Header image

Research: Cardinal Group Attempted Exploit on Microsoft Zero-Day

Black Basta operator attempted to exploit zero-day vulnerability.

The group behind the Black Basta ransomware may have been exploiting a recently-patched Windows privilege escalation vulnerability as a zero-day.

According to threat research by Symantec, if CVE-2024-26169 is exploited on affected systems, it can permit an attacker to elevate their privileges.

Although the vulnerability was patched on March 12, analysis of an exploit tool deployed in recent attacks revealed evidence that an exploit could have been compiled prior to patching, meaning at least one group may have been exploiting the vulnerability as a zero-day.

It has been detected that the exploit tool was deployed in a recent attempted ransomware attack, investigated by Symantec’s Threat Hunter Team.

Although the attackers did not succeed in deploying a ransomware payload in this attack, the tactics, techniques, and procedures (TTPs) used were highly similar to those described in a recent Microsoft report detailing Black Basta activity.

Dan Raywood Senior Editor SC Media UK

Dan Raywood is a seasoned B2B journalist with over 20 years of experience, specializing in cybersecurity for the past 15 years. He has extensively covered topics from Advanced Persistent Threats and nation-state hackers to major data breaches and regulatory changes. Outside work, Dan enjoys supporting Tottenham Hotspur, managing mischievous cats, and sampling craft beers.

Dan Raywood Senior Editor SC Media UK

Dan Raywood is a seasoned B2B journalist with over 20 years of experience, specializing in cybersecurity for the past 15 years. He has extensively covered topics from Advanced Persistent Threats and nation-state hackers to major data breaches and regulatory changes. Outside work, Dan enjoys supporting Tottenham Hotspur, managing mischievous cats, and sampling craft beers.

Upcoming Events

08
Aug
Webinar

How to Automate the Lifecycle of Joiners, Movers, and Leavers With No-Code Solutions

Streamlining the lifecycle of joiners, movers, and leavers using no-code automation

The process of onboarding new employees and quickly removing departing staff profiles can be both time-consuming and labour-intensive.
In this live webinar, we will look at how to streamline these processes to save time and resources, and providing a smooth experience for both admins and employees.

Key takeaways:
  • Understanding the importance of securing the joiners, movers and leavers process
  • Exploring successful attacks that occurred due to errors in managing these transitions
  • Discover which advanced controls can be utilized
image image image