đź“° Full Story
Security firm ReliaQuest on April 15, 2026 published research showing a surge in a fast-scale intrusion campaign that mirrors the playbook of the defunct Black Basta ransomware group.
The campaign, active since at least May 2025 and accelerating in March 2026, has targeted more than 100 employees across dozens of organizations with a heavy focus on senior leadership — roughly three-quarters of observed targets were executives, directors or managers.
Attackers combine mass “email bombing” with Microsoft Teams help-desk impersonation to push victims to install remote monitoring and management (RMM) tools such as Supremo or to use Windows Quick Assist.
Once connected, operators execute scripts disguised as legitimate utilities to gain hands-on access.
ReliaQuest says the activity uses disposable Microsoft tenants, Russia-based source IPs and a highly automated workflow that enables intrusions within minutes.
The highest-hit sectors include manufacturing, professional, scientific and technical services, finance and insurance, construction and technology.
While researchers have not yet observed widespread ransomware encryption in the current wave, they warn the activity is consistent with pre-ransomware staging and could lead to data theft, extortion or subsequent ransomware deployment.







đź’¬ Commentary