Basta and their affiliates use a variety of techniques to gain an initial foothold in the target environment. The group uses remote exploitation of vulnerable services, social engineering, or valid credentials to gain access.
Black Basta has been observed leveraging the hacking tool Mimikatz to dump credentials and elevate privileges. Additionally, the group has been observed exploiting the following vulnerabilities:
Black Basta uses a variety of common administrative tools for lateral movement throughout the target network, including BITSAdmin, PsExec, Remote Desktop Protocol (RDP), Splashtop, and Screen Connect. Cobalt Strike was also observed being leveraged by affiliates and is the only tool in this category considered malicious.
Additional Resources
Multiple 0-days Fixed in Google Chrome Three high-severity 0-days for Chrome were disclosed by Google. While little detail was revealed regarding these vulnerabilities, they are all under active exploitation and administrators should update Chrome to 125.0.6422.60 or higher as soon as possible.
F5 released fixes for two vulnerabilities in their BIG-IP Next Central Manager product. This tool allows administrators to control on-prem or cloud BIG-IP Next instances via a management user interface.
According to security firm Eclypsium, who published proof-of-concept exploit code, rogue accounts created after compromising a vulnerable device are not visible from Next Central Manager.
Administrators are urged to patch as soon as possible. If a patch cannot be applied in a timely manner, administrators should restrict access to Next Central Manager to only trusted networks.
A dozen security issues have been addressed in a security update for Cacti, the open-source network monitoring tool. Among these flaws are two critical vulnerabilities that can lead to remote code execution:
These flaws affect all versions of Cacti, including and prior to 1.2.26. Administrators are urged to update to version 1.2.27 as soon as possible.
Stay updated with PacketWatch's cybersecurity content by subscribing to our monthly newsletter, delivered to your inbox on the last Tuesday of the month.
PacketWatch publishes this report and other cybersecurity threat intel to the security community for free via our blog.
If you want personalized threat intel, contact us today to learn about our enterprise threat intelligence services.
Note: We've also enriched our original threat intelligence report by including resources from our partner in cyber threat intelligence, SOCRadar. You may need a registered SOCRadar account to view their threat intelligence resources.
DISCLAIMER
Kindly be advised that the information contained in this article is presented with no final evaluation and should be considered raw data. The sole purpose of this information is to provide situational awareness based on the currently available knowledge. We recommend exercising caution and conducting further research as necessary before making any decisions based on this information.
23 min read
This week, we briefed our clients on Anthropic's announcement of Claude Mythos Preview and its alleged ability to discover and exploit...
17 min read
This week, we briefed our clients on recent supply chain attacks to raise awareness and help organizations identify whether they have been attacked.
16 min read
This week, we briefed our clients on the findings from Google's 2025 ransomware investigations. We highlighted the key TTPs used by ransomware...