8Base is a ransomware group that first emerged in 2022 but ramped up its operations and refined its methods significantly in 2023. The malware began as a crypto-ransomware but has since evolved to perform multi-extortion in its attacks. The malware is very similar to that of Phobos and related groups; however, there is no known, formal relationship between the different groups.
Typically, the 8Base malware gains a foothold on target environments via phishing emails or initial access brokers. These are cybercriminals who have gained access to a company’s network via some means — phishing, compromised credentials, vulnerability extortion, etc. — and sell that access to other cybercriminals on the Dark Web.
Once it has infected a computer, 8Base acts as a double extortion ransomware, both encrypting and stealing data. It begins by enumerating all drives connected to the system and identifying data files within them. These files are then encrypted using AES-256 in CBC mode and have the .8base extension attached to them.
The malware also uses various means to evade detection, add persistence, and protect against data recovery. Some techniques include:
In addition to encrypting data, the malware will also attempt to steal it from infected machines. Once data encryption and exfiltration are complete, the malware will present a ransom demand to the owner of the infected device.
After the ransom demand is presented, the company may choose to pay the ransom to restore access to its encrypted files. If this isn’t the case, then the double-extortion comes into play, where the 8Base ransomware group will threaten to expose sensitive information that they have stolen from the company’s systems if the organization continues to refuse to pay. This data breach can cause significant reputational damage to the organization and may result in regulatory penalties due to the failure to properly protect customer data.
The 8Base ransomware group targets companies in various industry verticals, including finance, manufacturing, IT, and healthcare. In general, the targets are small to medium-sized businesses (SMBs) and are primarily located in the United States, Brazil, and the United Kingdom.
A ransomware attack can be damaging and expensive for an organization. Some best practices for protecting against 8Base and other ransomware attacks include the following:
Prevention is the only effective means of managing the ransomware threat. Once ransomware has begun encrypting or exfiltrating data, the damage has already been done. To learn more about how to prevent ransomware attacks and eliminate their potential cost to the organization, check out the CISO’s Guide to Ransomware Prevention.
Check Point’s Harmony Endpoint offers protection against a wide range of endpoint security threats. This includes robust anti-ransomware protection as well as detecting and blocking a wide range of other types of malware. To learn more about Harmony Endpoint and what it can do for your company, sign up for a free demo today.