Dark News Live

Researchers Link CACTUS Ransomware Tactics to Former Black Basta Affiliates

Threat actors deploying the Black Basta and CACTUS ransomware families have been found to rely on the same BackConnect (BC) module for maintaining persistent control over infected hosts, a sign that affiliates previously associated with Black Basta may have transitioned to CACTUS.

“Once infiltrated, it grants attackers a wide range of remote control capabilities, allowing them to execute commands on the infected machine,” Trend Micro said in a Monday analysis. “This enables them to steal sensitive data, such as login credentials, financial information, and personal files.”

It’s worth noting that details of the BC module, which the cybersecurity company is tracking as QBACKCONNECT owing to overlaps with the QakBot loader, was first documented in late January 2025 by both Walmart’s Cyber Intelligence team and Sophos, the latter of which has designated the cluster the name STAC5777.

Over the past year, Black Basta attack chains have increasingly leveraged email bombing tactics to trick prospective targets into installing Quick Assist after being contacted by the threat actor under the guise of IT support or helpdesk personnel.

The access then serves as a conduit to sideload a malicious DLL loader (“winhttp.dll”) named REEDBED using OneDriveStandaloneUpdater.exe, a legitimate executable responsible for updating Microsoft OneDrive. The loader ultimately decrypts and runs the BC module.

CACTUS Ransomware

Trend Micro said it observed a CACTUS ransomware attack that employed the same modus operandi to deploy BackConnect, but also go beyond it to carry out various post-exploitation actions like lateral movement and data exfiltration. However, efforts to encrypt the victim’s network ended in failure.

The convergence of tactics assumes special significance in light of the recent Black Basta chat log leaks that laid bare the e-crime gang’s inner workings and organizational structure.

Specifically, it has emerged that members of the financially motivated crew shared valid credentials, some of which have been sourced from information stealer logs. Some of the other prominent initial access points are Remote Desktop Protocol (RDP) portals and VPN endpoints.

“Threat actors are using these tactics, techniques, and procedures (TTP) — vishing, Quick Assist as a remote tool, and BackConnect — to deploy Black Basta ransomware,” Trend Micro said.

“Specifically, there is evidence suggesting that members have transitioned from the Black Basta ransomware group to the CACTUS ransomware group. This conclusion is drawn from the analysis of similar tactics, techniques, and procedures (TTPs) being utilized by the CACTUS group.”

Stay Secure, Share the Knowledge! 🔐📢

14 thoughts on “Researchers Link CACTUS Ransomware Tactics to Former Black Basta Affiliates”

  1. Winston here from Iowa. I’m always watching for new sites and looking at older ones and thought I’d reach out to see if you could use a hand driving targeted traffic, automating repetitive tasks, or some good old fashioned bulk targeted outreach campaigns to lists I already own.

    I’ve been doing this for over 20 years — building sites, editing videos, crafting bulk email campaigns (I even provide the targeted lists as I mentioned), running traffic, creating custom software, fixing and optimizing WordPress sites, I’ll even pay for any plugins you might want/need. If a solution exists, I’ve probably built it or bought it — and if I haven’t, I will for your project. I’m happy to shoulder 90% of the cost with tools, lists, licenses, and tech I already own.

    All I ask is a flat $99/month for my time, month to month — no catch. I don’t mean to impose, I just wanted to offer real help if you’re open to it.

    Quick background: born and raised in the Midwest, married, three girls. If I can support them by helping you using everything I’ve built over the years, that’s the kind of win-win I can imagine. It still amazes me how few people actually help the way I do — and I’d love the chance to show you.

    If you need anything at all, just ask, doesn’t cost anything to do that.

    P.S. – If I missed something you might need help with, just ask. I only scratched the surface here.

    All the best,

    Winston
    Cell: 1-319-435-1790‬
    Chat with me anytime: https://kutt.it/deserve

Leave a Comment

Your email address will not be published. Required fields are marked *

― Trending News

china-hackers
China-Linked Silk Typhoon Expands Cyber Attacks to IT Supply Chains for Initial Access
ai-hackers
Microsoft Exposes LLMjacking Cybercriminals Behind Azure AI Abuse Scheme
xss
Hackers Exploited Krpano Framework Flaw to Inject Spam Ads on 350+ Websites
russian (1)
Space Pirates Targets Russian IT Firms With New LuckyStrike Agent Malware
cyberattack (1)
PolarEdge Botnet Exploits Cisco and Other Flaws to Hijack ASUS, QNAP, and Synology Devices
How New AI Agents Will Transform Credential Stuffing Attacks
How New AI Agents Will Transform Credential Stuffing Attacks

― Must-Read Cyber Updates

firefox
Mozilla Updates Firefox Terms Again After Backlash Over Broad Data License Language
cyberattack (1)
PolarEdge Botnet Exploits Cisco and Other Flaws to Hijack ASUS, QNAP, and Synology Devices
china-hackers
China-Linked Silk Typhoon Expands Cyber Attacks to IT Supply Chains for Initial Access
xss
Hackers Exploited Krpano Framework Flaw to Inject Spam Ads on 350+ Websites
russian (1)
Space Pirates Targets Russian IT Firms With New LuckyStrike Agent Malware
malware-ransomware
Researchers Link CACTUS Ransomware Tactics to Former Black Basta Affiliates

― Related Resources

No posts found
Scroll to Top