8base

Threat Actor updated a month ago (2024-11-29T14:41:05.368Z)
Download STIX
Preview STIX
8base, a significant threat actor in the cybersecurity landscape, has been active between April 2022 and May 2023. This group, while not new, has recently increased its visibility with the activation of a public leak site used to pressure victims into paying ransoms. In the last month alone, 8base operators were responsible for 15% of all recorded ransomware attacks, largely targeting the industrial sector using a double extortion technique that involves both stealing and encrypting victims' data. The group operates similarly to previous Phobos campaigns, utilizing the same format for the appended portion of their ransomware, which includes an ID section, an email address, and a file extension. The group, tracked as 8base, claimed the second-most active position behind LockBit 3.0, amassing a total of 67 victims. According to a report by NCC Group, the data used in the Threat Pulse is based on the date of victim discovery, not the date of initial publication or data breach. Despite this, May's numbers this year are still 56% higher than those in May 2022 and a slight 5% higher than April 2023, even when excluding the 8base attacks. Looking forward, the cybersecurity landscape in 2024 is expected to become more challenging with both old-guard groups and newcomers like Akira, Play, and 8base projected to play dominant roles. Specifically, 8base has already attacked 281 organizations, distinguishing itself as a data-extortion cybercrime group rather than solely a ransomware operation. Their modus operandi involves swiftly encrypting local drives and shares using AES256 in CBC mode. Interestingly, despite the severity of the 8base ransomware attack, targeted organizations' websites remain fully functional, showing no visible signs of abnormalities.
Description last updated: 2024-05-04T18:46:50.308Z
What's your take? (Question 1 of 5)
Help tune the shared Cybergeist dataset, assist your peers, and earn karma. Expand the panel to get started.
Possible Aliases / Cluster overlaps
It's hard to track cluster overlaps and naming conventions between vendors, so here are some possible overlapping names / profiles you also may want to look at. Create a free account to see the source evidence for each alias, and help fix any errors.
Alias DescriptionVotes
Phobos is a possible alias for 8base. Phobos is a form of malware, specifically ransomware, that has been active since May 2019. The operation utilizes a ransomware-as-a-service (RaaS) model and is responsible for numerous cyber attacks worldwide. Threat actors behind Phobos gained initial access to vulnerable networks through phishing
3
Miscellaneous Associations
Other elements of context that could aid in the identification of relevance
Ransomware
Encryption
Malware
Data Leak
Telegram
Extortion
Analyst Notes & Discussion
Be the first to leave your mark here! Log in to share your views and vote.
Associated Malware
To see the evidence that has resulted in these malware associations, create a free account
Alias DescriptionAssociation TypeVotes
The Smokeloader Malware is associated with 8base. SmokeLoader is a malicious software (malware) that acts as a loader for other malware, injecting malicious code into the currently running explorer process and downloading additional payloads to the system. It has been used in conjunction with Phobos ransomware by threat actors who exploit its functUnspecified
3
The malware Conti, Lockbit is associated with 8base. Unspecified
2
The Lockbit Malware is associated with 8base. LockBit is a prominent ransomware-as-a-service (RaaS) malware that has been involved in numerous cyberattacks, demonstrating its staying power and adaptability. The malware, which can infiltrate systems through suspicious downloads, emails, or websites, is designed to exploit and damage computers orUnspecified
2
Associated Threat Actors
To see the evidence that has resulted in these threatActor associations, create a free account
Alias DescriptionAssociation TypeVotes
The Alphv Threat Actor is associated with 8base. Alphv, also known as BlackCat, is a threat actor group that has been linked to numerous cyberattacks, particularly targeting the healthcare sector. The group made headlines when it stole 5TB of data from Morrison Community Hospital, causing significant disruption and raising concerns about patient pUnspecified
2
Source Document References
Information about the 8base Threat Actor was read from the documents corpus below. This display is limited to 20 results, create a free account to see more
PreviewSource LinkCreatedAtTitle
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
Securityaffairs
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
Krebs on Security
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
CERT-EU
a year ago
BankInfoSecurity
a year ago
CERT-EU
a year ago
CERT-EU
a year ago