Security

Cyber-crime

BT Group confirms attackers tried to break into Conferencing division

Sensitive data allegedly stolen from US subsidiary following Black Basta post


BT Group confirmed it is dealing with an attempted attack on one of its legacy business units after the Black Basta ransomware group claimed they broke in.

Black Basta posted "BT Group" on its data leak site on Wednesday, although it wouldn't be the first time these types of crooks have overhyped an attack. In the small print, and confirmed to The Register in a company statement, the attack actually targeted a smaller business unit of the British telco, BT Conferencing, which is headquartered in Braintree, Massachusetts.

"We identified an attempt to compromise our BT Conferencing platform," a spokesperson said. "This incident was restricted to specific elements of the platform, which were rapidly taken offline and isolated.

"The impacted servers do not support live BT Conferencing services, which remain fully operational, and no other BT Group or customer services have been affected. We're continuing to actively investigate all aspects of this incident, and we're working with the relevant regulatory and law enforcement bodies as part of our response."

Black Basta claims to have stolen circa 500 GB worth of the unit's files relating to finance, NDAs, users, and more. A small sample of allegedly stolen data plastered to its website also includes scans of identity documents, visa-related documents, and employee bonus details, although it all appears to be old data going back to the previous decade.

The ransomware group is among the most prolific in operation. Last year, blockchain boffins suggested Black Basta had accrued at least $100 million in revenue since spinning up in April 2022.

Since then, the group has received ongoing attention from authorities such as CISA, which updated its advisory earlier this year with the gang's methods. CISA estimates that more than 500 organizations have been targeted since the group's inception, including those operating critical infrastructure and healthcare services.

Examples of these attacks include those on UK regional water supplier Southern Water and American faith-based healthcare giant Ascension.

Other major hits also include outsourcing outfit Capita and the Toronto Public Library. ®

Send us news
8 Comments

UK floats ransomware payout ban for public sector

Stronger proposals may also see private sector applying for a payment 'license'

Medusa ransomware group claims attack on UK's Gateshead Council

Pastes allegedly stolen documents on leak site with £600K demand

Ransomware crew abuses AWS native encryption, sets data-destruct timer for 7 days

'Codefinger' crims on the hunt for compromised keys

Atos denies Space Bears' ransomware claims – with a 'but'

Points finger at third-party infrastructure being breached

How cops taking down LockBit, ALPHV led to RansomHub's meteoric rise

Cut off one head, two more grow back in its place

Ransomware attack forces Brit high school to shut doors

Students have work to complete at home in the meantime

Europe coughs up €400 to punter after breaking its own GDPR data protection rules

PLUS: Data broker leak reveals extent of info trading; Hot new ransomware gang might be all AI, no bark; and more

Drug addiction treatment service admits attackers stole sensitive patient data

Details of afflictions and care plastered online

Fortinet: FortiGate config leaks are genuine but misleading

Competition hots up with Ivanti over who can have the worst start to a year

Enzo Biochem settles lawsuit over 2023 ransomware attack for $7.5M

That's in addition to the $4.5M fine paid to three state AGs last year

Miscreants 'mass exploited' Fortinet firewalls, 'highly probable' zero-day used

Ransomware 'not off the table,' Arctic Wolf threat hunter tells El Reg

BT unplugs plans to turn old cabinets into EV chargepoints

Your battery might be flat, but the Wi-Fi signal is going to be great