Security

Cyber-crime

BT Group confirms attackers tried to break into Conferencing division

Sensitive data allegedly stolen from US subsidiary following Black Basta post


BT Group confirmed it is dealing with an attempted attack on one of its legacy business units after the Black Basta ransomware group claimed they broke in.

Black Basta posted "BT Group" on its data leak site on Wednesday, although it wouldn't be the first time these types of crooks have overhyped an attack. In the small print, and confirmed to The Register in a company statement, the attack actually targeted a smaller business unit of the British telco, BT Conferencing, which is headquartered in Braintree, Massachusetts.

"We identified an attempt to compromise our BT Conferencing platform," a spokesperson said. "This incident was restricted to specific elements of the platform, which were rapidly taken offline and isolated.

"The impacted servers do not support live BT Conferencing services, which remain fully operational, and no other BT Group or customer services have been affected. We're continuing to actively investigate all aspects of this incident, and we're working with the relevant regulatory and law enforcement bodies as part of our response."

Black Basta claims to have stolen circa 500 GB worth of the unit's files relating to finance, NDAs, users, and more. A small sample of allegedly stolen data plastered to its website also includes scans of identity documents, visa-related documents, and employee bonus details, although it all appears to be old data going back to the previous decade.

The ransomware group is among the most prolific in operation. Last year, blockchain boffins suggested Black Basta had accrued at least $100 million in revenue since spinning up in April 2022.

Since then, the group has received ongoing attention from authorities such as CISA, which updated its advisory earlier this year with the gang's methods. CISA estimates that more than 500 organizations have been targeted since the group's inception, including those operating critical infrastructure and healthcare services.

Examples of these attacks include those on UK regional water supplier Southern Water and American faith-based healthcare giant Ascension.

Other major hits also include outsourcing outfit Capita and the Toronto Public Library. ®

Send us news
8 Comments

What do ransomware and Jesus have in common? A birth month and an unwillingness to die

35 years since AIDS first borked a PC and we're still no closer to a solution

Suspected LockBit dev, facing US extradition, 'did it for the money'

Dual Russian-Israeli national arrested in August

Ransomware scum blow holes in Cleo software patches, Cl0p (sort of) claims responsibility

But can you really take crims at their word?

Deloitte says cyberattack on Rhode Island benefits portal carries 'major security threat'

Personal and financial data probably stolen

Heart surgery device maker's security bypassed, data encrypted and stolen

Sounds like th-aorta get this sorted quickly

UK ICO not happy with Google's plans to allow device fingerprinting

Also, Ascension notifies 5.6M victims, Krispy Kreme bandits come forward, LockBit 4.0 released, and more

Russia arrests one of its own – a cybercrime suspect on FBI's most wanted list

The latest in an unusual change of fortune for group once protected by the Kremlin

How Androxgh0st rose from Mozi's ashes to become 'most prevalent malware'

Botnet's operators 'driven by similar interests as that of the Chinese state'

Don't fall for a mail asking for rapid Docusign action – it may be an Azure account hijack phish

Recent campaign targeted 20,000 folk across UK and Europe with this tactic, Unit 42 warns

Phishers cast wide net with spoofed Google Calendar invites

Not that you needed another reason to enable the 'known senders' setting

Critical security hole in Apache Struts under exploit

You applied the patch that could stop possible RCE attacks last week, right?

Are your Prometheus servers and exporters secure? Probably not

Plus: Netscaler brute force barrage; BeyondTrust API key stolen; and more