The Black Basta Blueprint
Intel 471 transforms cyber threat intelligence for real-world action

Intel471 champions the operationalization of cyber threat intelligence (CTI) across its three core portfolios – Cyber Threat Exposure, Cyber Threat Intelligence, and Cyber Threat Hunting – to solve a variety of risk and security use-cases.
In this whitepaper, we take a deep-dive into the leaked internal chat logs for the Black Basta ransomware group and demonstrate how our expert analyses of the group’s malware tools and tactics, techniques, and procedures (TTPs) can be operationalized to harden your defenses against future attacks. We also identify hunt packages we’ve developed for you to identify Black Basta behaviors and signs of a compromise within your network.
What’s Inside:
- Discover Black Basta’s organizational structure and connections to other cybercriminal groups.
- Understand the critical tactics, techniques and procedures employed by the group.
- See real-life examples of how our CTI can be operationalized across each of our portfolios to mitigate cyber threats.
Loading form...