Skip to main content
Mallory

Former Black Basta Affiliates Target Executives With Teams Phishing and Email Bombing

voice-social-engineeringransomware-group-operationphishing-campaign-intelligenceidentity-impersonation-fraudinitial-access-method
Updated April 29, 2026 at 03:01 PM4 sources
Share:
Former Black Basta Affiliates Target Executives With Teams Phishing and Email Bombing

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

Suspected former Black Basta affiliates have launched a fast-scaling social-engineering campaign against dozens of organizations, targeting more than 100 employees to gain network access for data theft, ransomware deployment, and extortion. According to ReliaQuest, the operators use mass email bombing to overwhelm victims and then follow up through Microsoft Teams messages or phone calls while impersonating IT help desk staff. The activity has been linked to former Black Basta members or closely aligned actors because the tooling, targeting, and execution closely mirror the group’s historical playbook, even after Black Basta fragmented following the leak of its internal chats.

The campaign has increasingly focused on senior leaders and other highly privileged personnel, with executive targeting rising from 59% in January and February to 77% in March. Attackers have persuaded victims to install remote monitoring and management tools such as Supremo Remote Desktop or to launch Windows Quick Assist, sometimes obtaining remote access within minutes before running malicious scripts. Manufacturing and professional services have been hit hardest, with finance, insurance, construction, and technology also affected, underscoring how the operators are moving faster and using more automation to scale intrusions and make early detection more difficult.

Timeline

  1. Apr 14, 2026

    ReliaQuest links ongoing campaign to former Black Basta affiliates

    ReliaQuest publicly reported that more than 100 employees across dozens of organizations had been targeted in the campaign and assessed the activity as highly likely tied to former Black Basta affiliates or operators closely aligned with the group's playbook. The report highlighted matching tooling, targeting, execution style, and remote-access methods.

  2. Mar 1, 2026

    Black Basta-linked campaign surges and intensifies executive focus

    The campaign accelerated in March 2026, with executive targeting rising to 77% of observed victims and attackers often obtaining remote access within minutes of initial email bombing. Operators used tools such as Microsoft Teams, Windows Quick Assist, and Supremo Remote Desktop to scale intrusions more quickly and with greater automation.

  3. Jan 1, 2026

    Executive targeting dominates Black Basta-linked campaigns in early 2026

    ReliaQuest observed that senior leaders and other highly privileged personnel became a primary focus of the campaign, with executives accounting for 59% of targets in January and February 2026. The attacks heavily affected manufacturing and professional services, with finance, insurance, construction, and technology also targeted.

  4. May 1, 2025

    Former Black Basta affiliates begin social-engineering intrusion campaign

    A small group of suspected former Black Basta affiliates began a campaign active since at least May 2025, using email bombing followed by Microsoft Teams messages or phone calls impersonating IT help desks to gain network access. The activity was aimed at enabling data theft, ransomware deployment, and extortion.

  5. Feb 1, 2025

    Black Basta chat leak contributes to group fragmentation

    Black Basta fragmented after its internal chat logs leaked, exposing the group's infrastructure, techniques, and operations. Subsequent activity using its tradecraft was assessed as likely tied to former affiliates or closely aligned operators.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Related Entities

Threat Actors

Affected Products

Related Stories

BlackFile Extortion Gang Hits Retail and Hospitality With Vishing-Led Data Theft

BlackFile Extortion Gang Hits Retail and Hospitality With Vishing-Led Data Theft

**BlackFile**, a financially motivated extortion group likely tied to **The Com** and overlapping with activity tracked by CrowdStrike as **Cordial Spider**, has targeted retail and hospitality organizations with voice-phishing campaigns that impersonate corporate IT help desks. Researchers at Palo Alto Networks Unit 42 and RH-ISAC said the group has been active since at least February 2026, using spoofed phone numbers and fake corporate single sign-on pages to trick employees into surrendering credentials and one-time passcodes. After gaining access, the attackers register their own devices to bypass MFA, escalate privileges into administrative and executive accounts, and steal data from platforms including **Salesforce** and **SharePoint** through legitimate API and download functions. The stolen information is moved to attacker-controlled infrastructure, posted on a dark web leak site, and used to support **seven-figure ransom demands** sent from compromised employee accounts or Gmail; in some cases, the group has also used **swatting** against employees and executives to intensify pressure on victims.

5 days ago
Microsoft Teams Social Engineering Abuses Quick Assist to Deploy A0Backdoor

Microsoft Teams Social Engineering Abuses Quick Assist to Deploy A0Backdoor

A social-engineering campaign targeting employees at **financial and healthcare** organizations is abusing **Microsoft Teams** chats/calls to trick users into granting remote access via *Windows Quick Assist*, enabling deployment of a newly identified malware family dubbed **A0Backdoor**. The activity begins with **email bombing** (flooding inboxes with spam) followed by an attacker impersonating internal IT over Teams, offering help and then persuading the victim to start a Quick Assist session; the tradecraft overlaps with tactics previously attributed to **Blitz Brigantine / Storm-1811**, which Microsoft has linked to **Black Basta**-associated operations. Post-access, the actor deploys **digitally signed MSI installers** masquerading as Teams-related components and *CrossDeviceService* (associated with Windows *Phone Link*), sometimes delivered via **tokenized links** from Microsoft personal cloud storage to appear trustworthy and hinder collection. BlueVoyant reported the installers drop files into user `AppData` paths that mimic legitimate Microsoft locations and use **DLL sideloading** (e.g., a malicious `hostfxr.dll`) to execute an in-memory loader that decrypts shellcode, performs sandbox checks, and ultimately extracts and runs **A0Backdoor** (using **AES**-encrypted payloads and a **SHA-256**-derived key), with anti-analysis behavior including excessive thread creation intended to disrupt debugging.

3 days ago
Multiple Social-Engineering Campaigns Abuse Trusted Platforms (Microsoft Teams, Vendor-Signed Email, Bing Ads/Azure)

Multiple Social-Engineering Campaigns Abuse Trusted Platforms (Microsoft Teams, Vendor-Signed Email, Bing Ads/Azure)

Security researchers reported several **social-engineering campaigns** that abuse trusted platforms to increase credibility and bypass controls. One campaign targeted wedding planners and related vendors by hijacking trust in *Microsoft Teams*: attackers used compromised legitimate email threads and impersonated legal professionals (e.g., `czimmerman@craigzlaw[.]com`) to lure victims into clicking a fake Teams meeting link that ultimately redirected to `ussh[.]life/connect/teamsfinal/9/windows`, a site masquerading as a Teams download page. Victims were prompted to download Windows executables consistent with **information-stealer** behavior (credential/browser/session-token theft and C2 exfiltration), enabling follow-on account takeover and additional phishing. Separately, a report highlighted **DKIM replay**-style phishing in which criminals abuse legitimate notification/invoice workflows from **PayPal, Apple, and DocuSign** to generate cryptographically signed emails that pass DKIM/DMARC checks; attackers place scam content (often a fake support phone number and urgency) into user-controlled fields, send the message to themselves to obtain a “clean” vendor-signed email, then forward it to targets. Another campaign used **Bing search ads** to funnel users through a newly registered domain (`highswit[.]space`) to scam pages hosted on **Microsoft Azure Blob Storage** (consistent path pattern including `werrx01USAHTML/index.html` and a phone-number parameter), presenting fake Microsoft security warnings and directing victims to call numbers such as `1-866-520-2041` and `1-833-445-4045`; Netskope observed impact across dozens of US organizations.

1 months ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.