Gruppo ECP Advpress Automationtoday AI DevwWrld CyberDSA Chatbot Summit Cyber Revolution Summit CYSEC Global Cyber Security & Cloud Expo World Series Digital Identity & Authentication Summit Asian Integrated Resort Expo Middle East Low Code No Code Summit TimeAI Summit Gruppo ECP Advpress Automationtoday AI DevwWrld CyberDSA Chatbot Summit Cyber Revolution Summit CYSEC Global Cyber Security & Cloud Expo World Series Digital Identity & Authentication Summit Asian Integrated Resort Expo Middle East Low Code No Code Summit TimeAI Summit

Black Basta decryption: ransomware flaw discovered and decryptor created

SRLabs exposes Black Basta's fake invincibility: compromised encryption offers a bastion of hope for victims

SRLabs researchers have discovered a flaw in the encryption software of the Black Basta ransomware, creating a decryptor to recover encrypted files. The decryptor, called 'Black Basta Buster', exploits a weakness in the encryption algorithm used. However, the flaw has been fixed, preventing the use of this technique for future ransomware attacks.
This pill is also available in Italian language

SRLabs researchers have identified a weakness in Black Basta's encryption software, resulting in the creation of a decryptor that takes advantage of this vulnerability. The decryptor offers victims of Black Basta from November 2022 until the recent past the ability to recover their files without costs. However, the bug in the encryption mechanism was fixed about a week ago, which prevents the technique from being used in future ransomware attacks.

Technical analysis of the Black Basta flaw

Going by the name “Black Basta Buster,” the decryptor exploits a weakness in ransomware's use of the encryption algorithm to allow recovery of the ChaCha cipher stream used in XOR file encryption. Files smaller than 5000 bytes cannot be restored, while full recovery is possible for files from 5000 bytes up to 1GB. In data larger than 1GB, the first 5000 bytes would be lost but the rest is recoverable.

Operation and limitations of the decipherer

Using stream ciphers, such as XChaCha20, with files containing only zero bytes culminates in the key itself being written to the file, thus making it discoverable. Industry experts found a bug that caused 64-byte encryption sequences to be reused, allowing the symmetry key to be extracted. SRLabs has also developed Python scripts that assist in automating the key recovery process and file decryption.

The Black Basta ransomware group

The cybercriminal collective known as Black Basta emerged in April 2022 as responsible for targeted double-extortion cyberattacks on corporate targets. It also linked to the QBot malware to carry out the attacks, with a focus on VMware ESXi virtual machines. Black Basta's attacks have spread to numerous organizations, including the Toronto Public Library, highlighting their rapid and damaging ascendancy in the cybercrime landscape.

Follow us on Twitter for more pills like this

12/31/2023 11:22

Marco Verro

Last pills

Cloudflare repels the most powerful DDoS attack ever recordedAdvanced defense and global collaboration to tackle new challenges of DDoS attacks

Silent threats: the zero-click flaw that compromises RDP serversHidden risks in remote work: how to protect RDP servers from invisible attacks

Discovery of vulnerability in Secure Boot threatens device securityFlaw in the Secure Boot system requires urgent updates to prevent invisible intrusions

North korean cyberattacks and laptop farming: threats to smart workingAdapting to new digital threats of remote work to protect vital data and infrastructures

Don’t miss the most important news
Enable notifications to stay always updated