Video

Threat Briefing: How Black Basta Bypassed Endpoint Security

In this episode of Threat Briefing, we go beyond open-source intelligence.Security researcher Kostya Vasilkov returns to unpack the leaked internal chat logs of the Black Basta ransomware gang.

These never-before-discussed conversations between operators reveal exactly how they bypassed EDRs, using Rundll32, process injection and Safe Mode boot.

Threat Briefing: How Black Basta Bypassed Endpoint Security
Threat Briefing: How Black Basta Bypassed Endpoint Security
Select language to download
Access report

Trusted by experts and enterprises worldwide

FAQs