Black Basta-Style Cyberattack Hits Inboxes with 1,165 Emails in 90 Minutes
Latest News on Black Basta-Style Cyberattacks (2025)
As of the latest reports, Black Basta ransomware continues to be a significant threat to various organizations.
- In December 2024, BT Group (formerly British Telecom) announced that its Conferencing division had to shut down some of its servers following a Black Basta ransomware attack. This incident highlighted the ongoing threat posed by this ransomware group to critical infrastructure and services14.
Threat Detection in Phishing Attacks
Phishing attacks have evolved significantly, making threat detection more challenging. Here are some key points on the current state of phishing and detection methods:
Sophistication of Phishing Attacks
- Phishing attacks now utilize advanced techniques such as domain spoofing, echospoofing, and the exploitation of legitimate email services. For example, attackers have used modifiable configuration settings in email protection services to create emails that appear legitimate, bypassing common security protocols like DMARC, SPF, and DKIM2.
Use of AI in Phishing
- Generative AI (GenAI) tools are being used to craft more convincing phishing emails, improving spelling, grammar, and tone to make the emails almost indistinguishable from legitimate ones. This makes traditional detection methods, such as looking for spelling errors, less effective25.
Conversation Hijacking
- Threat actors are engaging in conversation hijacking, where they compromise corporate email accounts, read through emails, and then initiate or insert themselves into existing business conversations. This tactic is particularly effective for Business Email Compromise (BEC) and vendor email compromise (VEC) attacks2.
Detection and Prevention
- To detect and prevent phishing attacks, organizations are advised to use robust email filtering, implement multi-factor authentication (MFA), and train employees to be cautious of suspicious attachments and links. Real-time monitoring of threat actor activity and integrating security tools are also recommended23.
Overview of Email Phishing Tactics
Here is an overview of the current email phishing tactics:
Domain Spoofing and Echospoofing
- Attackers spoof the email domains of well-known brands to bypass email security protocols. Techniques like echospoofing, which exploits modifiable configuration settings in email protection services, are becoming more common2.
Improved Impersonation Capabilities
- Threat actors impersonate individuals or organizations known to the recipient, making the emails more tailored and targeted. This is particularly effective for BEC and VEC attacks, where specific suppliers or senior executives are impersonated2.
Conversation Hijacking
- As mentioned earlier, this involves compromising email accounts, reading through emails, and then sending fake invoices or wire transfer requests based on the gathered information. This tactic is less suspicious and harder to detect than traditional phishing2.
AI-Based Phishing
- GenAI tools are used to create phishing emails that are free from spelling and grammatical errors and can mimic the tone and style of legitimate emails, making them harder to detect25.
Clone Phishing
- This involves copying a previously delivered legitimate email, modifying its contents and links, and resending it to the victim. This tactic exploits the victim's trust in the original email3.
Key Differences and Prevention Strategies
Here are some key differences and prevention strategies for different types of phishing attacks:
Area of Differentiation | Phishing | Smishing | Vishing |
---|---|---|---|
Delivery Channel | Emails | SMS or instant messages | Phone calls or voice messages |
Typical Targets | Email accounts, social networks | Smartphone users | Individuals or employees reachable by phone |
Common Tools | Fake login forms, malware-laden attachments | Fraudulent links, malicious app prompts | Voice manipulation software, impersonated call centers |
Key Emotional Hook | Fear of losing access, urgent deadlines | Excitement, dread, urgency | Pressure from a live caller |
Data Collection Method | Clicking links, downloading files | Tapping links, providing info via SMS | Sharing passwords or financial details over the phone |
Prevention Strategy | Use email filtering, verify URLs, implement MFA | Check sender authenticity, avoid unknown links, install mobile security | Train employees to validate caller identities, avoid divulging sensitive data by phone |
For more detailed prevention strategies, it is crucial to stay updated on the latest threat vectors and to employ robust security measures such as real-time monitoring and integrations with security tools35.