Former Black Basta Affiliates Automate Social Engineering on C-Suite

Published
Score
7

Why it matters

Former affiliates of the Russia-linked Black Basta ransomware group launched a coordinated surge of social engineering attacks in March 2026, targeting C-suite executives in manufacturing and professional services firms. The attackers used "email bombing"—flooding inboxes with hundreds of messages in minutes—followed by rapid Microsoft Teams messages and vishing calls impersonating IT support. The fraudsters operated from Russia-based IP addresses using disposable onmicrosoft.com accounts and sought to steal credentials for remote access tools like Supremo Remote Desktop.

ReliaQuest attributed the campaign to former Black Basta affiliates, whose parent organization was disrupted in February 2025 after internal chats leaked. The firm documented over 100 employees across dozens of organizations compromised since May 2025, with March 2026 showing a sharp escalation: 77 percent of incidents that month targeted senior leadership, up from 59 percent earlier in the year. No specific victim companies have been publicly identified. The attackers compressed their entire process—from initial contact to full system access—into approximately 12 minutes, with individual messages sent just 29 seconds apart.

Organizations should treat this campaign as a direct threat to executive security protocols. The speed and automation of these attacks significantly reduce defender response windows. Legal and compliance teams should prioritize immediate C-suite training on email bombing tactics, verification procedures for unexpected Teams communications, and credential hygiene. Given the targeting of leadership roles, firms should review access controls for high-privilege accounts and consider whether current incident response procedures account for attacks designed to succeed in minutes rather than hours.

mail

Get notified about new Privacy developments

Primary sources. No fluff. Straight to your inbox.

See more entries tagged Privacy.

Also on LawSnap