BT unit took servers offline after Black Basta ransomware breach

Multinational telecommunications large BT Group (previously British Telecom) has confirmed that its BT Conferencing enterprise division shut down a few of its servers following a Black Basta ransomware breach.

BT Group is the UK’s main fastened and cellular telecom supplier. It additionally gives managed telecommunications, safety, and community and IT infrastructure providers to clients in 180 international locations.

An organization spokesperson informed BleepingComputer that the safety incident did not affect BT Group’s operations or BT Conferencing providers, so it’s unclear if any techniques had been encrypted or solely knowledge stolen.

“We identified an attempt to compromise our BT Conferencing platform. This incident was restricted to specific elements of the platform, which were rapidly taken offline and isolated,” BleepingComputer was informed.

“The impacted servers do not support live BT Conferencing services, which remain fully operational, and no other BT Group or customer services have been affected.”

Whereas BT stated there was solely an try and compromise their platform, additionally they stated they took impacted servers offline.

This comes after the Black Basta ransomware gang claimed they breached the corporate’s servers and allegedly stole 500GB of knowledge, together with monetary and organizational knowledge, “users data and personal docs,” NDA paperwork, confidential info, and extra.

Black Basta BT Conferencing entry
BT Conferencing entry on Black Basta’s leak web site (BleepingComputer)

​The cybercrime group additionally printed folder listings and a number of screenshots of paperwork requested by the corporate in the course of the hiring course of as proof of their claims.

The ransomware gang additionally added a countdown to their darkish net leak web site, saying the allegedly stolen knowledge can be leaked subsequent week.

With the menace actors now claiming to have stolen a whole bunch of GBs of paperwork from BT Conferencing servers, it appears like this was a severe breach somewhat than simply an try.

“We’re continuing to actively investigate all aspects of this incident, and we’re working with the relevant regulatory and law enforcement bodies as part of our response,” the BT Group spokesperson added.

The Black Basta Ransomware-as-a-Service (RaaS) operation surfaced in April 2022 and has claimed many high-profile victims worldwide, together with healthcare firms and authorities contractors.

A few of its most notable victims embrace U.S. healthcare large Ascension, U.Ok. tech outsourcing agency Capita, German protection contractor Rheinmetall, authorities contractor ABB, Hyundai’s European division, the Toronto Public Library, the American Dental Affiliation, and Yellow Pages Canada.

CISA and the FBI stated in Could that Black Basta associates have breached over 500 organizations, amassing a minimum of $100 million in ransom funds from over 90 victims till November 2023.

Recent articles

Patch Alert: Essential Apache Struts Flaw Discovered, Exploitation Makes an attempt Detected

î ‚Dec 18, 2024î „Ravie LakshmananCyber Assault / Vulnerability Risk actors are...

Meta Fined €251 Million for 2018 Knowledge Breach Impacting 29 Million Accounts

î ‚Dec 18, 2024î „Ravie LakshmananKnowledge Breach / Privateness Meta Platforms, the...