Data Breach Alert: Active-PCB Solutions Ltd Targeted by Black Basta Ransomware Group

Incident Date: May 05, 2024

Attack Overview
VICTIM
Active-PCB Solutions Ltd
INDUSTRY
Manufacturing
LOCATION
United Kingdom
ATTACKER
Blackbasta
FIRST REPORTED
May 5, 2024

Ransomware Attack on Active-PCB Solutions Ltd by Black Basta

Company Profile: Active-PCB Solutions Ltd

Active-PCB Solutions Ltd, a prominent UK-based contract electronics manufacturer, specializes in PCB assembly for OEMs in the EMS market. Since its inception in 1997, the company has been recognized for its rapid, high-complexity assembly solutions for small to medium batch productions. Their services encompass complex surface mount, conventional through-hole, electro-mechanical assembly, and full product builds.

The company's technological capabilities include handling components as small as 01005 to sophisticated QFP and BGA, supporting large batch volumes with advanced technologies like flip-chip and Micro BGAs. Known for exceptional customer service and meticulous attention to detail, Active-PCB collaborates closely with clients to tailor solutions to specific needs and specifications.

Details of the Ransomware Attack

The cyberattack orchestrated by the ransomware group Black Basta targeted Active-PCB Solutions Ltd, leading to the exfiltration of approximately 750 GB of data. This data comprised a range of sensitive information including internal company documents, employee records, development data, and sales records. The attack not only encrypted the company's data but also threatened the integrity and confidentiality of critical business information.

Ransomware Group Profile

Emerging in early 2022, Black Basta quickly became a formidable name in the Ransomware-as-a-Service (RaaS) arena. The group is known for its double extortion tactics, which involve encrypting the victim's data and threatening to leak it unless a ransom is paid. Black Basta uses the XChaCha20 encryption algorithm and has been linked to other high-profile cybercriminal groups such as Conti and FIN7. The group predominantly targets large organizations within the construction and manufacturing sectors, focusing on English-speaking countries.

Potential Vulnerabilities and Attack Vectors

While specific details of the breach vector in Active-PCB's case are not publicly available, common entry points for such attacks include phishing, exploitation of unpatched software vulnerabilities, and compromised credentials. Given the sophistication of Black Basta, it is plausible that one of these methods was employed to gain initial access to Active-PCB's network.

Sources

See Halcyon in action

Interested in getting a demo?
Fill out the form to meet with a Halcyon Anti-Ransomware Expert!

1
2
3
Let's get started
1
1
2
3
1
1
2
2
3
Back
Next
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.