8Base attacks Midwest Service Center

Incident Date: Jan 24, 2024

Attack Overview
VICTIM
Midwest Service Center
INDUSTRY
Manufacturing
LOCATION
USA
ATTACKER
8base
FIRST REPORTED
January 24, 2024

8Base Ransomware Group's Attack on Midwest Service Center

The 8Base ransomware group claimed an attack on Midwest Service Center. The group obtained several pieces of corporate data, including invoices, receipts, accounting documents, personal data, certificates, employment contracts, confidentiality agreements, personal files, and other documents. Midwest Service Center offers a full range of manufacturing and service to Mining, Petrochemical, Power Generation, Steel, and other process application needs.

The Emergence of 8Base Ransomware Gang

The 8Base ransomware gang first emerged in March of 2022 and has quickly become one of the most active groups today, having displayed a "massive spike in activity" in the second half of 2023, making them one of the most significant threats in the wild. The sophistication of the operation suggests they are an offshoot of experienced RaaS operators - most likely Ransomhouse, a data extortion group that first emerged in December of 2021 and was quite active in late 2022 and early 2023. Other researchers see a connection to the leaked Babuk builder.

Techniques and Targets

Like most groups today, 8Base engages in data exfiltration for double extortion and employs advanced security evasion techniques, including modifying Windows Defender Firewall for bypass. 8Base does not appear to have its own signature ransomware strain or maintain an RaaS for recruiting affiliate participation openly, but it is assessed they may service a group of vetted affiliate attackers privately. Like RansomHouse, they appear to use a variety of ransomware payloads and loaders in their attacks, most prevalently customized Phobos with SmokeLoader. Attacks also included wiping of Volume Shadow Copies (VSS) to prevent rollback of the encryption. 8Base does not appear to be targeting Linux systems, maintaining a focus on Windows targets.

Recent Activities and Strategy

In Q4-2023, 8Base continued using a new variant of the Phobos ransomware payload, typically delivered with SmokeLoader. 8Base does not appear to maintain a RaaS program open to affiliate attackers, appearing to be opportunistic in their choice of victims with a focus on “name and shame” via their leaks site to compel payment of the ransom demand.

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.