Article Details
Scrape Timestamp (UTC): 2025-03-04 16:26:11.685
Source: https://thehackernews.com/2025/03/researchers-link-cactus-ransomware.html
Original Article Text
Click to Toggle View
Researchers Link CACTUS Ransomware Tactics to Former Black Basta Affiliates. Threat actors deploying the Black Basta and CACTUS ransomware families have been found to rely on the same BackConnect (BC) module for maintaining persistent control over infected hosts, a sign that affiliates previously associated with Black Basta may have transitioned to CACTUS. "Once infiltrated, it grants attackers a wide range of remote control capabilities, allowing them to execute commands on the infected machine," Trend Micro said in a Monday analysis. "This enables them to steal sensitive data, such as login credentials, financial information, and personal files." It's worth noting that details of the BC module, which the cybersecurity company is tracking as QBACKCONNECT owing to overlaps with the QakBot loader, was first documented in late January 2025 by both Walmart's Cyber Intelligence team and Sophos, the latter of which has designated the cluster the name STAC5777. Over the past year, Black Basta attack chains have increasingly leveraged email bombing tactics to trick prospective targets into installing Quick Assist after being contacted by the threat actor under the guise of IT support or helpdesk personnel. The access then serves as a conduit to sideload a malicious DLL loader ("winhttp.dll") named REEDBED using OneDriveStandaloneUpdater.exe, a legitimate executable responsible for updating Microsoft OneDrive. The loader ultimately decrypts and runs the BC module. Trend Micro said it observed a CACTUS ransomware attack that employed the same modus operandi to deploy BackConnect, but also go beyond it to carry out various post-exploitation actions like lateral movement and data exfiltration. However, efforts to encrypt the victim's network ended in failure. The convergence of tactics assumes special significance in light of the recent Black Basta chat log leaks that laid bare the e-crime gang's inner workings and organizational structure. Specifically, it has emerged that members of the financially motivated crew shared valid credentials, some of which have been sourced from information stealer logs. Some of the other prominent initial access points are Remote Desktop Protocol (RDP) portals and VPN endpoints. "Threat actors are using these tactics, techniques, and procedures (TTP) — vishing, Quick Assist as a remote tool, and BackConnect — to deploy Black Basta ransomware," Trend Micro said. "Specifically, there is evidence suggesting that members have transitioned from the Black Basta ransomware group to the CACTUS ransomware group. This conclusion is drawn from the analysis of similar tactics, techniques, and procedures (TTPs) being utilized by the CACTUS group."
Daily Brief Summary
Researchers have identified that the tactics of the CACTUS ransomware group mirror those previously used by Black Basta affiliates, suggesting a migration or shift in affiliate allegiances.
Both ransomware families, Black Basta and CACTUS, utilize a BackConnect module that provides persistent remote control over infected hosts, facilitating data theft and command execution.
The BackConnect module, also known as QBACKCONNECT, was first documented in detail by Walmart's Cyber Intelligence team and Sophos in January 2025.
Cybercriminals employing the Black Basta ransomware have used strategies like email bombing to install malware through channels disguised as IT support.
Similarly, the CACTUS group has adopted these techniques to deploy their ransomware, but with additional post-exploitation actions such as lateral movement and data exfiltration.
However, CACTUS group's recent ransomware attack attempts to encrypt network data were unsuccessful.
The operational overlap and shared tactics between these groups have come under scrutiny following leaks of Black Basta's internal communications, revealing shared credentials and tactics.
Popular initial access points for these threat actors include Remote Desktop Protocol (RDP) and VPN endpoints, often exploited to gain entry into targeted networks.