Rising star 2024: Ransomware group 8Base

Trend Micro News
Advertising

Share post

In a new analysis, Trend Micro focuses on the 8Base ransomware group, which ranked second on the list of the "most successful" ransomware actors in the first months of 2024 - just behind LockBit.

With the successful operation of international law enforcement agencies earlier this year against Lockbit 8Base is expected to continue to expand its importance in the ransomware landscape. The 8Base group presents itself as a penetration tester and claims on its leak site that it is only targeting companies that "neglect the privacy and importance of the data of their employees and customers".

Advertising
Perfect SME cybersecurity
How small and medium-sized enterprises defend against AI-led attacks with tailored security

8Base presents itself as serious and blackmails

At the same time, however, it blackmails its victims, especially small businesses, by pursuing a dual extortion strategy. The malware primarily gains access via phishing emails, but samples were also found on domains that appear to be associated with SystemBC, a proxy and remote administration tool (RAT). Trend Micro has analyzed the group in detail and offers comprehensive insights.

Key findings about 8Base

  • Discovered in March 8, the 2022Base ransomware group uses a "name and shame" tactic to blackmail its victims by encrypting sensitive information and threatening to publish it.
  • Although 8Base positions itself as a penetration tester, the group has financial motives behind its attacks and has already targeted public healthcare facilities in the United States.
  • 8Base uses Phobos ransomware version 2.9.1 and SmokeLoader for intrusion obfuscation and mainly relies on phishing emails as an entry point.
  • The group focuses primarily on companies in North America, but also targets European companies, particularly in the manufacturing and financial sectors.
  • 8Base's attacks primarily target small businesses, even though or precisely because the group poses as penetration testers.
  • 8Base's attack chain and techniques are diverse and include phishing, credential access, protection evasion, lateral movement, privilege escalation, exfiltration, and encryption impact.
More at TrendMicro.com

 


About Trend Micro

As one of the world's leading providers of IT security, Trend Micro helps create a secure world for digital data exchange. With over 30 years of security expertise, global threat research, and constant innovation, Trend Micro offers protection for businesses, government agencies, and consumers. Thanks to our XGen™ security strategy, our solutions benefit from a cross-generational combination of defense techniques optimized for leading-edge environments. Networked threat information enables better and faster protection. Optimized for cloud workloads, endpoints, email, the IIoT and networks, our connected solutions provide centralized visibility across the entire enterprise for faster threat detection and response.


 

Matching articles on the topic

F5 BIG-IP: BSI warns of highly dangerous vulnerabilities

The BSI has issued a warning about F5 products, as they contain several highly dangerous security vulnerabilities that should be closed. The BIG-IP ➡ Read more

Cybercrime: Russian-speaking underground is leading

A new research report provides a comprehensive insight into the Russian-speaking cyber underground, an ecosystem that has fueled global cybercrime in recent ➡ Read more

Iran, North Korea, Russia: State hackers rely on ClickFix 

State-sponsored hacker groups are increasingly adopting new social engineering techniques originally developed by commercially motivated cybercriminals. ClickFix, for example, is now increasingly ➡ Read more

TA4557: Venom Spider targets HR departments

TA4557, better known as Venom Spider, is increasingly exploiting phishing and trying to deploy its backdoor malware. The focus of the ➡ Read more

IT resilience: cybersecurity at the storage level

More data security features for greater IT resilience at the storage level: Cyber ​​security managers can pursue a proactive data security approach at the storage level with highly secure NetApp storage and thus ➡ Read more

Oettinger Brewery attacked by ransomware

The APT group Ransomhouse claims to have successfully attacked the German brewery Oettinger with ransomware. On the APT group's leak page ➡ Read more

Healthcare facilities: 90 percent are at high risk

The current report “State of CPS Security: Healthcare Exposures 2025” shows the most dangerous vulnerabilities of medical devices in networks of ➡ Read more

Google Cloud Run: ImageRunner vulnerability discovered

The ImageRunner privilege escalation vulnerability in Google Cloud Run could have allowed attackers to bypass access controls, gain unauthorized access to container images ➡ Read more