Ransomware group 8base threatens SMEs

B2B Cyber ​​Security ShortNews

Share post

8base is one of the most active ransomware groups. This summer she focused on small and medium-sized companies. Due to low security budgets and more cybersecurity deficiencies, SMEs often quickly fall victim to attackers. 

8base first appeared on the scene in March 2022 and since June 2023 the group has been more active than ever before. Accordingly, it is now important to act and protect yourself from an attack by criminals, says Anish Bogati, Logpoint Security Research Engineer.

An explosive mixture

In general, SMBs are more likely to struggle with low security budgets and cybersecurity deficiencies, which is a dangerous cocktail when a ransomware group like 8base approaches them. Small and medium-sized businesses in particular must therefore familiarize themselves with the threat posed by 8base and, more importantly, strengthen their security measures to protect against 8base. Understanding the attacker is the key to developing better defense strategies.

Logpoint's research uncovered the 8base infection chain through malware analysis. 8base uses multiple malware families to achieve their goals, including SmokeLoader and SystemBC, in addition to the Phobos Ransomware payload. The ransomware group primarily gains access via phishing emails and uses the Windows Command Shell and Power Shell to execute the payload. The attackers use several techniques to stay in the system, bypass defenses and achieve their goals.

The necessary prevention

It is essential that security teams are able to detect 8base activities in their own system in a timely manner. This also includes suspicious child processes started by Microsoft Office products, such as executing files using WScript or CScript or creating scheduled tasks. Knowing the relevant Indicators of Compromise (IoC) and the attackers' Tactics, Techniques and Procedures (TTPs) helps SMEs proactively detect and thwart or at least mitigate suspicious activity related to 8base.

The key tools for a robust cybersecurity strategy in this case are proper logging, asset visibility, and strict monitoring. These components help keep track of the network and also help detect anomalies such as files being placed in publicly writable folders, changes to registry values, and suspicious scheduled tasks that may indicate a security threat like 8base. However, anyone who fails to proactively prepare the necessary security components runs the risk of becoming another victim in the ever-growing list of ransomware incidents.

More at Logpoint.com

 


About Logpoint

Logpoint is a global leader in innovative and intuitive security platforms that enable security teams to detect, investigate and respond to threats faster with a consolidated suite of technologies.


 

Matching articles on the topic

Report: 40 percent more phishing worldwide

The current spam and phishing report from Kaspersky for 2023 speaks for itself: users in Germany are after ➡ Read more

BSI sets minimum standards for web browsers

The BSI has revised the minimum standard for web browsers for administration and published version 3.0. You can remember that ➡ Read more

Stealth malware targets European companies

Hackers are attacking many companies across Europe with stealth malware. ESET researchers have reported a dramatic increase in so-called AceCryptor attacks via ➡ Read more

IT security: Basis for LockBit 4.0 defused

Trend Micro, working with the UK's National Crime Agency (NCA), analyzed the unpublished version that was in development ➡ Read more

MDR and XDR via Google Workspace

Whether in a cafe, airport terminal or home office – employees work in many places. However, this development also brings challenges ➡ Read more

Test: Security software for endpoints and individual PCs

The latest test results from the AV-TEST laboratory show very good performance of 16 established protection solutions for Windows ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

FBI: Internet Crime Report counts $12,5 billion in damage 

The FBI's Internet Crime Complaint Center (IC3) has released its 2023 Internet Crime Report, which includes information from over 880.000 ➡ Read more