The Information Highway

The Information Highway

Font size: +
2 minutes reading time (420 words)

BT unit took servers offline after Black Basta ransomware breach

Multinational telecommunications giant BT Group (formerly British Telecom) has confirmed that its BT Conferencing business division shut down some of its servers following a Black Basta ransomware breach.

BT Group is the United Kingdom's leading fixed and mobile telecom provider. It also provides managed telecommunications, security, and network and IT infrastructure services to customers in 180 countries.

A company spokesperson disclosed that the security incident didn't impact BT Group's operations or BT Conferencing services, so it is unclear if any systems were encrypted or only data stolen. 

"We identified an attempt to compromise our BT Conferencing platform. This incident was restricted to specific elements of the platform, which were rapidly taken offline and isolated." 

"The impacted servers do not support live BT Conferencing services, which remain fully operational, and no other BT Group or customer services have been affected."

While BT said there was only an attempt to compromise their platform, they also said they took impacted servers offline.

This comes after the Black Basta ransomware gang claimed they breached the company's servers and allegedly stole 500GB of data, including financial and organizational data, "users data and personal docs," NDA documents, confidential information, and more.

BT Conferencing entry on Black Basta's leak site (BleepingComputer)

The cybercrime group also published folder listings and multiple screenshots of documents requested by the company during the hiring process as proof of their claims.

The ransomware gang also added a countdown to their dark web leak site, saying the allegedly stolen data would be leaked next week.

With the threat actors now claiming to have stolen hundreds of GBs of documents from BT Conferencing servers, it looks like this was a serious breach rather than just an attempt.

"We're continuing to actively investigate all aspects of this incident, and we're working with the relevant regulatory and law enforcement bodies as part of our response," the BT Group spokesperson added.

The Black Basta Ransomware-as-a-Service (RaaS) operation surfaced in April 2022 and has claimed many high-profile victims worldwide, including healthcare companies and government contractors.

Some of its most notable victims include U.S. healthcare giant Ascension, U.K. tech outsourcing firm Capita, German defense contractor Rheinmetall, government contractor ABB, Hyundai's European division, the Toronto Public Library, the American Dental Association, and Yellow Pages Canada.

CISA and the FBI said in May that Black Basta affiliates have breached over 500 organizations, collecting at least $100 million in ransom payments from over 90 victims until November 2023.

FBI shares tips on how to tackle AI-powered fraud ...
RomCom exploits vulnerabilities
 

Comments

No comments made yet. Be the first to submit a comment
Friday, 27 December 2024

Captcha Image

Top Breaches Of 2023

Customers Affected In T-Mobile Breach
Accounts Affected In MOVEit Breach
Customers Affected In MCNA Insurance Data Breach
Individuals Affected In PharMerica Data Breach
Users Affected In ChatGPT Major Data Breach
*Founder Shield End of Year 2023