The BlackBasta ransomware gang has attacked BionPharma. BionPharma is a prominent pharmaceutical company renowned for its contributions to the healthcare industry. It is widely recognized for its commitment to advancing medical science and providing high-quality medications to patients in need. The company specializes in developing innovative treatments and therapies across various therapeutic areas, including oncology, cardiology, neurology, and infectious diseases. Their diverse portfolio showcases a dedication to addressing some of the most pressing medical challenges faced by individuals worldwide. BlackBasta posted BionPharma to its data leak site on July 25th, claiming to have stolen miscellaneous data, including confidential and PII documents. Black Basta is a RaaS that emerged in early 2022 and is assessed by some researchers as a revival of the Conti and REvil attack groups. The group routinely exfiltrates sensitive data from victims for double extortion. Black Basta engages in highly targeted attacks and likely only works with a limited group of approved affiliates. Considering they had just emerged in the spring of 2022, Black Basta quickly became one of the most prolific attack groups moving into 2023. Black Basta was observed leveraging unique TTPs for ingress, lateral movement, data exfiltration data, and deploying ransomware payloads. Ransom demands vary depending on the targeted organization, with reports that they can be as high as 2 million dollars. The Black Basta RaaS continues to evolve its platform, with ransomware payloads that can infect systems running both Windows and Linux systems by exploiting vulnerabilities in VMware ESXi running on enterprise servers. Black Basta ransomware is written in C++, can target both Windows and Linux systems, encrypts data with ChaCha20, and then the encryption key is encrypted with RSA-4096 for rapid encryption of the targeted network. In some cases, Black Basta leverages malware strains like Qakbot and exploits, including PrintNightmare, during the infection process. Black Basta also favors abuse of insecure Remote Desktop Protocol (RDP) deployments. Black Basta typically targets manufacturing, transportation, construction and related services, telecommunications, the automotive sector, and healthcare providers. Black Basta also employs a double extortion scheme and maintains an active leaks website that posts exfiltrated data if an organization declines to pay the ransom demand.
This attack's description was not found, while we work on the detailed account of this attack we invite you to browse through other recent Rasomware Attacks in the table below.